Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Your project is to write a program that can encrypt and decrypt a message using a double columnar transposition encryption algorithm.

For the purposes of this project, you will only use one step of column transpositions, although for extra credit, you can modify the file to perform two transpositions.

The text file will consist of messages; each line will start with either E (encrypt) or D (decrypt), and 2 digits for the numbers of columns that will be used (or were used) to encrypt the message. Each message will end with "*." The encryption works as follows: The message is written to a table of n columns of characters, filling one row at a time.

When the message is completely written to the table, any blank spaces in the array will be filled with a character "rarely used", such as X, Z, Q.

The message is then rewritten by reading the table one column at a time (reading down the columns), giving a permutation of the original message.

The process is then repeated using the second digit Your program should output the encrypted message to a text file. The decryption works "in reverse": The message is written to a table of n columns of characters, filling one column at a time. (You will need to calculate the number of rows needed to store the encrypted message.)

The message should fill the table completely.

The message will then be rewritten by reading the table one row at a time (left to right order). The decrypted measure should then be written to a text file.

Your program should read the message into a string, store it in "appropriate" two-dimensional arrays (one for each step), and then write the resulting string to a new text file.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93097643

Have any Question?


Related Questions in Computer Engineering

What is the role of arp and how does it cause a security

What is the role of ARP and how does it cause a security concern? What is the different between global and private IP addresses? How does using NAT change a private IP address into a global IP address, and why is this so ...

Start from scratch on each of the parts write a main

Start from scratch on each of the parts. Write a main function that declares an array of 100 doubles. In a for loop, assign each of the doubles a random number between 0.50 and 50.00. Here's how. array[i] = (double) (ran ...

Systems and networksconsider a node in a packet switched

(Systems and Networks) Consider a node in a packet switched network that has a transmission rate of 100 Mbps. Packets of length 256 bytes arrive at this node. Compute the average queuing delay for 12,000 packets arriving ...

Consider the market for small business loans in the context

Consider the market for small business loans. In the context of this market. How adverse selection impact lenders. How does adverse selection impact borrowers? In the context of this market provide 2 things that a lender ...

The standard bcd-to-7-segment decoder such as the 74ls47

The standard BCD-to-7-segment decoder (such as the 74LS47 used in the lab), has active-LOW outputs. Should the 7-segment display be common-anode or common-cathode? Why do you think the decoder is configured for active-LO ...

Question 1 a server with an upload rate of 5000 bitssec

Question : 1. A server with an upload rate of 5,000 bits/sec must distribute a 10,000 bit file to 20 clients. Each client has a download rate of 4,000 bits/sec. What is the minimum time required to distribute the file to ...

Systems analysis project personal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Question provide a real-world example or describe a

Question: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. Need 300-350 words APA sta ...

Given the following scenarios what is the standard

Given the following scenarios, what is the standard deviation for Acme, Inc.? Economy / Pri / Ri Strong / 0.3 / 40% Normal / 0.4 / 16% Weak / 0.3 / -20% Express your answer in decimal format (e.g., 0.1935 to represent 19 ...

Please help with anbspfunctionnbspcodesymbol to convert

Please help with a function  codeSymbol , to convert each mark to a symbol (A, B, C, D, E, F) and a code (7,6,5,4,3,2,1) according to the table below. And call it in the main function. Use the table below to determine th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As