Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

A caesar cipher locates the coded text of a plaintext character

13/11/2020 Client: arwaabdullah Deadline: 24 Hours

Some encrypted text will be provided and your job is to write a C program to decrypt it. As always, the C program should be submitted as a standard C source code file. Please note that the computer program should comply with the commenting and formatting rules as described in class. For example, there should be a header for the whole program that gives the author’s name, class name, date, and description. End braces should be commented, and there are alignment and indenting requirements as discussed.

Basic Caesar Cipher -

In cryptography, a Caesar Cipher is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. (https://en.wikipedia.org/wiki/Caesar_cipher).

In a Caesar Cipher, the encryption is performed against a key string, which is often just the 26 letters of the alphabet. An offset value is defined that consists of a positive or negative integer. The plaintext (the normal text) is encrypted, one letter at a time, by using that offset value in the following way: (a) the index position within the key string of the letter to be encrypted is determined, (b) the offset value is applied to that index in order to obtain a new index within the key string, (c) the character at the new index is written as the cipher text.

The basic Caesar Cipher has a characteristic that makes it relatively easy to break: every character in the plain text is encoded with the same character in the cipher text. In the above example, every space is encoded with an ‘E’. Since the space is the most commonly used character, an observant reader could assume that a space is represented by an ‘E’ and determine the offset from that.

A variation on the basic Caesar Cipher uses a variable offset, one that is different for each character encoded. In this algorithm, the first character of the plain text will be encoded by some firstOffset as above, the next character is encoded by (firstOffset+1), the next by (firstOffset+2), etc. As you can see, the offsets grow sequentially from the first character of the plain text to the last. This ensures that instances of a character in the plain text will be represented by different characters in the cipher text.

Here is the above string encoded with a sequential offset that begins with 5. Notice that the “I” is still encoded by “N”, but all of the other characters are different.

Plain text: I LOVE TO FLY

Cipher text: NFSWDOKEANUAO

Here the “I” is encoded with an offset of 5, yielding a cipher text character “N”. The first space is encoded with an offset of 6, yielding a cipher text character of “F”. The “L” is encoded with an offset of 7, yielding a cipher text character of “S”, and so forth. Each character is encoded by an offset 1 larger than the preceding character until the end of the plain text is reached. Let’s apply the modified Caesar Cipher described above to a more complicated example. What follows is the key string you can use to decrypt the cipher text.

Key String: “hXTFexn39AJ6cmCYgktNuUwBdlKL04R1DSQrH y5q8VpjIZMGivEfasoWOb72zP“

The only characters in the key string are lower case alpha characters, upper case alpha characters, digits from 0 to 9, and a space. Those characters have been jumbled up to make the problem more difficult. The double quotes are used to mark the end of the key string; they are not part of it. The cipher text that you need to decrypt against that key string is:

Ciper text: “Vs8dLIcPJuiEfFsyOA89JTIv06iFu5aSw O27L4pzkTAwkyEl”

Of necessity, all of the characters in the cipher text are contained in the key string. The sequential offset values used to encrypt the plain text are positive and can begin with any number between 1 and 60. (You should, therefore, apply negative sequential offsets to decrypt the cipher text.)

Assignment -

Your task is to determine the initial offset value that will correctly decrypt the cipher text above and apply the modified Caesar Cipher algorithm to it to decrypt the string. When you find the correct initial offset, you will be able to read the string. If you do what the decrypted string says, you can have 5 extra bonus points.

In order to determine the initial offset value, your program should calculate all possible initial offsets from 1 to 60. Your output should look like the following, where “Offset” means “Initial Offset”:

Cipher Text: "Vs8dLIcPJuiEfFsyOA89JTIv06iFu5aSw O27L4pzkTAwkyEl"

Offset: 1; Result: 8fyuw5xsXJy55f5wqswEfpwKFGwysAwXfFwdwfaFuyw0qQsF5

Offset: 2; Result: qE NUyeahA yyEyU5aUvEVUlTMU a9UhETUBUEfTN UL5SaTy

Offset: 3; Result: 5vHtu FfP9H v uyfuiv8udXZuHf3uPvXuwuvEXtHuKyDfX

Offset: 4; Result: yirkNHTEz3rHHiHN ENGiqNBhINrEnNzihNUNivhkrNl 1EhH

Offset: 5; Result: GQgtrXv2nQrrGrtHvtMG5twPjtQvxt2GPtutGiPgQtdHRvPr

Offset: 6; Result: ......

Remember that since the cipher text was encrypted with positive offsets, you will decrypt with negative offsets. These are actual data, so you can use these to check your program. After the full list is generated, you will be able to visually scan through it and determine the offset and the plain text.

Hints -

The following functions might be useful to your solution:

1. A function to determine the length of a C-string. Note that the ‘\0’ is not included in the length calculation.

a. int strlen(char *); ()

2. A function to locate a character within a C-string and return its index value.

a. This function can be used to find a given character within the key string.

Finally, you can initialize a C-string with the key string and cipher text specified above by copy/pasting those strings into your code, but here is an important point: never copy/paste from a non-text file, like a PDF for example, directly into your code. Instead, copy/paste the text into Notepad or Notepad++ first, then copy/paste into your code. This eliminates most of the problems caused by hidden formatting characters and other issues.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quality Homework Helper
Buy Coursework Help
A+GRADE HELPER
Peter O.
Writer Writer Name Offer Chat
Quality Homework Helper

ONLINE

Quality Homework Helper

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

Greetings! I’m very much interested to work on this project. I have read the details properly. I am a Professional Writer with over 5 years of experience, therefore, I can easily do this job. I will also provide you with TURNITIN PLAGIARISM REPORT. You can message me to discuss the detail. Why me? My goal is to offer services to you that are profitable. I don’t want you to place an order once and that’s it. For me to be successful, I need you to come back and order again. Give me the opportunity to work on your project. I wish to build a long-term relationship with you. We can have further discussion in chat. Thanks!

$55 Chat With Writer
Peter O.

ONLINE

Peter O.

Hello, I can assist you in writing attractive and compelling content on ganja and its movement globally. I will provide with valuable, informative content that you will appreciate. The content will surely hit your target audience. I will provide you with the work that will be according to the needs of the targeted audience and Google’s requirement.

$55 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

When a firm undertakes corporate social initiatives it is: - Leccion 5 contextos activities answers - Sixonetwo - Greek club liverpool nsw 2170 - Unit 2 Assignment: Web Field Trip - Blood loss christopher beam - Khp and naoh titration equation - Last one picked whoop dee doo lyrics - Prepare an argument - Medium voltage fuse sizes - Animal farm chapter summary - Persuasive speech against physician assisted death - Ageless multi collagen reviews - Lithium chloride dot and cross diagram - Mohammed mansour al rumaih trading - Is hacking that does no direct damage a victimless crime - Kas direct sourcing private limited - Sedimentary rock flow chart - Ford ethical issues - Massacre at mystic worksheet answers - Consumer behavior henry assael pdf - What is the latitude and longitude of rome italy - No gumption by russell baker questions and answers - Cisco rv220w default password - Data Accuracy Discussion - Blood test sullivan nicolaides - Alter tablespace read write - 978 0 13 312747 8 - Issa cims gb certification - Cgd 218 visual literacy in business - Customer number on nsw photo card - On january 15 nifty company sells merchandise - Tidal river campground map - An investor has two bonds in her portfolio - The bad seed plot - The yellow bird cadence - Jk rowling transcript harvard speech - Amps volts to watts calculator - Healthcare Problem-Solving Using Analytics - Molly in private peaceful - Funny halloween witch poems - Why is uluru on the world heritage list - How to name precipitates - Pros and cons of computer science - Shadow health tina jones discharge - Role of a decomposer - What is transactional communication - Gravimetric determination of phosphorus in plant food lab answers - Discussion on Placement (Channels, Distribution, & Supply Chain) - Lame v3 99.3 for windows exe - Pleasures of eating wendell berry - Research methods in psychology pdf morling - Sodium carbonate and phenolphthalein - PRETORIA WEST ?[+̳2̳7̳6̳1̳0̳4̳8̳2̳0̳7̳1̳??]@)) EARLY TERMINATION- PILLS FOR SALE IN PRETORIA WEST SHOSHANGUVE, GEZINA - Objective positivist thinkers - Miscellaneous equipment crossword clue - Ipv6 total address space - Tim burton analysis essay - George kyparisis - W2 ACC DIS - Discussion Question - DQ2 BY9/17 - Social work case presentation example - Well woman exam soap note example - Pangea home rachel arc floor lamp - Design for average ergonomics - Great chesterford primary school - Bmj open instructions for authors - Physical properties of matter which are used to measure temperature - Persuasive speech question of policy - Pippin apple crossword clue - Earth science lab locating the epicenter of an earthquake - Johnson privilege power and difference chapter summaries - In our names rewriting the us death penalty - Social exchange theory blau - 2 coments each one 150 words (CITATION AND REFERENCE) - Peer Leadership Case study - Https www irs gov pub irs pdf f1040sc pdf - Journal - Scientific Academic Research Paper - How to create a spartan company - Lab separation of a mixture answer key - Http www strategicbusinessinsights com vals surveynew shtml - Dennis bellamy halls bradford - Global marketing eighth edition pdf - Well child comprehensive soap note - What is an analysis paper - Smallest positive solution maple - Week 7 - Nib overseas student health cover - Servant leadership takes flight - The dramatic imagination pdf - Marvel enterprises inc case study solution - Art Question&Answer - Reflection Paper- 2 - My name sandra cisneros analysis - English is a crazy language richard lederer summary - Moreton bay council auctions - Advanced Ergonomics - Hard rock cafe forecasting case study