If anyone can help me get the coding for this program that will be extremely helpful! Thanks in a…

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadlines.


Order a Similar Paper Order a Different Paper
If anyone can help me get the coding for this program that will be extremely helpful! Thanks in advance!


Goal of this assignment To be able to 1) work with strings, 2) work with functions, 3) Write pseudocode 5) translate pseudocode to C program, and 6) test programs thoroughly. Introduction Cryptography is the science of making messages secure, of transforming readable messages into unreadable messages and back again. Messages that are unreadable are called ciphertext. The process of turning plaintext into ciphertext is called encryption. The reverse process of turning ciphertext into plaintext is called decryption. One of the easiest ways to encrypt a message is to scramble the letters. For example the word apple could be randomly transformed to lapep In fact there are 120 different possible arrangements of the word apple. However, if the encryption algorithm randomly scrambles the letters, the task of the decryption algorithm is pretty hard. Encryption and decryption algorithms must work together in some agreed upon way. with the encryption algorithm scrambling letters and the decryption algorithm unscrambling them. A transposition ci is one way to scramble the letters of a message. The cipher separates the message into two groups of characters: the first group composed of the even-numbered characters and the second group composed of the odd-numbered characters. To produce the ciphertext, the cipher puts together both groups; placing the group oftheeven-numbered characters first, followed by the group of odd-numbered characters. This encryption results in a string with the characters shuffled to new positions Project: Ask user to enter a string. write a function that takes the string as a parameter, encrypt the message as described above and returns the ciphertext. Then ask user again if shehe wants to continue or not. Finally print all the original messages in alphabetically ascending order. Example Please enter a message Fight Matadors, for Tech The encrypted message is ih, Mtdr, frTc!Fgt aaos o eh Do you want to continue (Y/N) Y Please enter a message Bear our banners far and wide The encrypted message is erorbnesfradwd.B u anr a n ie The original messages in alphabetical order are Bear our banners far and wide Fight, Matadors for Tech

Goal of this assignment To be able to 1) work with strings, 2) work with functions, 3) Write pseudocode 5) translate pseudocode to C program, and 6) test programs thoroughly. Introduction Cryptography is the science of making messages secure, of transforming readable messages into unreadable messages and back again. Messages that are unreadable are called ciphertext. The process of turning plaintext into ciphertext is called encryption. The reverse process of turning ciphertext into plaintext is called decryption. One of the easiest ways to encrypt a message is to scramble the letters. For example the word “apple” could be randomly transformed to “lapep” In fact there are 120 different possible arrangements of the word “apple.” However, if the encryption algorithm randomly scrambles the letters, the task of the decryption algorithm is pretty hard. Encryption and decryption algorithms must work together in some agreed upon way. with the encryption algorithm scrambling letters and the decryption algorithm unscrambling them. A transposition ci is one way to scramble the letters of a message. The cipher separates the message into two groups of characters: the first group composed of the even-numbered characters and the second group composed of the odd-numbered characters. To produce the ciphertext, the cipher puts together both groups; placing the group oftheeven-numbered characters first, followed by the group of odd-numbered characters. This encryption results in a string with the characters shuffled to new positions Project: Ask user to enter a string. write a function that takes the string as a parameter, encrypt the message as described above and returns the ciphertext. Then ask user again if shehe wants to continue or not. Finally print all the original messages in alphabetically ascending order. Example Please enter a message Fight Matadors, for Tech The encrypted message is ih, Mtdr, frTc!Fgt aaos o eh Do you want to continue (Y/N) Y Please enter a message Bear our banners far and wide The encrypted message is erorbnesfradwd.B u anr a n ie The original messages in alphabetical order are Bear our banners far and wide Fight, Matadors for Tech

"Is this question part of your assignment? We can help"

ORDER NOW

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper