Can this be written in C programming and using strings and loops. Also can there be clear and concise comments?  Implement an encoder. When completed, your program should be able to accept a short sentence from the user and display an encrypted version of it. For simplicity, let us assume one case of letters throughout, say CAPITALS. We can use a substitution method to scramble a sentence and then use the reverse of this process to recover it. If we take two rows of the alphabet and shift the bottom row along a specified amount (our key), we can then read the letters in our sentence from the top row and use the substituted letter from the bottom row to form the encrypted sentence. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z X Y Z A B C D E F G H I J K L M N O P Q R S T U V W In the example above, the key is 3, hence the second row is shifted by three characters along. Take, for instance, the sentence “HELLO”. Each letter of your message should be replaced by the letter in the alphabet that comes three letters before. For “HELLO” that would be: EBIIL Your program is required to generate Figure 3.1 and demonstrate that it successfully compiles and runs. Your program should include comments

COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
1st Edition
ISBN:9780357392676
Author:FREUND, Steven
Publisher:FREUND, Steven
Chapter4: Financial Functions, Data Tables, And Amortization Schedules
Section: Chapter Questions
Problem 8AYK
icon
Related questions
Question

Can this be written in C programming and using strings and loops. Also can there be clear and concise comments? 

Implement an encoder. When completed, your program should be able to accept a short sentence from the user and display an encrypted version of it. For simplicity, let us assume one case of letters throughout, say CAPITALS. We can use a substitution method to scramble a sentence and then use the reverse of this process to recover it. If we take two rows of the alphabet and shift the bottom row along a specified amount (our key), we can then read the letters in our sentence from the top row and use the substituted letter from the bottom row to form the encrypted sentence.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

In the example above, the key is 3, hence the second row is shifted by three characters along. Take, for instance, the sentence “HELLO”. Each letter of your message should be replaced by the letter in the alphabet that comes three letters before. For “HELLO” that would be: EBIIL

Your program is required to generate Figure 3.1 and demonstrate that it successfully compiles and runs. Your program should include comments

0
C: C:\windows\system32\cmd.exe
Please use CAPITAL LETTERS
Enter message: HELLO
Enter key: 3
ABCDEFGHIJKLMNOPQRSTUVWX Y Z
X Y Z A B C D E F G H I J K L M N O P Q R S T U UW
Message to be encoded: HELLO
Code: EBIIL
Press any key to continue
111
Figure 3.1 Illustrative output from the encoder program.
X
Transcribed Image Text:0 C: C:\windows\system32\cmd.exe Please use CAPITAL LETTERS Enter message: HELLO Enter key: 3 ABCDEFGHIJKLMNOPQRSTUVWX Y Z X Y Z A B C D E F G H I J K L M N O P Q R S T U UW Message to be encoded: HELLO Code: EBIIL Press any key to continue 111 Figure 3.1 Illustrative output from the encoder program. X
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 4 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:
9780357392676
Author:
FREUND, Steven
Publisher:
CENGAGE L