Ciphers use many bitwise operations for cryptography. Write an ARM assembly program to use ciphers. See the steps below to implement the cipher. In this program you will implement a Symmetric Encryption.
Ciphers use many bitwise operations for cryptography. Write an ARM assembly program to use ciphers. See the steps below to implement the cipher. In this program you will implement a Symmetric Encryption.
Fundamentals of Information Systems
8th Edition
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter4: Telecommunications And Networks
Section: Chapter Questions
Problem 5SAT
Related questions
Question
Ciphers use many bitwise operations for cryptography. Write an ARM assembly program to use ciphers. See the steps below to implement the cipher. In this program you will implement a Symmetric Encryption.
a) Assign a variable name “Choice” with value 0 or 1 to show the choice for encryption or decryption. 0 for encrypt and 1 for decrypt. .
b) If we assign 0 to the variable choice the program will do encryption and if its 1 the program will do decryption.
c) For encryption design a key value, for that assign your last nonzero number of your number in a variable called “Key” Example: if your number is 5012345 Assign 5 to the variable Key and use it as the Key for encryption.
d) For choice 0 store the Cipher in a variable called “C”, for choice 1 store the Plain text in a variable called “P” (use symmetric Key cryptography and implement that for encryption and decryption).
e) Test the encrypt program using the first letter of your name in capital case and to test decryption use the encrypted binary equivalent of the last letter in capital case of your name. ASCII chart is given for reference. Assign testing values in variables “testEn” and “testDe” to test both choices..
f) Neat program with comments.
Read only Variables required: Choice, Key, testEn, testDe
Read Write Variables required: C P
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L