Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.

 

 

ASCII-Tabel / ASCII Table
NUL
16
DLE
32
SP
48
64
80
P
96
112
1
SOH
17
DC1
33
49
1
65
81
오
97
a
113
STX
18
DC2
34
50
2
66
82
R
98
b
114
r
3
ETX
19
DC3
35
51
3
67
83
99
115
4
EOT
20
DC4
36
$
52
4
68
D
84
T
100
d
116
ENQ
21
NAK
37
53
5
69
E
85
U
101
e
117
u
6.
АCK
22
SYN
38
&
54
6
70
F
86
V
102
f
118
V
7
BEL
23
ETB
39
55
7
71
G
87
W
103
g
119
8.
BS
24
CAN
40
56
72
H
88
X
104
h
120
6.
HT
25
EM
41
57
73
89
Y
105
i
121
10
LF
26
SUB
42
58
74
J
90
106
122
11
VT
27
ESC
43
+
59
75
K
91
[
107
k
123
{
12
FF
28
FS
44
60
76
L.
92
108
1
124
13
CR
29
GS
45
61
77
M
93
109
m
125
}
14
so
30
RS
46
62
>
78
N
94
110
126
15
SI
31
US
47
63
79
95
111
127
DEL
Tabel 2.1 / Table 2.1
|00 | |으
Transcribed Image Text:ASCII-Tabel / ASCII Table NUL 16 DLE 32 SP 48 64 80 P 96 112 1 SOH 17 DC1 33 49 1 65 81 오 97 a 113 STX 18 DC2 34 50 2 66 82 R 98 b 114 r 3 ETX 19 DC3 35 51 3 67 83 99 115 4 EOT 20 DC4 36 $ 52 4 68 D 84 T 100 d 116 ENQ 21 NAK 37 53 5 69 E 85 U 101 e 117 u 6. АCK 22 SYN 38 & 54 6 70 F 86 V 102 f 118 V 7 BEL 23 ETB 39 55 7 71 G 87 W 103 g 119 8. BS 24 CAN 40 56 72 H 88 X 104 h 120 6. HT 25 EM 41 57 73 89 Y 105 i 121 10 LF 26 SUB 42 58 74 J 90 106 122 11 VT 27 ESC 43 + 59 75 K 91 [ 107 k 123 { 12 FF 28 FS 44 60 76 L. 92 108 1 124 13 CR 29 GS 45 61 77 M 93 109 m 125 } 14 so 30 RS 46 62 > 78 N 94 110 126 15 SI 31 US 47 63 79 95 111 127 DEL Tabel 2.1 / Table 2.1 |00 | |으
Enter the sentence to encrypt: Hello!_Your_pin_number_is:_76866
Enter the shift value: 3
The encrypted sentence is: Khoor$_\rxu_slq_qxpehu_lv=_:9;99
Figuur 2.1 / Figure 2.1
Transcribed Image Text:Enter the sentence to encrypt: Hello!_Your_pin_number_is:_76866 Enter the shift value: 3 The encrypted sentence is: Khoor$_\rxu_slq_qxpehu_lv=_:9;99 Figuur 2.1 / Figure 2.1
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 2 images

Blurred answer
Knowledge Booster
Problems on Dynamic Programming
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education