Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Encryption is commonly used to disguise messages
on the internet. A Caesar cipher performs a shift of
all of the characters in a string (based on their ASCII
values, see Table 2.1), e.g.
h e l l o → m j q q t
The example shows a shift with a distance of 5
characters, i.e. h(ASCII:104) → m(ASCII:109)
Write a C/C++ program that asks the user to input a
line of plaintext and the distance value and outputs
an encrypted text using a Caesar cipher, with the
ASCII values range from 0 through 127. Use
underscores (ASCII: 95) to represent space
characters.
Underscore characters should not be encrypted,
and any character that is encrypted may not
become an underscore. In this case, the character
should be changed to the next character in the
ASCII table.
The program should work for any printable
characters.
NB: No strings (datatype) or library functions may
be used.
See Figure 2.1 for example output.

ASCII-tabel verander word.
crRangeo o TEX Graracior m
ASCII table.
Die program moet vir enige vertoonbare karakters
The program should work for any printable
werk.
characters.
NB: Geen strings (datatipe) of biblioteekfunksies
mag gebruik word nie.
NB: No strings (datatype) or library functions may
be used.
Sien Figuur 2.1 vir voorbeeld afvoer.
See Figure 2.1 for example output.
ASCII-Tabel I ASCII Table
NUL
16
DLE
SP
48
64
80
96
112
SOH
17
DC1
33
49
65
81
97
113
al
STX
18
DC2
34
50
66
82
R.
98
b.
114
ETX
19
DC3
35
51
67
83
99
115
20
36
37
EOT
DC4
52
4.
68
84
T.
100
d.
116
ENQ
21
NAK
53
69
E
85
101
117
ACK
22
SYN
38
54
70
86
V.
102
118
V
7.
BEL
23
ETB
39
55
71
G.
87
103
6.
119
W
8.
BS
CAN
40
56
8.
72 H
88
104
120
6.
HT
EM
41
57
6.
73
89
105
121
10
LF
26
SUB
42
58
74
90
106
122
11
VT
27
ESC
43
59
75
91
107
k
123
12
FF
28
FS
44
60
76
92
1.
108
124
13
CR
29
GS
45
61
77
93
1
109
125
14
SO
30
RS
46
62
78
94
110
126
15
SI
31
US
47
63
79
95
111
127
DEL
Tabel 2.1 / Table 2.1
123 56 7
234
222
123
4)
96
Transcribed Image Text:ASCII-tabel verander word. crRangeo o TEX Graracior m ASCII table. Die program moet vir enige vertoonbare karakters The program should work for any printable werk. characters. NB: Geen strings (datatipe) of biblioteekfunksies mag gebruik word nie. NB: No strings (datatype) or library functions may be used. Sien Figuur 2.1 vir voorbeeld afvoer. See Figure 2.1 for example output. ASCII-Tabel I ASCII Table NUL 16 DLE SP 48 64 80 96 112 SOH 17 DC1 33 49 65 81 97 113 al STX 18 DC2 34 50 66 82 R. 98 b. 114 ETX 19 DC3 35 51 67 83 99 115 20 36 37 EOT DC4 52 4. 68 84 T. 100 d. 116 ENQ 21 NAK 53 69 E 85 101 117 ACK 22 SYN 38 54 70 86 V. 102 118 V 7. BEL 23 ETB 39 55 71 G. 87 103 6. 119 W 8. BS CAN 40 56 8. 72 H 88 104 120 6. HT EM 41 57 6. 73 89 105 121 10 LF 26 SUB 42 58 74 90 106 122 11 VT 27 ESC 43 59 75 91 107 k 123 12 FF 28 FS 44 60 76 92 1. 108 124 13 CR 29 GS 45 61 77 93 1 109 125 14 SO 30 RS 46 62 78 94 110 126 15 SI 31 US 47 63 79 95 111 127 DEL Tabel 2.1 / Table 2.1 123 56 7 234 222 123 4) 96
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education