Now write another program that will take the encrypted file in Q3 and will decrypt it to decrypted.txt.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

write in c++  using simple programming fundamentals concepts 

 

Q4. Now write another program that will take the encrypted file in Q3 and will decrypt it to
decrypted.txt.
The decryption can be done by a mathematical observation given below.
Lets assume n=4.
The original array can be assumed as original[4] = {a,b.c.d}
The encrypted array is obtained as Encrypted[4] = {b+c+d, atctd, atb+d, a+b+c}
Add all the elements we will get
Sum = Encrypted[0] + Encrypted[1] + Encrypted[2] + Encrypted[3]
= 3(atbtc)
Sum of elements of Originall] = sum /n-1
Thus for a given encrypted array Encrypted[] of size n, the sum of elements of the original array
Originall] can be calculated as sum = (Encrypted[0] + Encrypted[1] + Encrypted[2] . Encrypted[n-
1])/ (n-1)
Original[0] = sum - Encrypted[0]
Original[1] = sum - Encrypted[1]
ww m m
%3D
Transcribed Image Text:Q4. Now write another program that will take the encrypted file in Q3 and will decrypt it to decrypted.txt. The decryption can be done by a mathematical observation given below. Lets assume n=4. The original array can be assumed as original[4] = {a,b.c.d} The encrypted array is obtained as Encrypted[4] = {b+c+d, atctd, atb+d, a+b+c} Add all the elements we will get Sum = Encrypted[0] + Encrypted[1] + Encrypted[2] + Encrypted[3] = 3(atbtc) Sum of elements of Originall] = sum /n-1 Thus for a given encrypted array Encrypted[] of size n, the sum of elements of the original array Originall] can be calculated as sum = (Encrypted[0] + Encrypted[1] + Encrypted[2] . Encrypted[n- 1])/ (n-1) Original[0] = sum - Encrypted[0] Original[1] = sum - Encrypted[1] ww m m %3D
Expert Solution
steps

Step by step

Solved in 4 steps with 2 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education