Program Specification: Using the techniques presented during this semester create a complete C++ program to emulate an encryption/decryption Machine. The machine will be capable of the following: Encrypt a string entered by the user Choose between two different encryption methods Decrypt a string entered by the user Choose between two different decryptions methods Decrypt without knowing the encryption method (provide all possible outputs) The interface must be professional and fully intuitive to the user. The program will be menu driven. The program will use a class to define and implement each of the methods as member functions and will store the original string and the encrypted/decrypted strings as data members. In addition to using a class you must also use all the major structures we used this semester including: Selection statements (if, if-else, switch) the appropriate one(s) of course Loops (while, for, do-while) the appropriate one(s) of course Standard Libraries (don’t recreate the wheel) Functions Arrays The two encryption/decryption methods are: Substitution cipher Caesar cipher
Using the techniques presented during this semester create a complete C++ program to emulate an encryption/decryption Machine. The machine will be capable of the following:
Encrypt a string entered by the user
Choose between two different encryption methods
Decrypt a string entered by the user
Choose between two different decryptions methods
Decrypt without knowing the encryption method (provide all possible outputs)
The interface must be professional and fully intuitive to the user.
The program will be menu driven.
The program will use a class to define and implement each of the methods as member functions and will store the original string and the encrypted/decrypted strings as data members.
In addition to using a class you must also use all the major structures we used this semester including:
Selection statements (if, if-else, switch) the appropriate one(s) of course
Loops (while, for, do-while) the appropriate one(s) of course
Standard Libraries (don’t recreate the wheel)
Functions
Arrays
The two encryption/decryption methods are:
Substitution cipher
Caesar cipher
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images