Assignment 7B: Caesar Cipher. One of the simplest methods to encrypt a message is to "shift" the letters by a literal value. For example, if we take the letter 'A' and shift it by 2, we get 'C'. This "substitution cipher" gets its name from the Roman emperor Julius Caesar, who was one of the first person known to encode secret messages this way. For this assignment, you will create a program that prompts the user for a message to encode, as well as an offset to encrypt it with. You will then create and use the following methods:

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Solving this problem in the Java language

Assignment 7B: Caesar Cipher. One of the simplest methods to encrypt a message is to
"shift" the letters by a literal value. For example, if we take the letter 'A' and shift it by 2, we get
'C'. This "substitution cipher" gets its name from the Roman emperor Julius Caesar, who was
one of the first person known to encode secret messages this way.
For this assignment, you will create a program that prompts the user for a message to encode,
as well as an offset to encrypt it with. You will then create and use the following methods:
A validation method that takes in the message (as a string) and the offset integer
entered by the user. The method should return "true" if the offset is between 0
and 26 inclusively and the message contains only letters and spaces. If it fails
either criteria, it should return “false".
If the validation method returns true, a second encryption method should be
called. This method also takes in the message (as a string) and the offset integer
entered by the user. It should convert the message to UPPERCASE, encrypt
every letter in the message, and leave the spaces as they were. It should then
return the encrypted message.
Hint: The computer treats chars like integers in many ways, meaning you can add and
subtract numbers from them. A string is really an array of chars, and there are methods
in each language to get chars out of the string.
Hint: What happens if our offset makes the letter go past 'Z'? There are several ways to
deal with this – we can either use the modulus operator creatively, or use a loop to add
the offset value one at a time. In the latter case, if the letter becomes greater than 'Z'
(note the single quotes), we can reset it back to 'A' and keep going.
Sample Output:
Enter your message:
KSU class of 2025!
Enter the offset value: 14
Sorry, we can only process messages with letters and spaces, and the offset
must be between 0 and 26.
Do you want to encrypt another message?: Y
Enter your message:
First Year Experience at KSU
Enter the offset value: 13
Your secret message is...
SVEFG LRNE RKCREVRAPR NG XFH
Do you want to encrypt another message?: n
Closing out...
8.50 x 11.00 in
Transcribed Image Text:Assignment 7B: Caesar Cipher. One of the simplest methods to encrypt a message is to "shift" the letters by a literal value. For example, if we take the letter 'A' and shift it by 2, we get 'C'. This "substitution cipher" gets its name from the Roman emperor Julius Caesar, who was one of the first person known to encode secret messages this way. For this assignment, you will create a program that prompts the user for a message to encode, as well as an offset to encrypt it with. You will then create and use the following methods: A validation method that takes in the message (as a string) and the offset integer entered by the user. The method should return "true" if the offset is between 0 and 26 inclusively and the message contains only letters and spaces. If it fails either criteria, it should return “false". If the validation method returns true, a second encryption method should be called. This method also takes in the message (as a string) and the offset integer entered by the user. It should convert the message to UPPERCASE, encrypt every letter in the message, and leave the spaces as they were. It should then return the encrypted message. Hint: The computer treats chars like integers in many ways, meaning you can add and subtract numbers from them. A string is really an array of chars, and there are methods in each language to get chars out of the string. Hint: What happens if our offset makes the letter go past 'Z'? There are several ways to deal with this – we can either use the modulus operator creatively, or use a loop to add the offset value one at a time. In the latter case, if the letter becomes greater than 'Z' (note the single quotes), we can reset it back to 'A' and keep going. Sample Output: Enter your message: KSU class of 2025! Enter the offset value: 14 Sorry, we can only process messages with letters and spaces, and the offset must be between 0 and 26. Do you want to encrypt another message?: Y Enter your message: First Year Experience at KSU Enter the offset value: 13 Your secret message is... SVEFG LRNE RKCREVRAPR NG XFH Do you want to encrypt another message?: n Closing out... 8.50 x 11.00 in
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 3 images

Blurred answer
Knowledge Booster
Program on Numbers
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education