question archive Program Specification: Using the techniques presented during this semester create a complete CH- program to emulate an Encryption/Decryption Machine

Program Specification: Using the techniques presented during this semester create a complete CH- program to emulate an Encryption/Decryption Machine

Subject:Computer SciencePrice: Bought3

Program Specification: Using the techniques presented during this semester create a complete CH- program to emulate an Encryption/Decryption Machine. The machine will be capable of the following: Encrypt a string entered by the user Choose bemeen two different encryption methods Decrypt a string entered by the user Choose between tw0 different decryptions methods Decrypt withOut knowing the encryption method [provide all possible outputs) "x'x'x'R'K The interface must be professional and fully intuitive to the user The program will be menu driven. The program will use a class to define and implement each of the methods as member functions and will store the original string and the encrypted/decrypted strings as data members. In addition to using a class you must also use all the major structures we used this semester including: Selection statements (if, if-else, switch) the appropriate one(s) of course Loops {while, for, do-while} the appropriate onets] of course Standard Libraries [don't recreate the wheel} Functions Arrays The two encryption/decryption methods are: Substitution cipher Caesar cipher You will need to research each and determine how to implement them. Remember in the case of the Caesar cipher there are 25 possible shifts, you must be able to choose or test for all 25 options.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE