Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.
Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.
Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.
Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift of all of the characters in a string (based on their ASCII values, see Table 2.1), e.g. h e l l o → m j q q t The example shows a shift with a distance of 5 characters, i.e. h(ASCII:104) → m(ASCII:109) Write a C/C++ program that asks the user to input a line of plaintext and the distance value and outputs an encrypted text using a Caesar cipher, with the ASCII values range from 0 through 127. Use underscores (ASCII: 95) to represent space characters. Underscore characters should not be encrypted, and any character that is encrypted may not become an underscore. In this case, the character should be changed to the next character in the ASCII table. The program should work for any printable characters. NB: No strings (datatype) or library functions may be used. See Figure 2.1 for example output.
Transcribed Image Text:ASCII-Tabel / ASCII Table
NUL
16
DLE
32
SP
48
64
80
P
96
112
1
SOH
17
DC1
33
49
1
65
81
오
97
a
113
STX
18
DC2
34
50
2
66
82
R
98
b
114
r
3
ETX
19
DC3
35
51
3
67
83
99
115
4
EOT
20
DC4
36
$
52
4
68
D
84
T
100
d
116
ENQ
21
NAK
37
53
5
69
E
85
U
101
e
117
u
6.
АCK
22
SYN
38
&
54
6
70
F
86
V
102
f
118
V
7
BEL
23
ETB
39
55
7
71
G
87
W
103
g
119
8.
BS
24
CAN
40
56
72
H
88
X
104
h
120
6.
HT
25
EM
41
57
73
89
Y
105
i
121
10
LF
26
SUB
42
58
74
J
90
106
122
11
VT
27
ESC
43
+
59
75
K
91
[
107
k
123
{
12
FF
28
FS
44
60
76
L.
92
108
1
124
13
CR
29
GS
45
61
77
M
93
109
m
125
}
14
so
30
RS
46
62
>
78
N
94
110
126
15
SI
31
US
47
63
79
95
111
127
DEL
Tabel 2.1 / Table 2.1
|00 | |으
Transcribed Image Text:Enter the sentence to encrypt: Hello!_Your_pin_number_is:_76866
Enter the shift value: 3
The encrypted sentence is: Khoor$_\rxu_slq_qxpehu_lv=_:9;99
Figuur 2.1 / Figure 2.1
Process by which instructions are given to a computer, software program, or application using code.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.