implementing a very basic encryption scheme known as a caesar cipher. The caesar cipher involves shifting every letter in the given string by a given number in the alphabet.   Write and submit a NASM assembly language program “caesar.asm” that: Asks the user for a number between -20 to 20(-20 <= num <= 20) You have to do error correction Asks the user for a string and displays the unedited string that the user entered. The string from the user should be more than 8 characters long (spaces included) You have to do error checking that the string is longer than 8 characters Sample run : Enter a shift value between -20 and 20 (included) 45 Enter a shift value between -20 and 20 (included)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

 implementing a very basic encryption scheme known as a caesar cipher. The caesar cipher involves shifting every letter in the given string by a given number in the alphabet.

 

Write and submit a NASM assembly language program “caesar.asm” that:

  • Asks the user for a number between -20 to 20(-20 <= num <= 20)
    • You have to do error correction
      • Asks the user for a string and displays the unedited string that the user entered.
        • The string from the user should be more than 8 characters long (spaces included)
        • You have to do error checking that the string is longer than 8 characters
    • Sample run :


      Enter a shift value between -20 and 20 (included)

      45

      Enter a shift value between -20 and 20 (included)

      -26

      Enter a shift value between -20 and 20 (included)

      -25

       

      • Enter a shift value between -20 and 20 (included)

        -20

      Enter a string greater than 8 characters

      t

      Enter a string greater than 8 characters

      Th

      Enter a string greater than 8 characters

      This is.

      Current message: This is.

      Edited message: Uijt jt.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education