Let the user choose encryption or decryption. For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number, output the ciphertext (in hexadecimal numbers). For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers), output the decrypted message (Hexadecimal number). Both encryption and decryption should output the different operation results for each round like the following: For example: Round 1: E(Re) (Hex or Binary) K₁ E(R) K₁ S-box outputs... f(Ro, K₁) L-R .. Round 2: No Encryption/Decryption libraries or functions provided by the third party are allowed. Submit your program codes to Moodle with the notes of how to compile and run your program.
Let the user choose encryption or decryption. For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number, output the ciphertext (in hexadecimal numbers). For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers), output the decrypted message (Hexadecimal number). Both encryption and decryption should output the different operation results for each round like the following: For example: Round 1: E(Re) (Hex or Binary) K₁ E(R) K₁ S-box outputs... f(Ro, K₁) L-R .. Round 2: No Encryption/Decryption libraries or functions provided by the third party are allowed. Submit your program codes to Moodle with the notes of how to compile and run your program.
Chapter5: Making Decisions
Section: Chapter Questions
Problem 4PE
Related questions
Question
Let the user choose encryption or decryption.
For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number, output the ciphertext (in hexadecimal numbers).
For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers), output the decrypted message (Hexadecimal number).
Both encryption and decryption should output the different operation results for each round like the following:
For example:
Round 1:
E(R0) = ...... (Hex or Binary)
K1 = ……
E(Ro) xor K1 =
S-box outputs = ……
f(Ro1, K1) = …..
L2 =R1 =…….
La = Ra
Round 2:
.....•
No Encryption/Decryption libraries or functions provided by the third party are allowed.
Submit your program codes to Moodle with the notes of how to compile and run your program.
![Let the user choose encryption or decryption.
For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number,
output the ciphertext (in hexadecimal numbers).
For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers),
output the decrypted message (Hexadecimal number).
Both encryption and decryption should output the different operation results for each round like the
following:
For example:
Round 1:
E(Re)
(Hex or Binary)
K₁
E(R) K₁
S-box outputs...
f(Ro, K₁)
L-R ..
Round 2:
No Encryption/Decryption libraries or functions provided by the third party are allowed.
Submit your program codes to Moodle with the notes of how to compile and run your program.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F851c9a8c-607c-4507-9fa3-36947826ce6d%2Ff9cd0cc8-0c72-41fe-97aa-25531110deed%2Fba3sc3p_processed.jpeg&w=3840&q=75)
Transcribed Image Text:Let the user choose encryption or decryption.
For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number,
output the ciphertext (in hexadecimal numbers).
For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers),
output the decrypted message (Hexadecimal number).
Both encryption and decryption should output the different operation results for each round like the
following:
For example:
Round 1:
E(Re)
(Hex or Binary)
K₁
E(R) K₁
S-box outputs...
f(Ro, K₁)
L-R ..
Round 2:
No Encryption/Decryption libraries or functions provided by the third party are allowed.
Submit your program codes to Moodle with the notes of how to compile and run your program.
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Recommended textbooks for you
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![C++ Programming: From Problem Analysis to Program…](https://www.bartleby.com/isbn_cover_images/9781337102087/9781337102087_smallCoverImage.gif)
C++ Programming: From Problem Analysis to Program…
Computer Science
ISBN:
9781337102087
Author:
D. S. Malik
Publisher:
Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
![Operations Research : Applications and Algorithms](https://www.bartleby.com/isbn_cover_images/9780534380588/9780534380588_smallCoverImage.gif)
Operations Research : Applications and Algorithms
Computer Science
ISBN:
9780534380588
Author:
Wayne L. Winston
Publisher:
Brooks Cole