Part 2: Encryption Objective: Develop a program that encrypts a plaintext file by XORing 128-bit blocks of the file with a key repeatedly until the entire file is encrypted. Details: • The plaintext file will be a book from Project Gutenberg. • The encryption method should use the XOR operation on the file, 128 bits at a time, with the key. • Each 128-bit block is XORed with the same key. • The program should work from the command line and accept three parameters: o The name of the key file o The name of the plaintext file o The desired name of the resulting ciphertext file Note: This encryption method is not supposed to be secure.
Part 2: Encryption Objective: Develop a program that encrypts a plaintext file by XORing 128-bit blocks of the file with a key repeatedly until the entire file is encrypted. Details: • The plaintext file will be a book from Project Gutenberg. • The encryption method should use the XOR operation on the file, 128 bits at a time, with the key. • Each 128-bit block is XORed with the same key. • The program should work from the command line and accept three parameters: o The name of the key file o The name of the plaintext file o The desired name of the resulting ciphertext file Note: This encryption method is not supposed to be secure.
Related questions
Question
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 4 images