C++ How To Program Plus Mylab Programming With Pearson Etext -- Access Card Package (10th Edition)
bartleby

Concept explainers

bartleby

Videos

Textbook Question
Book Icon
Chapter 4, Problem 4.37MAD

(Enforcing Privacy with Cryptography) The explosive growth of Internet communications and data storage on Internet-connected computer has greatly increased privacy concerns. The field of cryptography is concerned with coding data to make it difficult (and hopefully -with the most advanced schemes-impossible) for unauthorized users to read. In this exercise you’ll investigate a simple scheme for encrypting and decrypting data. A company that wants to send data over the Internet has asked you to write a program, that will encrypt the data so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your application should read a four-digit integer entered by the user and encrypt it as follows: replace each digit with the result of adding 7 to the digit and getting the remainder after diving the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then print the encrypted integer. Write a separate application that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. [Optional reading project: Research “public key cryptography” in general and the PGP (pretty Good privacy) specific public-key scheme. You may also want to investigate the RSA scheme, which is widely used in industrial-strength applications.]

Blurred answer
Students have asked these similar questions
Cryptography: Cryptography is a way to keep messages and other data secret. It is the art of writing or solving ciphers. What's a cipher? It's a "secret or disguised way of writing," says the Concise Oxford Dictionary. In the business world, cryptography refers to mathematically based encryption methods that keep data away from the prying eyes of criminals or enemy governments. Today's businesses and governments use what is called "strong" encryption. This type of encryption is created using applied mathematics. Strong encryption was once used solely for military purposes, but in today's information society, encryption is needed for all kinds of uses. Keys are a fundamental component of cryptography, being used in cryptographic operations such as encryption, hashing and signing to provide desirable properties like confidentiality (keeping information secret), integrity (preventing information being altered) or authenticity (verifying who the information came from). One key (public key)…
(Taken from Ethics for the Information Age book) • Adam and Charlene are good friends. Both attend East Dakota State University. One day when Adam is off campus interviewing for a part-time job, someone asks him how many credit hours of computer science courses he has completed. Adam calls Charlene and asks her to access his student records by logging into the campus mainframe as if she were Adam. He provides Charlene with his student identification number and password so that she can do this. Is it wrong for Adam to share this information with Charlene? Is it wrong for Charlene to retrieve this information for Adam?
1. Secret Spy Code by CodeChum Admin Agent 007, I found some numbers written on the wall which could be the key to unlocking the room that holds the president's daughter!!! Unfortunately, when I tried inputting the numbers to the lock, it didn't work. What's that you say? Try reversing the numbers? Why, that's absolutely brilliant! Come on, we gotta hurry, the bomb is about to blow! Input 1. The number written on the wall Constraints The value is within the range: 0 <= n <= 2147483647. Output The first line will contain a message prompt to input the number. The second line contains the reverse of that number. Enter the number: 75 57

Chapter 4 Solutions

C++ How To Program Plus Mylab Programming With Pearson Etext -- Access Card Package (10th Edition)

Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Python Tutorial #10; Math Functions in Python; Author: Art of Engineer;https://www.youtube.com/watch?v=OviXsGf4qmY;License: Standard YouTube License, CC-BY