Cryptography is the study of protecting information. A cipher is a pair of algorithms ―the first algorithm encrypts a message and the second algorithm decrypts the message. In most cases, a unique key is also required to encode or decode plaintext. The Caesar cipher is one of the simplest and most widely known ciphers. It is named after Julius Caesar who allegedly used it to protect important military directives. Every letter in the plaintext is replaced by a letter N positions down the alphabet. For example, if N = 3, then a => d and b => e. While the idea is remarkably simple, it appeared to work in Ancient Rome. Most people there couldn't read, and those who could simply assumed it was a foreign language. Write a program that implements the Caesar cipher. You program will get from standard input the key N, followed by a line of plaintext. . . The key N should be any integer between 0 and 26 inclusive. If this isn't the case, print an error message and quit. Any numbers or punctuation in the plaintext should not be encrypted. Note: The letters should be shifted circularly. For example, if N = 3, then y => b. Example 1: Enter key: 3 Enter line: Et tu, Brute? Hw wx, Euxwh? Example 2: Enter key: 5 Enter line: Veni, vidi, vici Ajsn, anin, anhn Example 3: Enter key: -10 Invalid key!

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Cryptography is the study of protecting information. A cipher is a pair of algorithms
―the first algorithm encrypts a message and the second algorithm decrypts the
message. In most cases, a unique key is also required to encode or decode plaintext.
The Caesar cipher is one of the simplest and most widely known ciphers. It is named
after Julius Caesar who allegedly used it to protect important military directives.
Every letter in the plaintext is replaced by a letter N positions down the alphabet. For
example, if N = 3, then a => d and b => e.
While the idea is remarkably simple, it appeared to work in Ancient Rome. Most
people there couldn't read, and those who could simply assumed it was a foreign
language.
Write a program that implements the Caesar cipher. You program will get from
standard input the key N, followed by a line of plaintext.
.
.
The key N should be any integer between 0 and 26 inclusive. If this isn't the
case, print an error message and quit.
Any numbers or punctuation in the plaintext should not be encrypted.
Note: The letters should be shifted circularly. For example, if N = 3, then y => b.
Example 1:
Enter key: 3
Enter line: Et tu, Brute?
Hw wx, Euxwh?
Example 2:
Enter key: 5
Enter line: Veni, vidi, vici
Ajsn, anin, anhn
Example 3:
Enter key: -10
Invalid key!
Transcribed Image Text:Cryptography is the study of protecting information. A cipher is a pair of algorithms ―the first algorithm encrypts a message and the second algorithm decrypts the message. In most cases, a unique key is also required to encode or decode plaintext. The Caesar cipher is one of the simplest and most widely known ciphers. It is named after Julius Caesar who allegedly used it to protect important military directives. Every letter in the plaintext is replaced by a letter N positions down the alphabet. For example, if N = 3, then a => d and b => e. While the idea is remarkably simple, it appeared to work in Ancient Rome. Most people there couldn't read, and those who could simply assumed it was a foreign language. Write a program that implements the Caesar cipher. You program will get from standard input the key N, followed by a line of plaintext. . . The key N should be any integer between 0 and 26 inclusive. If this isn't the case, print an error message and quit. Any numbers or punctuation in the plaintext should not be encrypted. Note: The letters should be shifted circularly. For example, if N = 3, then y => b. Example 1: Enter key: 3 Enter line: Et tu, Brute? Hw wx, Euxwh? Example 2: Enter key: 5 Enter line: Veni, vidi, vici Ajsn, anin, anhn Example 3: Enter key: -10 Invalid key!
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education