Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Bartleby Related Questions Icon

Related questions

Question

make a code 

used mathlab if possible 

please dont uses if or return keep it basic 

(Basic ASCII Cacsar Cipher) A very ancient cryptographic technique for hiding a
message was to use a Caesar Cipher where each letter of a message is shifted down
the alphabet (i.c. towards later letters) by a fixed amount. Normally, if a letter falls
off the end of the alphabet it should wrap back onto the beginning. For this problem,
we will consider a very basic implementation of such a cipher, were we do not worry
about this wrapping.
basic_caesar Function:
Input variables:
• a string representing the message to be encoded
• a scalar representing the "key" (the amount to shift by)
Output variables:
• a string representing the encoded message (note: you will have to force
the result of your computations to be a character string by using the
function char( ) applied to your resulting message)
A possible sample case is:
> ciphertext = basic_caesar('MATHRULES’, 6)
ciphertext = SGZNX[RKY
expand button
Transcribed Image Text:(Basic ASCII Cacsar Cipher) A very ancient cryptographic technique for hiding a message was to use a Caesar Cipher where each letter of a message is shifted down the alphabet (i.c. towards later letters) by a fixed amount. Normally, if a letter falls off the end of the alphabet it should wrap back onto the beginning. For this problem, we will consider a very basic implementation of such a cipher, were we do not worry about this wrapping. basic_caesar Function: Input variables: • a string representing the message to be encoded • a scalar representing the "key" (the amount to shift by) Output variables: • a string representing the encoded message (note: you will have to force the result of your computations to be a character string by using the function char( ) applied to your resulting message) A possible sample case is: > ciphertext = basic_caesar('MATHRULES’, 6) ciphertext = SGZNX[RKY
Expert Solution
Check Mark
Step 1

Coded using matlab.

Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY