Starting Out With C++: Early Objects (10th Edition)
Starting Out With C++: Early Objects (10th Edition)
10th Edition
ISBN: 9780135235003
Author: Tony Gaddis, Judy Walters, Godfrey Muganda
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 15, Problem 4PC
Program Plan Intro

Flexible Encryption

Program Plan:

  • Include the required header files to the program.
  • Define “Encryption” class.
    • In public, create a constructor, destructor and pure virtual function.
    • In protected, declare the required variable.
  • Define the constructor.
    • Open the input file and output file.
    • If the input file is not present, exit the program.
    • If the output file is not present, exit the program.
  • Define the destructor.
    • Close the input and output file.
  • Define the subclass “encrypt” function.
    • Declare the required variables.
    • Read the input file and write the encrypted form to the output file.
  • Define the “Encryption” function.
    • In public, define the “transform” function.
      • Return the encrypted value.
  • Define the “main()” function.
    • Declare the required variables.
    • Get the input and output file name from the user.
    • Create the objects for the classes.
    • Get the encryption key from the user.
    • Call the function “setKey” function with the key value.

Blurred answer
Students have asked these similar questions
Code done in C Write a piece of code in a function called password that creates a file with a random password (it can be a number). In another function called check_password, the function must ask the user to input the password to login and it should match the password in the file. If it doesn't, it should keep asking the user to keep inputting the right password. Finally, just by passing in the two functions into the main, that would be fine. Ex. int main() {     ....password(....);     ....check_password(....);  }
<<Write in Java>> - Challenge 7 File encryption is the science of writing the contents of a file in a secret code. Your encryption program should work like a filter, reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file.   - Challenge 8 Write a program that decrypts the file produced by the program in Programming Challenge 7. The decryption program should read the contents of the coded file, restore the data to its original state, and write it to another file
1 Encryption (a). Write a program that will utilise AES for encrypting and decrypting the data from a file as follows. Your program should take 3 arguments from the command line as input. The first input should be either 0 or 1 referring to encryption or decryption, respectively. The second input is the key filename. The third input is the either the plaintext or encrypted filename. If the first argument is 0: your program will read an AES key from a file titled key.txt (passed as second argument) and then will read the plaintext from a file titled plain- text.txt (passed as third argument), encrypt the contents of plaintext.txt using the key and save the ciphertext in a file titled encrypted.txt. If the first argument is 1, your program should decrypt the contents of encrypted.txt. Sample Command-line Inputs: java 0 key.txt plaintext.txt java 1 key.txt encrypted.txt

Chapter 15 Solutions

Starting Out With C++: Early Objects (10th Edition)

Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education