What is encryption? Cryptography is used everywhere around us and we depend on it so much without even realizing it. Cryptography (encryption) is the field of computer science that hides information. It tries to hide (encrypt) the information so that if someone who should not have access to the hidden, encrypted data cannot reconstruct, decrypt the message to get the original information. The encryption engine will encrypt it in such a way that it cannot recognize the original message. With the right key, decided before encrypting the data and the right decryption engine, which would be the reverse method of the method used to encrypt the message, it is possible to recover the original message. Cryptography was created many centuries ago, long before computers existed. It was originally created for military use. Cryptography has long remained an activity reserved primarily for the military. Until a century ago it was practically only used by the military and only in the last 20-30 years has it become much more widespread. Now we use it everywhere; in ATM cards, online shopping sites, game consoles, to send/receive copyrighted music and films, and many other applications. All of this is possible because of the rise of the computer and how much processing power has increased. Even though we have so much computing power, we still leave so much of it unencrypted, which is a problem. Why is encryption such a problem? If we don't have encryption, we have no privacy. At least not for your data. They are all 1s and 0s, but it is not very difficult to see the data they represent if it is not encrypted when intercepted. And there are thousands of ways to intercept data, here are some:• The Internet is probably t...... middle of the paper ...... will add the remaining character to the string on the left . Both strings will then be reversed, i.e. the first character becomes the last character, the second character becomes the second to last character etc. The two strings will then be joined and put back together. Every second character will then be swapped. Eventually A will become Z, B will become Y, C will become X etc. Each number will be multiplied by a random number from 1 to 10. Then the number used to multiply will be added to the encrypted message and the number 0 will be added if there were no numbers in the message.Acceptance Test:1. The program accepts the message as input.2. Divided in half into 2 strings.3. Both strings are reversed.4. Both punctures are put back together.5. Every second character will then be swapped.6. Each letter will be assigned the reverse letter and the numbers will be multiplied by a random number from 1 to 10.
tags