Professional Documents
Culture Documents
2A
Aim-Implementation of various substitution stream ciphers. a) Caesar Cipher
Theory:-
Source Code:-
#include<stdio.h>
#include<string.h>
char EString[40];
void main(void)
char Strng[40];
scanf("%s",&Strng);
printf("\n\nEncrypted String");
Encryption(Strng);
printf("\n\nDecrypted String");
Decription(EString);
int i,j;
char Cipher[40]="ABCDEFGHIJKLMNOPQRSTUVWXYZABC";
i=0;
while(Strng[i]!='\0')
if(Strng[i]!=' ')
if(Strng[i]==Cipher[j])
EString[i]=Cipher[j+3];
printf("%c",Cipher[j+3]);
else
printf(" ");
i++;
int i,j;
char Cipher[40]="ABCDEFGHIJKLMNOPQRSTUVWXYZABC";
i=0;
while(Strng[i]!='\0')
if(Strng[i]!=' ')
if(Strng[i]==Cipher[j])
printf("%c",Cipher[j-3]);
else
printf(" ");
i++;
Viva Questions:
Q. 1 What is Substitution Cipher?
Q. 2 What is Caesar Cipher?
Q. 3 What is Brute Force Attack?
Q. 4 What is disadvantage of Caesar Cipher ?