Professional Documents
Culture Documents
STRINGS: The character data type allows to store a single character only but to store a
single character only but to store more no of characters like name of the person,city where he
lives were done by using an array of characters and such an array of characters is called
string, which is enclosed in ‘ ‘.
A string is like a sentence with more no of words, separated by space hence each
and every string is ended with a string terminator represented by “\0”
DECLARATION OF A STRING:
Char name[size];
LOOPS: you may encounter situations, when a block of code needs to be executed several
number of times. In general, statements are executed sequentially: The first statement in a
function is executed first, followed by the second, and so on.
Page 1 of 12
Programming languages provide various control structures that allow for more complicated
execution paths.
Loop control statements change execution from its normal sequence. When execution
leaves a scope, all automatic objects that were created in that scope are destroyed.
for loop:
Executes a sequence of statements multiple times and abbreviates the code that
manages the loop variable.
Page 2 of 12
AIM
2.1Advantages: -
Code can be transmitted easily by without any hacking.
Security mode of transmission will be high.
Encryption key services prevent service providers from accessing data.
Encryption help us to meet regulation.
Page 3 of 12
2.2 Disadvantages: -
It is a very complex technology. Management of encryption keys must be an added
administrative task for often overburdened IT staff.
Here we are following with only one dimension array i.e., by taking a single matrix
and taking the given message and copying into columns first.
So, in future we may change this to diagonally and by taking the message first into the
right side of the matrix
Another feature that may be added to the proposed selective schemes ids the
‘selection criteria’. Encryption technique can be chosen dynamically as the content is
being distributed and the selection criteria can be changed as needed by the
application.
Page 4 of 12
SYSTEM REQUIREMENTS
SOFTWARE REQUIREMENTS:
The major software requirements of the project are as follows:
Language : Turbo-C
Operating system: Windows 10
HARDWARE REQUIREMENTS:
The hardware requirements that map towards the software are as follows:
RAM :8GB
Processor :i5
Page 5 of 12
FLOW CHART DIAGRAM
Start
Int a, b, c , i ,j
for(i=0,j=0;a[i]!='\0';i++)
{
if(a[i]==' ')
{ continue; }
else
{ b[j++]=a[i]; }
}
k=strlen(b);
for(k=0,i=0;i<5;i++)
{
for(j=0;j<5;j++)
{
c[i][j]=b[k++];
} Page 6 of 12
printf("\n");
}
for(i=0;i<5;i++)
{ for(j=0;j<10;j++)
{ printf("%c",c[j][i]);
}
printf("\t");
}
Stop
Page 7 of 12
IMPLEMENTATION
#include<stdio.h>
#include<string.h>
int main()
int i,j,k;
gets(a);
for(i=0,j=0;a[i]!='\0';i++)
if(a[i]==' ')
continue;
else
b[j++]=a[i];
Page 8 of 12
k=strlen(b);
for(k=0,i=0;i<5;i++)
for(j=0;j<5;j++)
c[i][j]=b[k++];
printf("\n");
for(i=0;i<5;i++)
for(j=0;j<10;j++)
printf("%c",c[j][i]);
printf("\t");
return 0;
Page 9 of 12
ALGORITHM
Page 10 of 12
INTEGRATION AND SYSTEM TESTING
OUTPUTS
ScreenShots:
Page 11 of 12
CONCLUSION
More and more users nowadays understand the idea of Internet's openness and danger
of web surfing, which explains the growing popularity of data encryption. The latter is being
frequently applied even to such common communications as instant messaging and emailing.
And that is worth it, as otherwise with a lack of security mechanism any data transferred over
the Internet may be easily stolen and viewed by anyone. It is even more dangerous in case of
critical data that can be compromised in many ways, particularly if it is being stored in
servers than can change its owner over the years. But when people understand how
detrimental may be the crimes like data or identity theft, data encryption becomes worth
pursuing.
Page 12 of 12