lab11 - Lab 11: Java Programming and Encryption By the end...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Lab 11: Java Programming and Encryption By the end of this lab, you will have practiced JAVA two-dimensional arrays, and looping structures that would simulate encryption: On Friday in class, Prof. Davison talked about the internet and how are emails, personal information, and instant messages travel through the internet. He also talked about how securing our data in some cases is very important. One way we can prevent our data from being read by others is to send it using encryption. In today’s lab you will be asked to simulate a very simple type of encryption. Computer encryption is based on the science of cryptography. The Greeks were the first to use ciphers which involves the substitutions or the transposing of letters and numbers. We are going to use a variation of the Greek’s logic by using the following table: 1 2 3 4 5 1 A B C D E 2 F G H I J 3 K L M N O 4 P Q R S T 5 U V W X Y Z If we wished to send the message I AM A MOUNTAIN HAWK and wanted it
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

lab11 - Lab 11: Java Programming and Encryption By the end...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online