COMP 3350 Project #5 Solved

$ 29.99
Category:

Description

Requirements:
• Read the design section and write a program. Submit source file .asm to Canvas.
• Show your work to get full credit. ZERO point without steps for a result.
• Check deliverables section below. ZERO point for hand-written or scanned homework.
• See my last announcement if you do not like to use visual studio. I provide an free and lightweight alternative.
Deliverables:
• Save your source of assembly program as a .asm file.
• (5 points) Name document of source code as a “Firstname_Lastname.asm”.
• (15 points) A screenshot of the result after you compile and run program, correctly demonstrate the decryption result of the input “JPUESZSBAPANNHTXRTLBVLL”. The screenshot file should be named as “Firstname_Lastname.png” or “Firstname_Lastname.jpg” or any other valid picture format suffix.
• Submit your “Firstname_Lastname.asm” and “Firstname_Lastname.png” through the Canvas system. You do not need to submit hard copies.
Rebuttal period:
Objective:
This program has two objectives. The first objective is to create a procedure that will take plaintext and an encryption key, use the Vigenerè cipher, and encrypt the plaintext. The second objective is to create a procedure that will take cypher-text, an encryption key, use the Vigenere cipher, and ̀ decrypt the cypher-text.
Assume that all characters will be uppercase letters, no spaces, symbols, etc.
All “high level” directives are not allowed on this homework. (e.g. .IF .ENDIF .REPEAT, etc)
Design:
Create a BYTE array with the label ‘key’. This array will have length between 1 and (LENGHTOF input -1). Meaning the lower bound for ‘key’ is one character and the upper bound is one less than the number of characters in ‘input’.
Create a BYTE variable named “options”. This variable will be used to determine which procedures should be executed. If ‘options’ contain the value 1 it means the program should execute encryption procedure. If ‘options’ contain the value 0 (or any other value than 1) the program should execute decryption procedure.
Create a BYTE array with the label ‘output’. This array will have a dynamic length equal to
LENGTHOF input. When executing the program using encryption, the variable ‘output’ will hold the cypher-text and in the case of decryption, ‘output’ will hold plaintext.
Example of encryption / decryption:
For more information check the Wiki link: (https://en.wikipedia.org/wiki/ Vigenere_cipher)̀ The example below will use the plaintext word MEMORY and the key BAD.
First you “line up” your plaintext word with your key by writing the key directly beneath the plaintext word. Continue to repeat the key under each plaintext character:
MEMORY
BADBAD
In the above example MEMORY is longer than BAD, therefore, BAD was repeated. Next choose each character in the plaintext word, starting with the first and encrypt it.
To encrypt a character, you first find the column on the chart corresponding to the character in the plaintext, e.g. the character M (circled in blue). Next, find the row starting with the key character, e.g. the character B (circled in red). Finally, find where
the plaintext column and the key row intersect, e.g. the character N (circled in red). Continue this for each character.

MEMORY
BADBAD

MEMORY
BADBAD

MEMORY
BADBAD

Continue until all characters have been encrypted:
Input = MEMORY (plaintext) Key = BADBAD (key) output= NEPPRB (cypher-text)
Decrypting is the opposite of encrypting. To decrypt NEPPRB first write the key under the cyphertext. Then find the row starting with the key character. Next, move across that row until you find the cypher-text character. The cypher-text character’s column is the plaintext column.

NEPPRB
BADBAD
M

NEPPRB
BADBAD

NEPPRB
BADBAD
MEM

Continue until the cypher-text has been decrypted:
Input = NEPPRB
Key = BADBAD
Output = MEMORY

(80 points): Read the comments in the template file “project5_template.asm” and finish (1) – (8)
For the code, explain what each assembly line means in plain English. Your comment should be meaningful and reflect the code correctly.

Reviews

There are no reviews yet.

Be the first to review “COMP 3350 Project #5 Solved”

Your email address will not be published. Required fields are marked *