Jump to content

Substitution cipher: Difference between revisions

m
no edit summary
mNo edit summary
Line 6:
 
;Task:
Encrypt aan input/source file by replacing every upper/lower case alphabets of the source file with another predetermined upper/lower case alphabets or symbols and save it into another output/encrypted file and then again convert that output/encrypted file into original/decrypted file.
 
This type of Encryption/Decryption scheme is often called a Substitution Cipher.
1,111

edits

Cookies help us deliver our services. By using our services, you agree to our use of cookies.