Provide a complete program that performs a simple substitution cipher. The program should take plain text and a shift value and produce the encrypted text. Then it should take encrypted text and a shift value and produce the plain text once again. A different encrypted text and shift can be entered so make sure to get input.

Example:

EASTER shifted by 3 to left would become HDVWHU
HDVWHU shifted by 3 to right would become EASTER

This is how the early Caesar Cipher worked.

Provide a main method named Prog3.java. It should:

  • Get input for a string and a shift value
  • Convert to upper case
  • Only perform the following items on alphabetic characters between A and Z
  • Utilize a for loop which uses postfix incrementing operator
  • Convert character to its ASCII equivalent (type cast)
  • Shift by shift value entered above
  • If you reach end of alphabet, wrap around
  • Example: A shifted to the left 2 would become Y
  • Convert back to its character equivalent (type cast)
  • Output the new character
  • Get input for a string and a shift value
  • Perform same steps above to convert the encrypted text back to plain text

Be sure to get input again as a different encrypted text may be entered Utilize postfix increment/decrement operations and compound assignment operators for all math.

Example: x++ or x+=2.

Mimic the sample session precisely.

SAMPLE SESSION
Sample Session:

Please enter text to encrypt
easter
Please enter shift value
3
BXPQBO
Please enter text to decrypt
bxpqbo
Please enter shift value
-3
EASTER
Press any key to continue . . .

Sample Session 2: : (Notice spaces removed from input)

Please enter text to encrypt
This Is A Test
Please enter shift value
3
QEFPFPXQBPQ
Please enter text to decrypt
qefpfpxqbpq
Please enter shift value
-3
THISISATEST
Press any key to continue . . .

Sample Session 3: (Notice the different shift and decrypt value)

Please enter text to encrypt
hello
Please enter shift value
3
EBIIL
Please enter text to decrypt
ebiil
Please enter shift value
5
ZWDDG
Press any key to continue . . .
Academic Honesty!
It is not our intention to break the school's academic policy. Posted solutions are meant to be used as a reference and should not be submitted as is. We are not held liable for any misuse of the solutions. Please see the frequently asked questions page for further questions and inquiries.
Kindly complete the form. Please provide a valid email address and we will get back to you within 24 hours. Payment is through PayPal, Buy me a Coffee or Cryptocurrency. We are a nonprofit organization however we need funds to keep this organization operating and to be able to complete our research and development projects.