This is an old version of this course, from Winter 2016-2017. A newer version is available here.
This is an individual lab. You must work this lab without help from other students in the class. You may, however, get help from RCAS or the instructor while working this lab.
The objective of this lab is to create an application that encrypts or decrypts text files by implementing a design which employs the Strategy Pattern.
The Lab checklist will be provided in hard-copy.
Warning: In this lab, we are using very simple encryption algorithms. Do not use these algorithms to protect real data, as they are trivial to break in practice.
See Dr. Hornick's webpage for the lab description.
Acknowledgement
This lab developed by Dr. Mark Hornick, Dr. Riley, and Dr. Yoder.