Book Image

Improving your C# Skills

By : Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
Book Image

Improving your C# Skills

By: Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens

Overview of this book

This Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: • C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan • Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt • The Modern C# Challenge by Rod Stephens
Table of Contents (26 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
8
What to Know Before Getting Started
17
Files and Directories
18
Advanced C# and .NET Features
Index

Problems


Use the following problems to test your skills at building cryptographic programs. Give each problem a try before you turn to the example solutions for help.

45. Caesar cipher

In a Caesar cipher, also called a Caesar shift, Caesar substitution cipher, or shift cipher, you shift the values of the letters in the message by some fixed amount. In the original Caesar cipher, Julius Caesar reportedly used a shift of three to send secret messages to his commanders, so each letter was replaced by the letter that comes three positions later in the alphabet. The letter A was encrypted as D, B was encrypted as E, and so forth. Letters at the end of the alphabet wrap around to the beginning so, for example, X becomes A, Y becomes B, and Z becomes C. In this example, the shift value, 3, was the cipher's key.

Write a program that uses a Caesar cipher to encrypt and decrypt messages. Let the user enter some text and a shift and then click a button to encrypt the message. Let the user then enter a...