Checkpoint 2 - Advanced Caesar Cipher When encrypted, each letter in the message steps forward multiple...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Checkpoint 2 - Advanced Caesar Cipher When encrypted, each letter in the message steps forward multiple letters in the alphabet (A encrypted by five becomes F). When decrypted, each letter in the message steps back multiple letters in the alphabet (Q decrypted by three becomes N). The user specifies how many many steps each letter is to be shifted (between 0 and 25). Letters encrypted beyond the end of the alphabet "wrap around" two the start. Letters decrypted beyond the start of the alphabet "wrap around" to the end. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: EFGHIJKLMNOPQRSTUVWXYZABCD Note: The input/output letter map above shows a shift of four. The letter maps would be different for shift of a different number. Input Output >C3 SOUP VRXS <C7 A YLE T REX Description The message SOUP becomes VRXS when encrypted with an Advanced Caesar Cipher of four. The message A YLE becomes T REX when decrypted with an Advanced Caesar Cipher of seven. - Checkpoint 4 Rotor Cipher When encrypted, a rotor cipher performs three affine ciphers, with the output of the first affine cipher becoming the input of the second affine cipher and the output of the second cipher becoming the input of the third. In decryption, we decrypt our message through the third affine cipher, then the second, then the first. Alphabet First Affine Letter Map: ABCDEFGHIJKLMNOPQRSTUVWXYZ EKMFLGDQVZNTOWYHXUSPAIBRCJ Second Affine Letter Map: AJDKSIRUXBLHWTMCQGZNPYFVOE Third Affine Letter Map: Single Letter Examples: BDFHJLCPRTXVZNYEIWGAKMUSQO D is encrypted to R O is decrypted to S - the first letter map encrypts D to F - - the second letter map encrypts F to I the third letter map encrypts I to R Input Output >R BINGO BANGO BONGO VQLXY VGLXY VYLXY <R GSPLXPEO GOOPZVNP AVENGERS ASSEMBLE - - the third letter map decrypts 0 to Z the second letter map decrypts Z to S the first letter map decrypts S to S Description The rotor cipher encryption of BINGO BANGO BONGO is VQLXY VGLXY VYLXY. The rotor decryption of GSPLXPEO GOOPZVNP is AVENGERS ASSEMBLE. Checkpoint 3 - Affine Cipher When encrypted, each letter of the message is changed to another letter as determined by a letter map. For example, all A's could encrypt to E's. This would mean all E's decrypt to A's. In the diagram below, we see how to encrypt each letter by matching it to the corresponding letter below. To decrypt, we find the letter we are decrypting in the output map and translate it into the letter above in the input map. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: EKMFLGDQVZNTOWYHXUSPAIBRCJ Note: Use the above letter map for checkpoint 3. Single Letter Examples: H encrypts to Q. S decrypts to S. Input Output >A ABCDE XYZ EKMFL RCJ <A OERVOAO LGGYUP MAXIMUM EFFORT Description Applying an affine encryption on the message ABCDE XYZ becomes EKMFL RCJ. Applying an affine decryption on the message OERVOAO LGGYUP becomes MAXIMUM EFFORT. Checkpoint 4 - Rotor Cipher When encrypted, a rotor cipher performs three affine ciphers, with the output of the first affine cipher becoming the input of the second affine cipher and the output of the second cipher becoming the input of the third. In decryption, we decrypt our message through the third affine cipher, then the second, then the first. CHECKPOINTS Checkpoint 1 - Caesar Cipher When encrypted, each letter in the message steps forward one letter in the alphabet (A becomes B, B becomes C, etc). When decrypted, each letter in the message steps back one letter in the alphabet (0 becomes N, N becomes M, etc). An encrypted Z "wraps around” the alphabet and becomes an A. Similarly, a decrypted A "wraps around" the alphabet and becomes a Z. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: BCDEFGHIJKLMNOPQRSTUVWXYZA Input Output >C HELLO WORLD IFMMP XPSME <C IFMMP XPSME HELLO WORLD Description The message HELLO WORLD becomes IFMMP XPSME when encrypted with a Caesar Cipher. The message IFMMP XPSME becomes HELLO WORLD when decrypted with a Caesar Cipher. PROJECT INTERVIEW You will design a class which can encrypt and decrypt six different types of ciphers. The description and due date of each cipher are outlined in the table below. CHECKPOINT Checkpoint 1 Basic Caesar Cipher Checkpoint 2 Advanced Caesar Cipher Checkpoint 3 Affine Cipher Checkpoint 4 Rotor Cipher DESCRIPTION DUE DATE Each letter is shifted by 1. Each letter is shifted by a set. number. Each letter is mapped to another unique letter. Each letter is put through multiple affine ciphers. REQUIREMENTS User Input Loop o When run, your program will prompt the user for input. The users input will specify the type of encryption and the message to be encrypted or decrypted. All spaces in messages to be encrypted are preserved. o Your program will quit when prompted. Format Your entire program will be contained in a single java file called Enigma.java Your program should follow the design and format guidelines laid out by this course. Your program should be thoroughly and thoughtfully commented. Each program will have a commented header which includes your name, your period, and the checkpoint that is being turned in. You can assume all inputs will be capitalized. Checkpoint 2 - Advanced Caesar Cipher When encrypted, each letter in the message steps forward multiple letters in the alphabet (A encrypted by five becomes F). When decrypted, each letter in the message steps back multiple letters in the alphabet (Q decrypted by three becomes N). The user specifies how many many steps each letter is to be shifted (between 0 and 25). Letters encrypted beyond the end of the alphabet "wrap around" two the start. Letters decrypted beyond the start of the alphabet "wrap around" to the end. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: EFGHIJKLMNOPQRSTUVWXYZABCD Note: The input/output letter map above shows a shift of four. The letter maps would be different for shift of a different number. Input Output >C3 SOUP VRXS <C7 A YLE T REX Description The message SOUP becomes VRXS when encrypted with an Advanced Caesar Cipher of four. The message A YLE becomes T REX when decrypted with an Advanced Caesar Cipher of seven. - Checkpoint 4 Rotor Cipher When encrypted, a rotor cipher performs three affine ciphers, with the output of the first affine cipher becoming the input of the second affine cipher and the output of the second cipher becoming the input of the third. In decryption, we decrypt our message through the third affine cipher, then the second, then the first. Alphabet First Affine Letter Map: ABCDEFGHIJKLMNOPQRSTUVWXYZ EKMFLGDQVZNTOWYHXUSPAIBRCJ Second Affine Letter Map: AJDKSIRUXBLHWTMCQGZNPYFVOE Third Affine Letter Map: Single Letter Examples: BDFHJLCPRTXVZNYEIWGAKMUSQO D is encrypted to R O is decrypted to S - the first letter map encrypts D to F - - the second letter map encrypts F to I the third letter map encrypts I to R Input Output >R BINGO BANGO BONGO VQLXY VGLXY VYLXY <R GSPLXPEO GOOPZVNP AVENGERS ASSEMBLE - - the third letter map decrypts 0 to Z the second letter map decrypts Z to S the first letter map decrypts S to S Description The rotor cipher encryption of BINGO BANGO BONGO is VQLXY VGLXY VYLXY. The rotor decryption of GSPLXPEO GOOPZVNP is AVENGERS ASSEMBLE. Checkpoint 3 - Affine Cipher When encrypted, each letter of the message is changed to another letter as determined by a letter map. For example, all A's could encrypt to E's. This would mean all E's decrypt to A's. In the diagram below, we see how to encrypt each letter by matching it to the corresponding letter below. To decrypt, we find the letter we are decrypting in the output map and translate it into the letter above in the input map. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: EKMFLGDQVZNTOWYHXUSPAIBRCJ Note: Use the above letter map for checkpoint 3. Single Letter Examples: H encrypts to Q. S decrypts to S. Input Output >A ABCDE XYZ EKMFL RCJ <A OERVOAO LGGYUP MAXIMUM EFFORT Description Applying an affine encryption on the message ABCDE XYZ becomes EKMFL RCJ. Applying an affine decryption on the message OERVOAO LGGYUP becomes MAXIMUM EFFORT. Checkpoint 4 - Rotor Cipher When encrypted, a rotor cipher performs three affine ciphers, with the output of the first affine cipher becoming the input of the second affine cipher and the output of the second cipher becoming the input of the third. In decryption, we decrypt our message through the third affine cipher, then the second, then the first. CHECKPOINTS Checkpoint 1 - Caesar Cipher When encrypted, each letter in the message steps forward one letter in the alphabet (A becomes B, B becomes C, etc). When decrypted, each letter in the message steps back one letter in the alphabet (0 becomes N, N becomes M, etc). An encrypted Z "wraps around” the alphabet and becomes an A. Similarly, a decrypted A "wraps around" the alphabet and becomes a Z. Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ Output: BCDEFGHIJKLMNOPQRSTUVWXYZA Input Output >C HELLO WORLD IFMMP XPSME <C IFMMP XPSME HELLO WORLD Description The message HELLO WORLD becomes IFMMP XPSME when encrypted with a Caesar Cipher. The message IFMMP XPSME becomes HELLO WORLD when decrypted with a Caesar Cipher. PROJECT INTERVIEW You will design a class which can encrypt and decrypt six different types of ciphers. The description and due date of each cipher are outlined in the table below. CHECKPOINT Checkpoint 1 Basic Caesar Cipher Checkpoint 2 Advanced Caesar Cipher Checkpoint 3 Affine Cipher Checkpoint 4 Rotor Cipher DESCRIPTION DUE DATE Each letter is shifted by 1. Each letter is shifted by a set. number. Each letter is mapped to another unique letter. Each letter is put through multiple affine ciphers. REQUIREMENTS User Input Loop o When run, your program will prompt the user for input. The users input will specify the type of encryption and the message to be encrypted or decrypted. All spaces in messages to be encrypted are preserved. o Your program will quit when prompted. Format Your entire program will be contained in a single java file called Enigma.java Your program should follow the design and format guidelines laid out by this course. Your program should be thoroughly and thoughtfully commented. Each program will have a commented header which includes your name, your period, and the checkpoint that is being turned in. You can assume all inputs will be capitalized.
Expert Answer:
Answer rating: 100% (QA)
Based on your project requirements and the descriptions provided for the different types of ciphers Caesar Cipher Advanced Caesar Cipher Affine Cipher ... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
A credit card contains 16 digits. It also contains a month and year of expiration. Suppose there are one million users of a credit card with unique card numbers. A hacker randomly selects a 16 digit...
-
According to Michael Porter's "Five Forces" model, why do some firms earn higher profits than other firms?
-
The article Rinse Out Your Mouth (Associated Press, March 29, 2006) summarized results from a survey of 1001 adults on the use of profanity. When asked How many times do you use swear words in...
-
What are the main functions performed by mentors, and what effect do they have on protgs? Do you think organizations should implement formal mentoring programs or should they remain informal? What...
-
Mallett Manufacturing Co. expects to make 30,000 chairs during the 2011 accounting period. The company made 3,200 chairs in January. Materials and labor costs for January were $16,000 and $24,000,...
-
How does PostgreSQL's support for advanced full-text search capabilities through extensions like pg_trgm and tsearch improve search functionality and performance in applications requiring...
-
SAE specifications call for the low-side R-134a servicehose to be A) Solid blue with a black stripe B) Solid blue with no stripe C) Solid blue with a yellow stripe D) Solid black with a blue stripe...
-
Ten years ago, Emma purchased an investment for $22,500. The investment earned 7 percent interest each year. Using the equation method, what is the worth of the investment today??
-
While constructing a space platform, a 130kg robot is standing on a 23.0 m long, 255 kg steel beam that is floating in space, initially motionless relative to the platform and pointing South. Using...
-
Why do you think GAAP supports use of estimates in accounting, rather than requiring exact dollar amounts, for tracking AR?
-
Provide citations for any generated assets created with the AI tool and Canva.
-
What are the Partner Deployment options in Central Partner Dashboard?
-
How do poets utilize poetic devices such as symbolism, allegory, and allusion to create layers of meaning within their imagery, inviting readers to explore deeper connections between the literal and...
-
The Group Joe Silkman, Colin Cotton, and David Cloth met many years ago when they were each doing their plastering apprenticeships. Just after gaining their qualifications, they formed a plastering...
-
Let (X. A. p) be a measure space. Show that for any A,B A, we have the equality: (AUB)+(An B) = (A) + (B).
-
Place a BankAccount class in a package whose name is derived from your e-mail address, as described in Section 8.6. Keep the BankAccountTester class in the default package.
-
Write a class DataSet that stores a number of values of type double. Provide a constructor public DataSet(int maximumNumberOfValues) and a method public void add(double value) that adds a value,...
-
Write a program that opens a binary file and prints all ASCII characters from that file, that is, all bytes with values between 32 and 126. Print a new line after every 64 characters. What happens...
-
If you make multiple measurements of your height, you are likely to find that the results vary by nearly half an inch in either direction due to measurement error and actual variations in he ight....
-
Migrating geese tend to travel at approximately constant speed, flying in segments that are straight lines. A goose flies 32 km south, then turns to fly 20 km west. Afterward, how far is the goose...
-
Estimate the average speed, in m/s, with which the hair on your head grows. Make this estimate from your own experience noting, for instance, how often you cut your hair and how much you trim....
Study smarter with the SolutionInn App