Question: (python please) Part 1 - Normalize Text The first thing we will do is normalize our input message so that its easier to work with.

(python please)

Part 1 - Normalize Text

The first thing we will do is normalize our input message so that its easier to work with.

Write a method called normalizeText which does the following:

  • Removes all the spaces from your text
  • Remove any punctuation (. , : ; ! ? ( ) )
  • Turn all lower-case letters into upper-case letters
  • Return the result.

The call normalizeText(This is some eally\ great. (Text)!?)

should return THISISSOMEREALLYGREATTEXT

Part 2 - Obfuscation

Next, well be turning our text into Obish, a language game designed to let people who know the rules talk to each other privately (sort of like Pig Latin but less well-known). The rules for Obish are simple: you simply insert the syllable ob in front of every vowel sound. So mister ackerman becomes mobistober obackobermoban. With a little practice you can learn to speak this with your friends when you need to hide a conversation from outsiders. This part isnt really encryption, but it does make your message a little harder for people who arent in the know to understand.

Write a method called obify that takes a String parameter (the message to be obfuscated) and returns a string in which every vowel (A, E, I, O, U, Y) is preceded by the letters OB (be sure to use capital letters).

If we call obify on THISISSOMEREALLYGREATTEXT, it should return

THOBISOBISSOBOMOBEROBEOBALLOBYGROBEOBATTOBEXT

Note: In spoken Obish, you normally wouldnt put an ob in front of the double vowel sound EA in GREAT, but we want to keep our program simple so well insert OB in front of both vowels.

Part 3 - Unobfuscation

Write a method called unobify that takes a string in Obish and returns the string in the original language. So if you call:

plainText = unobify(OBI LOBIKOBE CHOBEOBESOBE)

then plainText would store I LIKE CHEESE.

Part 4 - Caesar Cipher

Next well be writing a Caesar Cipher. The Caesar cipher is just about the simplest encryption algorithm out there. A Caesar encryption "shifts" each individual character forward by a certain number or "key". Each letter in the alphabet is shifted to the letter in the alphabet that is "key" places past the original letter. With a shift value of +1, the string ILIKEZOOS would be rendered as JMJLFAPPT.

Write a method called caesarify that takes two parameters. The first argument is a string you want to encrypt, and the second is an integer that contains the shift value or "key". The function should return a string, which is the input string encrypted with the Caesar cypher using the shift value passed in its second argument. You may assume that the input string is normalized.

  • Note that the alphabet wraps around, so with a shift value of +1 the Z in ZOOS became an A.
  • You can also have negative shift values, which cause the alphabet to previous letters. With a -1 shift, the string ILIKEAPPLES would turn into HKHJDZOOKDR.

Use the code base from your text to shift the alphabet the distance passed by the user. Realize that by using functions and writing the code properly we can use the same function to encrypt and decrypt the phrase.

Part 5 - Codegroups

Traditionally, encrypted messages are broken into equal-length chunks, separated by spaces and called code groups.

Write a method called groupify which takes two parameters. The first parameter is the string that you want to break into groups. The second argument is the number of letters per group. The function will return a string, which consists of the input string broken into groups with the number of letters specified by the second argument. If there arent enough letters in the input string to fill out all the groups, you should pad the final group with xs. So groupify(HITHERE, 2) would return HI TH ER Ex.

  • You may assume that the input string is normalized.
  • Note that we use lower-case x here because it is not a member of the (upper-case) alphabet were working with. If we used upper-case X here we would not be able to distinguish between an X that was part of the code and a padding X.

Part 6 - Putting it all together

Write a function called main which takes three parameters: a string to be encrypted, an integer shift value, and a code group size. Your method should return a string which is its cyphertext equivalent.

The main method should start by asking the user to input:

  • Message to work with
  • Distance to shift the alphabet
  • Number of letters to group on
  • Whether they want to encrypt or decrypt the message

Your function should do the following when the user asks to encrypt:

  • Call normalizeText on the input string.
  • Call obify to obfuscate the normalized text.
  • Call caesarify to encrypt the obfuscated text.
  • Call groupify to break the cyphertext into groups of size letters.
  • Return the result

Decrypting will execute the following method.

Part 7 - Hacker Problem Decrypt (2 extra credit points)

Write a method called ungroupify which takes one parameter, a string containing space-separated groups, and returns the string without any spaces. So if you call ungroupify(THI SIS ARE ALL YGR EAT SEN TEN CEx) you will return THISISAREALLYGREATSENTENCE

Now call encryptString which takes three parameters: a string to be decrypted and the integer shift value used to decrypt the string (should be negative if a positive number was used to encrypt), and returns a string which contains the (normalized) plaintext. You can assume the string was encrypted by a call to encryptString().

So if you were to call

cyphertext = encryptString(Who will win the election?, 5, 3);

plaintext = decryptString(cyphertext, 5);

then youll get back the normalized input string WHOWILLWINTHEELECTION.

You should also call unobify with the partially decrypted string to remove the OBIs. Realize this is the opposite order used to encrypt the data. You are undoing the encryption steps.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!