Question: Required Operations You must implement the following encryption schemes in this assignment. Note that the following descriptions often refer to the encodable / encryptable range,

Required Operations
You must implement the following encryption schemes in this assignment. Note that the following descriptions often refer to the "encodable/encryptable range," which is defined by the Cipher. WIIN_CHAR (lowest value in the range), Cipher. WAX_CHAR (highest value in the range), and Cipher. TOTAL_CHARS (total number of characters within the range) constants within (cipher . java
Substitution.java
grad Expand
The Substitution Cipher is likely the most commonly known encryption algorithm. It consists of assigning each input character a unique output character, ideally one that differs from the original, and replacing all characters from the input with the output equivalent when encrypting (and vice-versa when decrypting).
In our implementation, this mapping between input and output will provided via a shifter string. The shifter will represent the output characters corresponding to the input character at the same relative position within the overall range of encodable characters (defined by Cipher.MIN_CHAR and Cipher.MAX_CHAR). To picture this, we can vertically align this shifter string with the encryptable range and look at the corresponding columns to see the appropriate character mappings. Consider the following example:
Given the shifter string above, the plaintext "FAD" would be encrypted into "FGE" and the ciphertext "CGE"
 Required Operations You must implement the following encryption schemes in this

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!