Question: The following must be written in python. Write a python program A which runs on computer A. Program A reads a provided text file called

The following must be written in python.

Write a python program A which runs on computer A. Program A reads a provided text file called Input.dat. You are first required to remove all spaces and punctuation characters from this text file and write it to a new file called Clean.dat, which should contain only lowercase letters. Program A is required to generate 100 random characters which are written to a file key.dat.

Program A is then required to use the Vigenere cipher to encrypt the Clean.dat file with the key from the key.dat file and write the result to a file called Encrypt.dat. Program A is required to send the key.dat file on a designated port for key communication, to machine B running program B. Finally, program A is required to send the Encrypt.dat file on a designated port for data communication, to machine B running program B.

Program B is required to accept the key.dat file on a designated port for key communication with machine A running program A. Similarly, Program B is required to accept the Encrypt.dat file on a designated port for data communication with machine A running program A.

Furthermore, program B is required to use the key to decrypt the Encrypt.dat file and display the result to the screen, in addition to writing it to a file called Decrypt.dat.

Include relevant documentation in your programs.

Use Socket Port = 2500 for transmission of key

Use Socket Port = 2501 for transmission of data

Include a screen shot of the output of Program B.

The following is the 'Input.dat' file:

Hacking can be used as a good way to check a computers sustainability to dangers through networks and the internet. Computer security and hacking are two important issues discussed and important element of safety precaution when using a computer. These operating systems run on computers to ensure the safety of personal and financial information, along with protection. Computer security can be a very useful component to acquire. If an unknown user tries to access a computer database, computer security will ensure that that user will not be let in. Besides keeping unknown users out of others computer databases, computer security also provides protection from harmful threats and viruses. Once these viruses find their way onto a users computer, information and control access can be stolen. There are significant advantages and disadvantages of having a strong computer system, one advantage being protection from viruses and other harmful attacks. Hacking has found its way into the world of computers. Hacking can be destructive, harmful, and can have some bad impact on peoples lives. If a computer system is not protected by a security operating system, hackers can find their way into that database easily. Once in, hackers can obtain personal, financial, and important information. This can cause ruin in a users business and personal life, and much more. While being branded a bad thing, hacking can help many as well. Some hackers are able to test the reliability of a computers security system, to find weak spots in the barrier. Like computer security, hacking can have both costs, but benefits too. The purpose of this report is to allow computer users to gain insight on the aspects of computer security and the ethical issue of hacking. Computer security can allow users to feel comfortable knowing their personal information is being kept hidden. But even with a high-level computer security system, one is still vulnerable to a hacking intrusion. A computer users private information, such as social security, credit card numbers, passwords, email addresses, and other information is at risk to being taken.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!