合肥生活安徽新闻合肥交通合肥房产生活服务合肥教育合肥招聘合肥旅游文化艺术合肥美食合肥地图合肥社保合肥医院企业服务合肥法律

03CIT4057代做、代写c++,Python编程
03CIT4057代做、代写c++,Python编程

时间:2024-12-16  来源:合肥网hfw.cc  作者:hfw.cc 我要纠错


 

03CIT4057 Introduction to Computer Programming

Project

Overview:

The project will be 30% of overall grade of the course.

The project is done by team. Each team is formed by 3‑5 students.

Background:

In cryptography, a Caesar cipher is one of the simplest and most widely known encryption techniques. It is a

type of substitution cipher in which each letter in the plaintext is replaced by a letter some ffxed number of

positions down the alphabet.

For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.

The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three (A be‑

coming D when encrypting, and D becoming A when decrypting) to protect messages of military signiffcance.

While Caesar’s was the ffrst recorded use of this scheme, other substitution ciphers are known to have been

used earlier.

2Speciffcation:

‧ Decrypt a Caesar cipher encrypted text.

‧ The encrypted text is stored in a ffle.

‧ The program reads the ffle and shows the text after decryption.

Bonus:

‧ Establish a web server which accepts the encrypted message and then present the decrypted text.

Double bonus:

‧ In additional of the manual input, the webserver accepts encrytped text and returns the decrypted text

in JSON format.

Deliverables:

Group work:

For every item below, 1 group submits 1 copy only.

1. The group should submit the source code to the GitHub group repository.

2. Powerpoint for the presentation. The PPT SHOULD include the member list. The group should submit

the PPT to the Blackboard.

Individual work:

For every item below, every student should submit 1 copy.

3. Student must do a peer review for every member in the group. He/she should ffll the 360 review form and

submit it to the Blackboard.

3Due date

All items mentioned in the Section Deliverables should be submitted on or before

2024‑12‑18 23:59:59.

Presentation:

Each team will present their project in the last class.

4Appendix A:

Breaking The Cipher:

To look for the “shift”, you need to know the following technique about cracking Caesar ciphers that has

been around for over a thousand years.

Any language such as English has a known distribution for each letter.

For example,

the letter “E” is the most common letter in English making up about 12% of the letters on average (ignoring

case). The letter “T” is next (about 9%), followed by “A” ( about 8%), and so on. But the point is that only

the order “E”, “T” and “A” does matter, not the percentage.

The procedure begins by ffnding the most common letter. You can guess that the most common letter maps

to “E.” You can now ffnd the “shift” from the most common letter in the cipher‑text to the expected most

common letter “E”.

For example,

if the most common letter in the cipher‑text is “H”, you know that the shift from “E” to “H” is 3. You

should check that the shift for the next most common letter “T”, and third most common letter “A” is also

3. Once you know the shift, you can apply the shift to all the letters in the cipher‑text and get the original

plain‑text message.

What about spaces between words and punctuation?

In the real world, there is no space or punctuation in a cipher‑text. The reason is that those are useful clues

for deciphering.

However, there are spaces in the cipher‑text for this project because they will be helpful for you to recognize

that your deciphering is correct or not. But you will need to ignore spaces when counting letters (if you forget

to ignore them, beware that the space will be the most common character).

The suggested algorithm will be:

1. Read the cipher‑text.

2. Get a count of each character in the entire cipher‑text (ignore spaces).

3. Find the most common character.

4. Find the shift from “E” to that most common character.

5. Check that the shift also works for the next most common.

6. Using the shift, decode each character of the cipher‑text and print.

 

请加QQ:99515681  邮箱:99515681@qq.com   WX:codinghelp







 

扫一扫在手机打开当前页
  • 上一篇:CS425FZ代做、代写Java编程设计
  • 下一篇:苏州企业贷款需要哪些基本条件?
  • ·代写CHEE 4703、代做Java/Python编程设计
  • ·代做INT2067、Python编程设计代写
  • ·CS 7280代做、代写Python编程语言
  • ·CSCI 201代做、代写c/c++,Python编程
  • ·代写G6077程序、代做Python编程设计
  • ·代做COMP SCI 7412、代写Java,python编程
  • ·代做COMP642、代写Python编程设计
  • ·代写CSSE7030、代做Python编程设计
  • · COMP338代做、python编程语言代写
  • ·代做3DA3 C02、Java/python编程代写
  • 合肥生活资讯

    合肥图文信息
    戴纳斯帝壁挂炉全国售后服务电话24小时官网400(全国服务热线)
    戴纳斯帝壁挂炉全国售后服务电话24小时官网
    菲斯曼壁挂炉全国统一400售后维修服务电话24小时服务热线
    菲斯曼壁挂炉全国统一400售后维修服务电话2
    美的热水器售后服务技术咨询电话全国24小时客服热线
    美的热水器售后服务技术咨询电话全国24小时
    海信罗马假日洗衣机亮相AWE  复古美学与现代科技完美结合
    海信罗马假日洗衣机亮相AWE 复古美学与现代
    合肥机场巴士4号线
    合肥机场巴士4号线
    合肥机场巴士3号线
    合肥机场巴士3号线
    合肥机场巴士2号线
    合肥机场巴士2号线
    合肥机场巴士1号线
    合肥机场巴士1号线
  • 币安app官网下载 短信验证码

    关于我们 | 打赏支持 | 广告服务 | 联系我们 | 网站地图 | 免责声明 | 帮助中心 | 友情链接 |

    Copyright © 2024 hfw.cc Inc. All Rights Reserved. 合肥网 版权所有
    ICP备06013414号-3 公安备 42010502001045