Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

JAVA COSC 211, Machine Problem #1 50 points Due 01/18/2023 For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their

JAVA COSC 211, Machine Problem #1 50 points Due 01/18/2023 "For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their best to reveal them." - taken from Code Book, The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography by Simon Singh. The idea for this machine problem came from this book. You will encrypt and decrypt some messages using a simplified version of a code in the book. The convention in cryptography is to write the plain text in lower case letters and the encrypted text in upper case letters. We will follow this convention for this machine problem. We will only encrypt/decrypt letters. Any other character will be left as is (i.e. 1 2 3., etc.). For simplicity we will exclude the letter 'Z' from the alphabet (see below). The method of encryption used here is a simple substitution cipher that depends on the sender and receiver of the message agreeing on a keyword, which is usually just one word that will be easy to remember. Thus, the key for decrypting the message will not have to be written down and is less likely to fall into enemy hands! First, the program must read in a keyword, which will be all capital letters. The letters of the keyword must be inserted in the order in which they occur into a 5x5 two-dimensional array by rows, but if a letter is repeated in the keyword it is only used once in the two-dimensional array. Then the array is filled up with the remaining letters of the alphabet in order (excluding the 'Z'). e.g. if the keyword was PHENOMENON the array would contain the following: P H E N O M A B C D F G I J K L Q R S T U V W X Y Next, the program will read in a series of lines containing either messages to encrypt or decrypt. A plain text message will be encrypted as follows: Each letter in the message will be found in the table, and the row and column will be noted: e.g. 'g' (when converted to upper case) occurs at row 2, column 1 in the above array. (Remember that indexes start at 0 in JAVA). It will then be encrypted by reversing the row and column values, so that 'g' (row 2 column 1) will become the character at row 1, column 2, i.e. 'B' in the encrypted message. Thus if the message was "good luck" it will be encrypted as "BUUV NOQW" Spaces between words will be maintained exactly as they appear in the message. A message that is already encrypted can be decrypted using exactly the same algorithm the only difference is that the incoming message will be in upper case and the decrypted message will be in lower case. You should process a file that contains the following, the first line has the secret word and each line after that is either Decrypt or Encrypt. HAPPINESS (is the secret word will be used) D EVDEUOA XC GCERVLEWQ, FESS BC EUV OCWWAOX XLC HNUVRAV VCWWERS E hello there. D HAWWC XHARA E attack at dawn. D IAAX IA NUVAR HEIIARSIMXH GRMVBA E the meeting is in san francisco.

D XHA EUSLAR XC XHA PMRSX KNASXMCU CU XHA PMUEW IEY GA XRNA CR MX IEY GA PEWSA E the answer to the first question on the final may be true or it may be false. D OCUBREXNWEXMCUS YCN IEVA MX XHRCNBH XHMS IEOHMUA FRCGWAI E advance to boardwalk, pass go and collect two hundred dollars. E zorro is back (in town) be careful, there is a z in here. E you ain't nothing but a hound dog. E no computer will ever need more than 640k of memory -- bill gates in the mid eighties. D YCN EMUX UCXHMUB GNX E HCNUV VCB D CUA VEY E OCIFNXAR LMWW LAMBH WASS XHEU E XCU --- FCFNWER IAOHEUMOS 1948 D UC OCIFNXAR LMWW ADAR UAAV ICRA XHEU 640Q CP IAICRY -- GMWW BEXAS MU XHA IMV AMB HXMAS E the attack will start in $"population" minutes. This file has the keyword on the first line, then a series of lines beginning with 'E' (for encrypt) or 'D' (for decrypt), then exactly one space, and then the message to be either encrypted or decrypted. The program should read these lines until it comes to the end of the file. The output should echo all the data, print out the two dimensional array as above, and print out the messages and their encoded equivalents (in either upper case (encrypting output) or lower case(decrypting output)). So the first few lines of output on the above program would be something like: keyword is HAPPINESS **************************************** EVDEUOA XC GCERVLEWQ, FESS BC EUV OCWWAOX XLC HNUVRAV VCWWERS decrypts to: advance to boardwalk, pass go and collect two hundred dollars **************************************** hello there. encrypts to HAWWC XHARA. **************************************** HAWWC XHARA decrypts to: hello there **************************************** attack at dawn encrypts to EXXEOQ EX VELU **************************************** IAAX IA NUVAR HEIIARSIMXH GRMVBA decrypts to: meet me under hammersmith bridge ....... Have fun!! Requirements: 1.) Break up the problem into smaller modules and get each one working before going on to the next. i.e. concentrate first on how to build the two-dimensional array. 2.) Make sure you print out your 5x5 table using the key read from the file.

General Rubric for programming assignments - Comments/proper identification/indentation o Add name(s) of all authors, class, assignment #, and purpose to the program (5 points) o Use additional comments explaining your steps at least once every five lines. (5 points) o Use proper indentation (5 points) - Compilation/execution o Program must compile without syntax errors. You will get 0% score if it does not compile. You should be able to at least fix all the syntax errors in your program. o If you do not submit the output, then you don't get a grade. o The output can be a file or a screen print of the output. In this case, it should be a text file. o Program must execute and yield the correct output. o You may get less than 50% of the total score if your program does not give the correct output. Make sure to test it with any given test data and that the output is as specified in the assignment.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DB2 Universal Database V7.1 Application Development Certification Guide

Authors: Steve Sanyal, David Martineau, Kevin Gashyna, Michael Kyprianou

1st Edition

0130913677, 978-0130913678

More Books

Students also viewed these Databases questions

Question

b. What groups were most represented? Why do you think this is so?

Answered: 1 week ago