Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 1 of 3: The Caesar Cipher The use of codes (or ciphers) as a means of hiding the meaning of messages traces its roots

image text in transcribed

image text in transcribed

image text in transcribed

Part 1 of 3: The Caesar Cipher The use of codes (or ciphers) as a means of hiding the meaning of messages traces its roots to ancient history. The first known military use of codes was by Julius Caesar in 50 60 B.C. The Caesar cipher specified that each letter in the alphabet would be encoded using the letter three positions later in the alphabet. For example, 'a' would be encoded as 'd', 'b' would be encoded as 'e', 'c' would be encoded as 'f, and so on. The code wraps around at the end of the alphabet, so 'x', 'y' and 'z would be encoded as 'a 'b', and 'c', respectively. The complete mapping of letters is shown below. Caesar cipher: Abcdef ghijklmnopars tuvwxyz (original text) de fghijklmnopqrstuvwxyzabc (encoded text) A significant portion of your grade will be solid Object Oriented design using a Graphical User Interface. As a guide, you should develop a Cipher class, with private attributes, constructors, get and set methods, and both encode and decode methods for encoding or decoding secret messages. In part one these methods will encode and decode letters (both upper case and lower case) by shifting them three positions in the alphabet. Characters that are not letters should be left as is. For example, the encoding of a space or exclamation mark should be that same character unchanged You should create a CipherDriver class that instantiates a Cipher object and will be used to either: l. Read in an encrypted message from either the user or from a file specified by the user, and call on the Cipher class to decode the message 2. Encode a message and save it to a file, that can be decrypted later Part 1 of 3: The Caesar Cipher The use of codes (or ciphers) as a means of hiding the meaning of messages traces its roots to ancient history. The first known military use of codes was by Julius Caesar in 50 60 B.C. The Caesar cipher specified that each letter in the alphabet would be encoded using the letter three positions later in the alphabet. For example, 'a' would be encoded as 'd', 'b' would be encoded as 'e', 'c' would be encoded as 'f, and so on. The code wraps around at the end of the alphabet, so 'x', 'y' and 'z would be encoded as 'a 'b', and 'c', respectively. The complete mapping of letters is shown below. Caesar cipher: Abcdef ghijklmnopars tuvwxyz (original text) de fghijklmnopqrstuvwxyzabc (encoded text) A significant portion of your grade will be solid Object Oriented design using a Graphical User Interface. As a guide, you should develop a Cipher class, with private attributes, constructors, get and set methods, and both encode and decode methods for encoding or decoding secret messages. In part one these methods will encode and decode letters (both upper case and lower case) by shifting them three positions in the alphabet. Characters that are not letters should be left as is. For example, the encoding of a space or exclamation mark should be that same character unchanged You should create a CipherDriver class that instantiates a Cipher object and will be used to either: l. Read in an encrypted message from either the user or from a file specified by the user, and call on the Cipher class to decode the message 2. Encode a message and save it to a file, that can be decrypted later

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Databases Object Oriented Deductive Hypermedia Technologies

Authors: Kamran Parsaye, Mark Chignell, Setrag Khoshafian, Harry Wong

1st Edition

0471503452, 978-0471503453

More Books

Students also viewed these Databases questions

Question

What are the major social responsibilities of business managers ?

Answered: 1 week ago

Question

What are the skills of management ?

Answered: 1 week ago

Question

5. What decision-making model would you advocate to this person?

Answered: 1 week ago

Question

6. What data will she need?

Answered: 1 week ago

Question

1. How did you go about making your selection?

Answered: 1 week ago