Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Required Operations You must implement the following encryption schemes in this assignment. Note that the following descriptions often refer to the encodable / encryptable range,
Required Operations
You must implement the following encryption schemes in this assignment. Note that the following descriptions often refer to the "encodableencryptable range," which is defined by the Cipher. WIINCHAR lowest value in the range Cipher. WAXCHAR highest value in the range and Cipher. TOTALCHARS total number of characters within the range constants within cipher java
Substitution.java
grad Expand
The Substitution Cipher is likely the most commonly known encryption algorithm. It consists of assigning each input character a unique output character, ideally one that differs from the original, and replacing all characters from the input with the output equivalent when encrypting and viceversa when decrypting
In our implementation, this mapping between input and output will provided via a shifter string. The shifter will represent the output characters corresponding to the input character at the same relative position within the overall range of encodable characters defined by Cipher.MINCHAR and Cipher.MAXCHAR To picture this, we can vertically align this shifter string with the encryptable range and look at the corresponding columns to see the appropriate character mappings. Consider the following example:
Given the shifter string above, the plaintext "FAD" would be encrypted into "FGE" and the ciphertext "CGE"
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started