Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a python program A which runs on computer A. Program A reads a provided text file called Assignment1_Input.dat which contains text of approximately 2500

Write a python program A which runs on computer A. Program A reads a provided text file called Assignment1_Input.dat which contains text of approximately 2500 words. You are first required to remove all spaces and punctuation characters from this text file and write it to a new file called Assignment1_Clean.dat, which should contain only lowercase letters. Program A is required to generate 100 random characters which are written to a file key.dat. Program A is then required to use the Vigenere cipher to encrypt the Assignment1_Clean.dat file with the key from the key.dat file and write the result to a file called Assignment1_Encrypt.dat. Program A is required to send the key.dat file on a designated port for key communication, to machine B running program B. Finally, program A is required to send the Assignment1_Encrypt.dat file on a designated port for data communication, to machine B running program B. Program B is required to accept the key.dat file on a designated port for key communication with machine A running program A. Similarly, Program B is required to accept the Assignment1_Encrypt.dat file on a designated port for data communication with machine A running program A. Furthermore, program B is required to use the key to decrypt the Assignment1_Encrypt.dat file and display the result to the screen, in addition to writing it to a file called Assignment1_Decrypt.dat. [Note: Any program A, from a given student, should be able to work with any program B, from another student, and vice versa. This allows students to test their programs in a group of at least two persons. However, each student MUST write program A and B] Include relevant documentation in your submitted programs. Use Socket Port = 2500 for transmission of key Use Socket Port = 2501 for transmission of data

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases DeMYSTiFieD

Authors: Andy Oppel

2nd Edition

0071747990, 978-0071747998

More Books

Students also viewed these Databases questions

Question

What is the basis for Security Concerns in Cloud Computing?

Answered: 1 week ago

Question

Describe the three main Cloud Computing Environments.

Answered: 1 week ago