Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write program classes in java that follow description: Before you begin, DOWNLOAD the additional files for this lab (Cipher.java and View.java) using the Lab9 Data

Write program classes in java that follow description:

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Before you begin, DOWNLOAD the additional files for this lab (Cipher.java and View.java) using the "Lab9 Data Files.zip" link within the assignment directions in Canvas. You will be modifying these two classes in addition to creating a third (Lab9.java) that will be the controller portion of the program. In this lab you will be creating an application that encrypts/decrypts a message using a rotation cipher. A rotation cipher has an integer key, such that when you encrypt a message, each letter of the message is shifted to the right key-letters in the alphabet. Similarly, when you decrypt an encrypted message, each letter of the encrypted message is shifted to the left key-letters in the alphabet. If shifting would go past the end of the alphabet, you must wrap back around to the front (or end, if decrypting) of the alphabet, as necessary. For example encrypting "tree" with a key of 10 yields "dboo". If this lab, assume that the message will be all lowercase words with no special characters and assume the key will be from 0-25. 'a' maps to 97 in ASCII and 'z' maps to 122. So, if the key was 1, 'a'+ 1-b' (4) % 26--4 Hint/Reminder: (-32) % 26--6 32 % 26-6 Before you begin, DOWNLOAD the additional files for this lab (Cipher.java and View.java) using the "Lab9 Data Files.zip" link within the assignment directions in Canvas. You will be modifying these two classes in addition to creating a third (Lab9.java) that will be the controller portion of the program. In this lab you will be creating an application that encrypts/decrypts a message using a rotation cipher. A rotation cipher has an integer key, such that when you encrypt a message, each letter of the message is shifted to the right key-letters in the alphabet. Similarly, when you decrypt an encrypted message, each letter of the encrypted message is shifted to the left key-letters in the alphabet. If shifting would go past the end of the alphabet, you must wrap back around to the front (or end, if decrypting) of the alphabet, as necessary. For example encrypting "tree" with a key of 10 yields "dboo". If this lab, assume that the message will be all lowercase words with no special characters and assume the key will be from 0-25. 'a' maps to 97 in ASCII and 'z' maps to 122. So, if the key was 1, 'a'+ 1-b' (4) % 26--4 Hint/Reminder: (-32) % 26--6 32 % 26-6

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

4. Explain the strengths and weaknesses of each approach.

Answered: 1 week ago