合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

        03CIT4057代做、代寫c++,Python編程
        03CIT4057代做、代寫c++,Python編程

        時間:2024-12-16  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯


         

        03CIT4057 Introduction to Computer Programming

        Project

        Overview:

        The project will be 30% of overall grade of the course.

        The project is done by team. Each team is formed by 3‑5 students.

        Background:

        In cryptography, a Caesar cipher is one of the simplest and most widely known encryption techniques. It is a

        type of substitution cipher in which each letter in the plaintext is replaced by a letter some ffxed number of

        positions down the alphabet.

        For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.

        The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three (A be‑

        coming D when encrypting, and D becoming A when decrypting) to protect messages of military signiffcance.

        While Caesar’s was the ffrst recorded use of this scheme, other substitution ciphers are known to have been

        used earlier.

        2Speciffcation:

        ‧ Decrypt a Caesar cipher encrypted text.

        ‧ The encrypted text is stored in a ffle.

        ‧ The program reads the ffle and shows the text after decryption.

        Bonus:

        ‧ Establish a web server which accepts the encrypted message and then present the decrypted text.

        Double bonus:

        ‧ In additional of the manual input, the webserver accepts encrytped text and returns the decrypted text

        in JSON format.

        Deliverables:

        Group work:

        For every item below, 1 group submits 1 copy only.

        1. The group should submit the source code to the GitHub group repository.

        2. Powerpoint for the presentation. The PPT SHOULD include the member list. The group should submit

        the PPT to the Blackboard.

        Individual work:

        For every item below, every student should submit 1 copy.

        3. Student must do a peer review for every member in the group. He/she should ffll the 360 review form and

        submit it to the Blackboard.

        3Due date

        All items mentioned in the Section Deliverables should be submitted on or before

        2024‑12‑18 23:59:59.

        Presentation:

        Each team will present their project in the last class.

        4Appendix A:

        Breaking The Cipher:

        To look for the “shift”, you need to know the following technique about cracking Caesar ciphers that has

        been around for over a thousand years.

        Any language such as English has a known distribution for each letter.

        For example,

        the letter “E” is the most common letter in English making up about 12% of the letters on average (ignoring

        case). The letter “T” is next (about 9%), followed by “A” ( about 8%), and so on. But the point is that only

        the order “E”, “T” and “A” does matter, not the percentage.

        The procedure begins by ffnding the most common letter. You can guess that the most common letter maps

        to “E.” You can now ffnd the “shift” from the most common letter in the cipher‑text to the expected most

        common letter “E”.

        For example,

        if the most common letter in the cipher‑text is “H”, you know that the shift from “E” to “H” is 3. You

        should check that the shift for the next most common letter “T”, and third most common letter “A” is also

        3. Once you know the shift, you can apply the shift to all the letters in the cipher‑text and get the original

        plain‑text message.

        What about spaces between words and punctuation?

        In the real world, there is no space or punctuation in a cipher‑text. The reason is that those are useful clues

        for deciphering.

        However, there are spaces in the cipher‑text for this project because they will be helpful for you to recognize

        that your deciphering is correct or not. But you will need to ignore spaces when counting letters (if you forget

        to ignore them, beware that the space will be the most common character).

        The suggested algorithm will be:

        1. Read the cipher‑text.

        2. Get a count of each character in the entire cipher‑text (ignore spaces).

        3. Find the most common character.

        4. Find the shift from “E” to that most common character.

        5. Check that the shift also works for the next most common.

        6. Using the shift, decode each character of the cipher‑text and print.

         

        請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp







         

        掃一掃在手機打開當前頁
      1. 上一篇:CS425FZ代做、代寫Java編程設計
      2. 下一篇:蘇州企業貸款需要哪些基本條件?
      3. ·代寫CHEE 4703、代做Java/Python編程設計
      4. ·代做INT2067、Python編程設計代寫
      5. ·CS 7280代做、代寫Python編程語言
      6. ·CSCI 201代做、代寫c/c++,Python編程
      7. ·代寫G6077程序、代做Python編程設計
      8. ·代做COMP SCI 7412、代寫Java,python編程
      9. ·代做COMP642、代寫Python編程設計
      10. ·代寫CSSE7030、代做Python編程設計
      11. · COMP338代做、python編程語言代寫
      12. ·代做3DA3 C02、Java/python編程代寫
      13. 合肥生活資訊

        合肥圖文信息
        出評 開團工具
        出評 開團工具
        挖掘機濾芯提升發動機性能
        挖掘機濾芯提升發動機性能
        戴納斯帝壁掛爐全國售后服務電話24小時官網400(全國服務熱線)
        戴納斯帝壁掛爐全國售后服務電話24小時官網
        菲斯曼壁掛爐全國統一400售后維修服務電話24小時服務熱線
        菲斯曼壁掛爐全國統一400售后維修服務電話2
        美的熱水器售后服務技術咨詢電話全國24小時客服熱線
        美的熱水器售后服務技術咨詢電話全國24小時
        海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
        海信羅馬假日洗衣機亮相AWE 復古美學與現代
        合肥機場巴士4號線
        合肥機場巴士4號線
        合肥機場巴士3號線
        合肥機場巴士3號線
      14. 上海廠房出租 短信驗證碼 酒店vi設計

        主站蜘蛛池模板: 国产品无码一区二区三区在线| 一区二区三区四区视频在线| 一区二区三区在线观看中文字幕| 国产高清不卡一区二区| 国偷自产视频一区二区久| 久久精品亚洲一区二区三区浴池| 国产精品一区二区三区免费| 国产香蕉一区二区三区在线视频| 日韩精品区一区二区三VR| 国产AV午夜精品一区二区入口| 国产福利电影一区二区三区,免费久久久久久久精 | 久久精品无码一区二区三区日韩| 中文字幕日韩欧美一区二区三区| 学生妹亚洲一区二区| 精品无人区一区二区三区在线| 无码精品国产一区二区三区免费 | 国产精品久久久久一区二区| 无码乱码av天堂一区二区| 国产短视频精品一区二区三区| 国产精品毛片一区二区三区| 中文字幕日韩人妻不卡一区| 久久久久人妻一区精品 | 亚洲av无码一区二区三区观看 | 亚洲综合激情五月色一区| 99久久人妻精品免费一区| 亚洲无圣光一区二区| 2022年亚洲午夜一区二区福利| 亚洲午夜精品一区二区公牛电影院 | 亚洲av色香蕉一区二区三区蜜桃 | 久久婷婷久久一区二区三区| 蜜桃传媒视频麻豆第一区| 欧洲无码一区二区三区在线观看 | 99国产精品欧美一区二区三区 | 国产美女精品一区二区三区| 日韩一区二区电影| 国产精品分类视频分类一区| 无码一区二区三区AV免费| 一区二区国产在线观看| 国产一区二区内射最近更新| 激情内射亚洲一区二区三区爱妻| 精品动漫一区二区无遮挡|