合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

        03CIT4057代做、代寫(xiě)c++,Python編程
        03CIT4057代做、代寫(xiě)c++,Python編程

        時(shí)間:2024-12-16  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)


         

        03CIT4057 Introduction to Computer Programming

        Project

        Overview:

        The project will be 30% of overall grade of the course.

        The project is done by team. Each team is formed by 3‑5 students.

        Background:

        In cryptography, a Caesar cipher is one of the simplest and most widely known encryption techniques. It is a

        type of substitution cipher in which each letter in the plaintext is replaced by a letter some ffxed number of

        positions down the alphabet.

        For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.

        The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three (A be‑

        coming D when encrypting, and D becoming A when decrypting) to protect messages of military signiffcance.

        While Caesar’s was the ffrst recorded use of this scheme, other substitution ciphers are known to have been

        used earlier.

        2Speciffcation:

        ‧ Decrypt a Caesar cipher encrypted text.

        ‧ The encrypted text is stored in a ffle.

        ‧ The program reads the ffle and shows the text after decryption.

        Bonus:

        ‧ Establish a web server which accepts the encrypted message and then present the decrypted text.

        Double bonus:

        ‧ In additional of the manual input, the webserver accepts encrytped text and returns the decrypted text

        in JSON format.

        Deliverables:

        Group work:

        For every item below, 1 group submits 1 copy only.

        1. The group should submit the source code to the GitHub group repository.

        2. Powerpoint for the presentation. The PPT SHOULD include the member list. The group should submit

        the PPT to the Blackboard.

        Individual work:

        For every item below, every student should submit 1 copy.

        3. Student must do a peer review for every member in the group. He/she should ffll the 360 review form and

        submit it to the Blackboard.

        3Due date

        All items mentioned in the Section Deliverables should be submitted on or before

        2024‑12‑18 23:59:59.

        Presentation:

        Each team will present their project in the last class.

        4Appendix A:

        Breaking The Cipher:

        To look for the “shift”, you need to know the following technique about cracking Caesar ciphers that has

        been around for over a thousand years.

        Any language such as English has a known distribution for each letter.

        For example,

        the letter “E” is the most common letter in English making up about 12% of the letters on average (ignoring

        case). The letter “T” is next (about 9%), followed by “A” ( about 8%), and so on. But the point is that only

        the order “E”, “T” and “A” does matter, not the percentage.

        The procedure begins by ffnding the most common letter. You can guess that the most common letter maps

        to “E.” You can now ffnd the “shift” from the most common letter in the cipher‑text to the expected most

        common letter “E”.

        For example,

        if the most common letter in the cipher‑text is “H”, you know that the shift from “E” to “H” is 3. You

        should check that the shift for the next most common letter “T”, and third most common letter “A” is also

        3. Once you know the shift, you can apply the shift to all the letters in the cipher‑text and get the original

        plain‑text message.

        What about spaces between words and punctuation?

        In the real world, there is no space or punctuation in a cipher‑text. The reason is that those are useful clues

        for deciphering.

        However, there are spaces in the cipher‑text for this project because they will be helpful for you to recognize

        that your deciphering is correct or not. But you will need to ignore spaces when counting letters (if you forget

        to ignore them, beware that the space will be the most common character).

        The suggested algorithm will be:

        1. Read the cipher‑text.

        2. Get a count of each character in the entire cipher‑text (ignore spaces).

        3. Find the most common character.

        4. Find the shift from “E” to that most common character.

        5. Check that the shift also works for the next most common.

        6. Using the shift, decode each character of the cipher‑text and print.

         

        請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp







         

        掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
      1. 上一篇:CS425FZ代做、代寫(xiě)Java編程設(shè)計(jì)
      2. 下一篇:蘇州企業(yè)貸款需要哪些基本條件?
      3. ·代寫(xiě)CHEE 4703、代做Java/Python編程設(shè)計(jì)
      4. ·代做INT2067、Python編程設(shè)計(jì)代寫(xiě)
      5. ·CS 7280代做、代寫(xiě)Python編程語(yǔ)言
      6. ·CSCI 201代做、代寫(xiě)c/c++,Python編程
      7. ·代寫(xiě)G6077程序、代做Python編程設(shè)計(jì)
      8. ·代做COMP SCI 7412、代寫(xiě)Java,python編程
      9. ·代做COMP642、代寫(xiě)Python編程設(shè)計(jì)
      10. ·代寫(xiě)CSSE7030、代做Python編程設(shè)計(jì)
      11. · COMP338代做、python編程語(yǔ)言代寫(xiě)
      12. ·代做3DA3 C02、Java/python編程代寫(xiě)
      13. 合肥生活資訊

        合肥圖文信息
        挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
        挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
        戴納斯帝壁掛爐全國(guó)售后服務(wù)電話24小時(shí)官網(wǎng)400(全國(guó)服務(wù)熱線)
        戴納斯帝壁掛爐全國(guó)售后服務(wù)電話24小時(shí)官網(wǎng)
        菲斯曼壁掛爐全國(guó)統(tǒng)一400售后維修服務(wù)電話24小時(shí)服務(wù)熱線
        菲斯曼壁掛爐全國(guó)統(tǒng)一400售后維修服務(wù)電話2
        美的熱水器售后服務(wù)技術(shù)咨詢電話全國(guó)24小時(shí)客服熱線
        美的熱水器售后服務(wù)技術(shù)咨詢電話全國(guó)24小時(shí)
        海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
        海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
        合肥機(jī)場(chǎng)巴士4號(hào)線
        合肥機(jī)場(chǎng)巴士4號(hào)線
        合肥機(jī)場(chǎng)巴士3號(hào)線
        合肥機(jī)場(chǎng)巴士3號(hào)線
        合肥機(jī)場(chǎng)巴士2號(hào)線
        合肥機(jī)場(chǎng)巴士2號(hào)線
      14. 幣安app官網(wǎng)下載 短信驗(yàn)證碼 丁香花影院

        關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

        Copyright © 2024 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
        ICP備06013414號(hào)-3 公安備 42010502001045

        主站蜘蛛池模板: 国产精品被窝福利一区| 国产美女在线一区二区三区| 中文字幕一区在线| tom影院亚洲国产一区二区| 亚洲Av无码国产一区二区| 国产福利电影一区二区三区| 看电影来5566一区.二区| 成人毛片无码一区二区| 色偷偷av一区二区三区| 好看的电影网站亚洲一区| 香蕉在线精品一区二区| 日韩动漫av在线播放一区| 波多野结衣中文字幕一区二区三区| 精品一区二区在线观看| 国产午夜三级一区二区三| 中文字幕人妻无码一区二区三区| 精品一区二区三区视频在线观看 | 冲田杏梨AV一区二区三区| 成人丝袜激情一区二区| 冲田杏梨高清无一区二区| 国产精品无圣光一区二区| 无码精品黑人一区二区三区| 人妻体体内射精一区二区| 日本一区二区在线播放| 国产成人无码精品一区不卡| 亚洲av片一区二区三区| 一区二区在线视频| 琪琪see色原网一区二区| 中文字幕色AV一区二区三区| 亚洲一区影音先锋色资源| 最新中文字幕一区二区乱码| 亚洲一区二区三区香蕉| 国精产品999一区二区三区有限| 亚洲av午夜精品一区二区三区| 亚洲一区二区三区AV无码| 国产精品成人一区二区三区| 日韩精品无码免费一区二区三区| 国产亚洲福利精品一区二区| 91久久精品国产免费一区| 国产在线无码一区二区三区视频 | 日韩人妻无码一区二区三区|