Create a python program that takes as a cipher-text

Assignment Help Computer Engineering
Reference no: EM132112801

Python - Cryptograpy - Please include all #comments in before each row.

Cryptography is the science of making messages secure, of transforming readable messages into unreadable messages and back again. Messages that are unreadable are called cipher-text. The process of turning plaintext into cipher-text is called encryption. The reverse process of turning cipher-text into plaintext is called decryption.

One of the easiest ways to encrypt a message is to scramble the letters. For example, the word "apple" could be randomly transformed to "lapep." In fact, there are 120 different possible arrangements of the word "apple."

However, if the encryption algorithm randomly scrambles the letters, the task of the decryption algorithm is pretty hard. Encryption and decryption algorithms must work together in some agreed upon way, with the encryption algorithm scrambling letters and the decryption algorithm unscrambling them.

A transposition cipher is one way to scramble the letters of a message. The cipher separates the message into two groups of characters: the first group composed of the even-numbered characters and the second group composed of the odd-numbered characters.

To produce the cipher-text, the cipher puts together both groups; placing the group of the even-numbered characters first, followed by the group of odd-numbered characters. This encryption results in a string with the characters shuffled to new positions.

a) Write a python program that takes a message,encrypts the message as described above and returns the cipher-text.

b) Write a python program that takes as a cipher-text, decrypts the cipher-text as described above and returns the message.

Reference no: EM132112801

Questions Cloud

Current and future state of the management : BN305 - Virtual Private Network - Describe architectural VPN design for small, medium and large businesses and corporations
Calculate the amount of money a person would earn : Write a program that calculates the amount of money a person would earn over a period of time if their salary is one penny the first day, two pennies.
Write a test program that creates two fan objects : Write a test program that creates two Fan objects. A one-argument constructor that creates fan. provide speed value.
Write two versions of a factorial function : You need to write a few functions in Python. Write two versions of a factorial function.
Create a python program that takes as a cipher-text : Write a python program that takes as a cipher-text, decrypts the cipher-text as described above and returns the message.
Write a program that plays the tic-tac-toe game : Write a program that plays the tic-tac-toe game. Two players take turns clicking an available cell in a 3 x 3 grid with their respective tokens .
Prevent loss of revenue due to used product markets : Suppose that in order to prevent loss of revenue due to used product markets, smart phone providers successfully lobby the government to make it illegal to buy
Display the amounts after the first five years : When money is invested at 5% interest compounded annually, the amount at the end of each year is 1.05 times the amount at the beginning of that year.
Write the three functions to implement the linear : Write the three functions to implement the linear cipher below, these were shift ciphers.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Vulnerabilities of routers and web servers

Explain the vulnerabilities of routers and the Web servers and remediation strategies which will make them more secure.

  Write the program in java

Write the program in Java (with a graphical user interface) so that it would allow the user to select which way they want to calculate a mortgage: by input of the amount of the mortgage.

  Write a function that will interchange the top polynomials

Write a function that will interchange the top two polynomials on the stack, and include this capability as a new command.

  Realize the circuit using a rom

A circuit has four inputs RSTU and four outputs VWYZ. RSTU represents a binarycoded- decimal digit. VW represents the quotient and YZ the remainder when RSTU. Realize the circuit using a ROM

  Design the program in vb.net with a graphical user interface

Write down the program in VB.NET (not Web based) with a graphical user interface. Have the user input the amount in one currency and give him a choice to either specify a currency to convert to OR calculate results for all available currency conve..

  Draw a behavioral state machine diagram

Draw a behavioral state machine diagram that describes the various states that a travel authorization can have through its approval process. A travel authorization form is used in most companies to approve travel expenses for employees.

  Write down a c program that takes an integer argument

Write a C program that takes an integer argument from command line and outputs the sum of all digits of the integer. For in case , the result of the invocation sum of digits 12345 should be 15.

  Improve the performance of the set associative cache

Assume the cache miss penalty is 10ns. We want to use way prediction to improve the performance of the set associative cache

  Questionyou have been hired out as a contractor to dover

questionyou have been hired out as a contractor to dover leasing company. dover leasing is in a process of reviewing

  Define all types of travel related cybersecurity issues

What types of travel related cybersecurity issues and concerns did the managers discuss? (write about these in your blog entry)

  Write and run a sample ecmascript program

Write and run a sample ECMASCRIPT program using the MicroSoft Windows operating systemm.

  Which computer platforms are the safest

Which computer platforms are the safest? Why is adaptive security important? Note that the requirement is to post your initial response no later than Wednesday.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd