Reference no: EM131252488
Assignment - The Enigma Machine
Background
The Enigma machine (https://en.wikipedia.org/wiki/Enigma_machine) was an electro-mechanical cipher engine that was used extensively by the German military in World War 2.
The Allies were eventually able to crack the codes generated by Enigma - a feat that gave the Allies a significant advantage in the latter half of the war.
The efforts to crack the Enigma machine started in Poland, but were most famously run at Bletchley Park (https://en.wikipedia.org/wiki/Bletchley_Park).
Alan Turing (https://en.wikipedia.org/wiki/Alan_Turing) was part of the team to break Enigma.
These efforts also resulted in the construction of the world's first electro-mechanical computer - the Bomba (https://en.wikipedia.org/wiki/Bomba_(cryptography)).
There were some weaknesses in the design of the Enigma machine, foremost among them being that a letter could never be encrypted to itself. For example, if the operator pressed the A key, it was impossible for this to light up the A lamp. This weakness allowed Allied cryptographers to limit their search space.
Due to the design of the Enigma machine, encoding and decoding a message used the same process. If the Enigma machine was initialized to the same settings as the machine than encoded a message, typing the coded message into it would result in the original text. You can use this "round trip" quality to test your code as you build your solution.
Requirements
You are required to write a program that can read from standard input and encode or decode a message using a simplified version of the Enigma machine.
1. Your program must first accept between one and three space delimited codewheel identifiers. Valid identifiers are I, II, III, IV, V.
2. Your program must then accept the corresponding number of rotor starting positions. Valid starting positions are A-Z.
3. Your program must then accept the message to be encoded. Spaces are to be replaced with the letter X.
4. Your program must encode the message, and print it to standard output.
Attachment:- Assignment.rar
Risk assessment methodology
: Propose a risk assessment methodology which can be used along with the company you chose for Case Study Phase 1. During Case Study Phase one, I chose the New York Presbyterian Hospital and now I have to come up with a risk assessment methodology ..
|
Track auser account for a members only website
: Write the Java file to define a class named Account. This class will be used to track auser account for a members only website.Think about what attributes are needed. You can use your own web accounts (like onlinegaming accounts and Facebook)
|
Identify and discuss the different ways that the civil war
: List five (5) specific groups that were affected by industrialization. Provide two (2) examples for each group describing how the group was affected. (Consider issues such as race, ethnicity, gender, child labor, etc.)
|
What challenges might a german leader have faced
: What contributed to Wal-Mart CEO Rob Tairk's failure to successfully lead Wal-Mart's German operations? What challenges might a German leader have faced?
|
Write a program that can read from standard input
: You are required to write a program that can read from standard input and encode or decode a message using a simplified version of the Enigma machine. Your program must first accept between one and three space delimited codewheel identifiers. Vali..
|
Define a weak exchange bayesian nash equilibrium
: Define a weak exchange Bayesian Nash equilibrium (WEBNE) as a Bayesian Nash equilibrium in which each student i.
|
Contribution to computer science
: Write a 250-300 word description for each person stating who they are, what their contribution to Computer Science was, and why it was significant. Include at least 3 references for each person. Please use proper grammar and important content. (W..
|
Prepare and submit a two-page reflection
: Prepare and submit a two-page reflection, ideally based on the outline assignment from Unit VI. Create and submit a visual presentation with your reflection as an audio transcript. Use a minimum two sources that can be found in CSU's Online Library ..
|
Describe how communication can enhance self-esteem
: Define self esteem and describe how communication can enhance self-esteem. Why is self-awareness such a critical skill for improving self-esteem?
|