Create a python program that takes as a cipher-text

Assignment Help Computer Engineering
Reference no: EM132112801

Python - Cryptograpy - Please include all #comments in before each row.

Cryptography is the science of making messages secure, of transforming readable messages into unreadable messages and back again. Messages that are unreadable are called cipher-text. The process of turning plaintext into cipher-text is called encryption. The reverse process of turning cipher-text into plaintext is called decryption.

One of the easiest ways to encrypt a message is to scramble the letters. For example, the word "apple" could be randomly transformed to "lapep." In fact, there are 120 different possible arrangements of the word "apple."

However, if the encryption algorithm randomly scrambles the letters, the task of the decryption algorithm is pretty hard. Encryption and decryption algorithms must work together in some agreed upon way, with the encryption algorithm scrambling letters and the decryption algorithm unscrambling them.

A transposition cipher is one way to scramble the letters of a message. The cipher separates the message into two groups of characters: the first group composed of the even-numbered characters and the second group composed of the odd-numbered characters.

To produce the cipher-text, the cipher puts together both groups; placing the group of the even-numbered characters first, followed by the group of odd-numbered characters. This encryption results in a string with the characters shuffled to new positions.

a) Write a python program that takes a message,encrypts the message as described above and returns the cipher-text.

b) Write a python program that takes as a cipher-text, decrypts the cipher-text as described above and returns the message.

Reference no: EM132112801

Questions Cloud

Current and future state of the management : BN305 - Virtual Private Network - Describe architectural VPN design for small, medium and large businesses and corporations
Calculate the amount of money a person would earn : Write a program that calculates the amount of money a person would earn over a period of time if their salary is one penny the first day, two pennies.
Write a test program that creates two fan objects : Write a test program that creates two Fan objects. A one-argument constructor that creates fan. provide speed value.
Write two versions of a factorial function : You need to write a few functions in Python. Write two versions of a factorial function.
Create a python program that takes as a cipher-text : Write a python program that takes as a cipher-text, decrypts the cipher-text as described above and returns the message.
Write a program that plays the tic-tac-toe game : Write a program that plays the tic-tac-toe game. Two players take turns clicking an available cell in a 3 x 3 grid with their respective tokens .
Prevent loss of revenue due to used product markets : Suppose that in order to prevent loss of revenue due to used product markets, smart phone providers successfully lobby the government to make it illegal to buy
Display the amounts after the first five years : When money is invested at 5% interest compounded annually, the amount at the end of each year is 1.05 times the amount at the beginning of that year.
Write the three functions to implement the linear : Write the three functions to implement the linear cipher below, these were shift ciphers.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd