Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask C/C++ Expert


Home >> C/C++

1. Learner Objectives:

At the conclusion of this programming assignment, participants should be able to:

Design, implement and test classes in C++ Apply and implement ? overloaded? operators and functions Design and implement classes using inheritance

II. Prerequisites:

Before starting this programming assignment, participants should be able to:

?Analyze a basic set of requirements for a problem

?Compose basic C++ language programs

?Create basic test cases for a program

?Apply arrays, strings, and pointers

?Declare and define ? constructors

?Declare and define ? destructors

?Compare and contrast ? public? and ? private? access specifiers in C++

?Describe what is an ? attribute? or data member of a class

?Describe what is a ? method? of a class

? Apply and implement ? overloaded? functions

?Distinguish between pass-by-? value? and pass-by-? reference

?Discuss ? classes? versus ? objects

III. Overview & Requirements:

NOTE:? Parts of this assignment are courtesy of Jack Hagemeister.

Security and secrecy are popular topics in computer science. Every nation in the world has struggled with the task of communicating important information to its allies and armies at the same time trying to keep that information secret from others. In this assignment, you will be implementing some simple ciphers from history and look at ways to "decode" them.

You will find that the use of modern computers makes decoding of some of these very easy.

You should first review some information about ciphers. Start at the following web site, Codes, Ciphers, & Codebreaking? . It has an excellent introduction into the classic / historical Ciphers. You will need to read at least the first section, but I recommend reading sections 2 and 3 as well. These sections include: "1.0: Introduction to Codes, Ciphers, & Codebreaking", "2.0: Refining the Art", and "3.0 The Rise of Field Ciphers".

You will design objects for each of the two encryption techniques required. Each object should hold a message that is either "clear text" or "encrypted". You should be able to create any object around a string of text and an indicator of its status. You should have methods to retrieve the clear text or encrypted message from the object no matter how it is stored. Ok, so there are some other issues. If you have an encoded message and do not know the key in the Caesar Cipher or the substitution cipher you need methods to interact with the message to try and determine the key. For the Caesar Cipher this is simply being able to test each key number from 1 through 25. You probably do not even have to do anything special except in the calling program. For the substitution cipher, you will have to have a method that does frequency analysis, and gives you a best guess. You may want to be able to put in substitutions as well to correct any problems that you find in the analysis.

0.? ? Build a basic cipher base class that may be derived from for the ciphers described below.

1.? ? Encode a text message using the Caesar Cipher, a mono-alphabetic substitution cipher. You will need to input the KEY number from 1 to 25. Do not encode special characters or white space. All encoded text should be upper case only. You should be able to save an encoded message to a file.

2.? ? Decode a Caesar Cipher text. You will have two cases:

a.? ? You are given the KEY.

b.? ? You have to break the KEY by brute force trial and error.

3.? ? Build a randomly generated simple substitution cipher and use it to encode messages. Again the encoded messages will be in all upper case letters only. Only encode the letters.

4.? ? Build a method for performing frequency analysis to decode a substitution cipher. Your system should determine the frequency of characters in the

5.? ? Build a standard text-based wrapper/class for the application.

C/C++, Programming

  • Category:- C/C++
  • Reference No.:- M91246117
  • Price:- $150

Priced at Now at $150, Verified Solution

Have any Question?


Related Questions in C/C++

What are the legal requirements with which websites must

What are the legal requirements with which websites must comply in order to meet the needs of persons with disabilities? Why is maximizing accessibility important to everyone?

1 implement the binary search tree bst in c using the node

1. Implement the Binary Search Tree (BST) in C++, using the Node class template provided below. Please read the provided helper methods in class BST, especially for deleteValue(), make sure you get a fully understanding ...

Project - space race part a console Project - Space Race Part A: Console Implementation

Project - Space Race Part A: Console Implementation INTRODUCTION This assignment aims to give you a real problem-solving experience, similar to what you might encounter in the workplace. You have been hired to complete a ...

Question 1find the minimum and maximum of a list of numbers

Question: 1. Find the Minimum and Maximum of a List of Numbers: 10 points File: find_min_max.cpp Write a program that reads some number of integers from the user and finds the minimum and maximum numbers in this list. Th ...

Assignment word matchingwhats a six-letter word that has an

Assignment: Word Matching What's a six-letter word that has an e as its first, third, and fifth letter? Can you find an anagram of pine grave. Or how about a word that starts and ends with ant (other than ant itself, of ...

There are several ways to calculate the pulse width of a

There are several ways to calculate the pulse width of a digital input signal. One method is to directly read the input pin and another method (more efficient) is to use a timer and pin change interrupt. Function startTi ...

Why do researcher drop the ewaste and where does it end

Why do researcher drop the ewaste and where does it end up?

Assign ment - genetic algorithmin this assignment you will

ASSIGN MENT - GENETIC ALGORITHM In this assignment, you will use your C programming skills to build a simple Genetic Algorithm. DESCRIPTION OF THE PROGRAM - CORE REQUIREMENTS - REQ1: Command-line arguments The user of yo ...

Software development fundamentals assignment 1 -details amp

Software Development Fundamentals Assignment 1 - Details & Problems - In this assignment, you are required to answer the short questions, identify error in the code, give output of the code and develop three C# Console P ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As