1. Homepage
  2. Programming
  3. CSCI 4174/CSCI 6708 Network Security: Assignment NO. 4 - Playfair substitution cipher and Matrix transposition cipher

CSCI 4174/CSCI 6708 Network Security: Assignment NO. 4 - Playfair substitution cipher and Matrix transposition cipher

Engage in a Conversation
CanadaDalhousie UniversityCSCI 4174CSCI 6708Network SecurityPlayfair substitution cipherMatrix transposition cipherJavaC++Python

CSCI 4174/CSCI 6708 NETWORK SECURITY: ASSIGNMENT NO. 4 CourseNana.COM


CourseNana.COM


CourseNana.COM

PLEASE READ - GENERAL IMPORTANT NOTES FOR ALL ASSIGNMENTS: CourseNana.COM

  1. It is very important that you use the network tools that you download only for collecting information about your own machine or a self-contained private network. Never use any of the tools for unethical purposes
  2. All references must be properly cited in your answers. Use IEEE or ACM reference styles (https://www.ieee.org/documents/ieeecitationref.pdf) (https://www.cs.ucy.ac.cy/~chryssis/specs/ACM-refguide.pdf) . Points will be deducted for improper citations and citations in incorrect formats.
  3. Keep in mind that just because you cite references, you must not “cut-and-paste” from these or other sources. The write-up must be properly paraphrased and referenced.
  4. Late Penalty Policy: The assignment is due at 11.59 PM on the due date. It will not be marked late up to 5 hours past the deadline. Beyond the grace time, there will be a 10% per day on the mark earned on the assignment. For instance, if your score on the assignment is 8/10 and there is a 10% late penalty, the score will be reduced to 7.2/10. Assignments that are five days past due will not be accepted.

5. Submission: Submission will be on Brightspace. CourseNana.COM

This is a programming assignment on cryptography – you will implement two ciphers. CourseNana.COM

Note: Do not use online resources or built-in libraries. Implement the programs on your own. CourseNana.COM

Exercise 1: Write a program to simulate Playfair substitution cipher. Your program should have three methods/functions:
Method 1: Accepts a secret key (String of characters) as argument and generates and returns a key matrix (2D array).
CourseNana.COM

Method 2: Accepts plaintext (String of characters) and the key matrix as arguments and generates and returns the ciphertext.
Method 3: Accepts ciphertext (String of characters) and the key matrix as arguments and generates and returns the plaintext.
CourseNana.COM

You may assume that the plaintext, ciphertext and the key all consist of only upper-case letters. You can ignore spaces, punctuations and line breaks. CourseNana.COM

Use a driver program with a main method to test the above methods. First test your code using the examples from the lecture notes. Ensure that you test some of the special cases such as repeated characters in a pair, odd total number of characters, etc. CourseNana.COM

Next, run your program to encrypt the following text, using the secret key RAYQUAZA CourseNana.COM

POKEMON TOWER DEFENSE
YOUR MISSION IN THIS FUN STRATEGY TOWER DEFENSE GAME IS TO HELP PROFESSOR OAK TO STOP ATTACKS OF WILD RATTATA. SET OUT ON YOUR OWN POKEMON JOURNEY, TO CATCH AND TRAIN ALL POKEMON AND TRY TO SOLVE THE MYSTERY BEHIND THESE ATTACKS. YOU MUST PLACE POKEMON CHARACTERS STRATEGICALLY ON THE BATTLEFIELD SO THAT THEY STOP ALL WAVES OF ENEMY ATTACKER
DURING THE BATTLE YOU WILL LEVEL UP AND EVOLVE YOUR POKEMON. YOU CAN ALSO CAPTURE OTHER
CourseNana.COM

POKEMON DURING THE BATTLE AND ADD THEM TO YOUR TEAM. USE YOUR MOUSE TO PLAY THE GAME. GOOD LUCK CourseNana.COM

Note: Ignore spaces, punctuations, and line breaks. CourseNana.COM

Decrypt the ciphertext to get back the above plaintext (ignore about spaces, punctuations, and line breaks). CourseNana.COM

As an example, when you encrypt and decrypt, the text will appear as below: CourseNana.COM

POKEMON TOWER DEFENSE YOUR MISSION ... (Plaintext) CourseNana.COM

xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx ... (Ciphertext; x stands for some uppercase letter)

CourseNana.COM

POKEMONTOWERDEFENSEYOURMISQSION ... (Ciphertext back to Plaintext; the plaintext may have extra Q, X and Z characters – you can leave them as they are) CourseNana.COM

Exercise 2: Write a program to simulate Matrix transposition cipher. Your program should have two methods: Method 1: Accepts plaintext (String of characters) and a key (integer array representing the permutation of the columns) as arguments and generates and returns the ciphertext (String of characters).
Method 2: Accepts ciphertext (String of characters) and a key (integer array representing the permutation of the columns) as arguments and generates and returns the plaintext (String of characters).
CourseNana.COM

Use a driver program with a main method to test the above methods. You may use some of the examples from the lecture notes to test your solution. CourseNana.COM

You may assume that the plaintext and ciphertext consist of uppercase letters, lowercase letters, numbers, and spaces. You can represent the space by a % character. No other special characters are required. CourseNana.COM

Run your program on the same text file as for Exercise 1. Ignore newline characters but include spaces. Use a 10- column matrix and some random permutation of the columns as the key. CourseNana.COM

You can develop the programs in Java, C, C++ or Python. Make necessary assumptions regarding the spacing of characters in the input text files. CourseNana.COM

Submit your source codes and a text file/PDF file containing the inputs and outputs. CourseNana.COM

What to submit: One zip file containing a) Source codes for the two programs and c) Text file/PDF containing sample inputs and outputs. CourseNana.COM

  CourseNana.COM

Get in Touch with Our Experts

WeChat WeChat
Whatsapp WhatsApp
Canada代写,Dalhousie University代写,CSCI 4174代写,CSCI 6708代写,Network Security代写,Playfair substitution cipher代写,Matrix transposition cipher代写,Java代写,C++代写,Python代写,Canada代编,Dalhousie University代编,CSCI 4174代编,CSCI 6708代编,Network Security代编,Playfair substitution cipher代编,Matrix transposition cipher代编,Java代编,C++代编,Python代编,Canada代考,Dalhousie University代考,CSCI 4174代考,CSCI 6708代考,Network Security代考,Playfair substitution cipher代考,Matrix transposition cipher代考,Java代考,C++代考,Python代考,Canadahelp,Dalhousie Universityhelp,CSCI 4174help,CSCI 6708help,Network Securityhelp,Playfair substitution cipherhelp,Matrix transposition cipherhelp,Javahelp,C++help,Pythonhelp,Canada作业代写,Dalhousie University作业代写,CSCI 4174作业代写,CSCI 6708作业代写,Network Security作业代写,Playfair substitution cipher作业代写,Matrix transposition cipher作业代写,Java作业代写,C++作业代写,Python作业代写,Canada编程代写,Dalhousie University编程代写,CSCI 4174编程代写,CSCI 6708编程代写,Network Security编程代写,Playfair substitution cipher编程代写,Matrix transposition cipher编程代写,Java编程代写,C++编程代写,Python编程代写,Canadaprogramming help,Dalhousie Universityprogramming help,CSCI 4174programming help,CSCI 6708programming help,Network Securityprogramming help,Playfair substitution cipherprogramming help,Matrix transposition cipherprogramming help,Javaprogramming help,C++programming help,Pythonprogramming help,Canadaassignment help,Dalhousie Universityassignment help,CSCI 4174assignment help,CSCI 6708assignment help,Network Securityassignment help,Playfair substitution cipherassignment help,Matrix transposition cipherassignment help,Javaassignment help,C++assignment help,Pythonassignment help,Canadasolution,Dalhousie Universitysolution,CSCI 4174solution,CSCI 6708solution,Network Securitysolution,Playfair substitution ciphersolution,Matrix transposition ciphersolution,Javasolution,C++solution,Pythonsolution,