logo

ICT167 JAVA Encryption Assignment

6 Pages671 Words69 Views
   

Principles of Computer Science (ICT167)

   

Added on  2020-05-28

ICT167 JAVA Encryption Assignment

   

Principles of Computer Science (ICT167)

   Added on 2020-05-28

ShareRelated Documents
Running head: JAVA ENCRYPTION ASSIGNMENTEncryption AssignmentName of the student:Name of the University:Author note:
ICT167 JAVA Encryption Assignment_1
1JAVA ENCRYPTION ASSIGNMENTTable of ContentsProgram Description..................................................................................................................2UML Class Diagram..................................................................................................................3Algorithm...................................................................................................................................3Output.........................................................................................................................................5
ICT167 JAVA Encryption Assignment_2
2JAVA ENCRYPTION ASSIGNMENTProgram DescriptionThe program is designed to display the set of characters that are present in thesystem’s alphabet {a-z, 0-9 and the symbols namely full stop (.), comma (,), exclamationmark (!) and space ( )}. The user is then asked to re-enter the values of the alphabet but in adifferent order. The program then checks if the user correctly enters all 40 characters into thenew alphabet. Then it ensures that a proper one-to-one mapping has taken place. This checkconfirms that each character maps back to only one character from the original alphabet set.Also does the program checks for duplicate entries. In case any of the above cases areviolated, the user is asked to enter the mapping set again.Once the user has successfully mapped the set of alphabet, the program asks the userto enter a sentence. First, the program checks if the sentence contains any character that is outof context from the given alphabet set. Then, it then encrypts the sentence using the mappingvalues. The program picks each character from the sentence, searches for it in the mainalphabet and then tracks back the corresponding mapped character. Likewise, the wholesentence is traversed and the encrypted sentence is displayed.The user is then given the choice to continue with another sentence, decrypt back theencrypted message or to exit. If the user choses to decrypt, the reverse process is carried on tosearch out the actual character that was mapped to the encrypted characters in the encryptedsentence.
ICT167 JAVA Encryption Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BookStore Application - Assignment
|38
|4445
|25

Programming
|5
|531
|69

Temperature Recording Program: Java Implementation for Daily and Weekly Temperature Tracking
|7
|1100
|494

Design Documentation Program Algorithm
|15
|2080
|86

Document Related to JAVA Programming
|15
|1971
|338

Exception Arithmetic Overflow
|5
|878
|18