首页 > > 详细

留学生C /C #/Java/y thon /M A T L A B辅导讲解、讲解Java设计、Java语言解析 辅导Database|解析Haskel

You can write in C /C #/Java/y thon /M A T L A B , etc.



1 . Substituti on Ciphers

I n Sub stitution ci pher, each l etter i n th e p l ai n text is repl aced b y a l etter h av i ng so m e f ixed number of posi ti on s do w n /o r up th e al ph ab et.

?E x am p l e:



P l ease implement E n cry p t(Letter, Key ) and Decry p t(Letter, Key ). Key is the input parameter, which can b e def ined b y users. F o r ex am p l e, w h en K ey = 3,
Encrypt(“HELLO”,3) = “KHOOR”, and Decrypt(“KHOOR”,3) = “HELLO”. Key can be other values.

2.. T ran sp o si ti on C i p h er

In transposition cipher, the message is encrypted by rearrnaging the letter order, i .e., w ri te l etters ou t d i ag on al l y o v er a nu m b er o f ro w s, th en read o f f ci ph er ro w b y ro w . F o r example, the plain text “meet after the toga party”, can be written out as:

?m e m a t r h t g p r y

?e t e f e t e o a a t

i f th e ci ph er tex t i s w ri tten i n tw o ro w s.

P l ease i m p l em en t E n cry p t(L etter, K ey ) and D ecry p t(L etter, K ey ), w i th K ey as ho w m an y ro w s are th ere i n ci ph er tex t.



3.P rodu ct C i p h ers

W e d ef i n e P rodu ct C i p h er as th e F un cti o n o f B o o l ean al g eb ra: tw o b i ts are co m p ared . I f tw o b i ts are i d en ti cal , th e resu l t i s b i n ary 0; I f tw o b i ts are n o t i d en ti cal , th e resu l t i s
b i n ary 1 , sho w n as i n th e f o l l o w i ng f i g u re.



P l ease i m p l em en t E n cry p t(Letter, Key ) and Decry p t(Letter, Key ), with K ey as d ef i n ed b y users.

联系我们
  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp
热点标签

联系我们 - QQ: 99515681 微信:codinghelp
程序辅导网!