Question

In: Computer Science

**Use C** You will write an encoder and a decoder for a modified "book cipher." A...

**Use C** You will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line)

[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;

[13] All mimsy were the borogoves, And the mome raths outgrabe.

[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!

[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"

[45] He took his vorpal sword in hand: Long time the manxome foe he sought—

The word "computer" can be encoded with the following pairs of numbers:

35,0 catch

5,1 toves

42,3 frumious

48,3 vorpal

22,1 outgrabe

34,3 that

23,5 Beware

7,2 gyre

Placing these pairs into a cipher text, we get the following:

35,0,5,1,42,3,48,3,22,1,34,3,23,5,7,2

If you are encoding a phrase, rather than just a single word, spaces in the original english phrase will also appear in the ciphered text. So, the phrase "all done" (using the above Jabberwocky poem) might appear as: 0,3,1,4,13,1 6,0,46,2,44,2,3,2

Only spaces in the key text should be considered delimiters. All other punctuation in the key text are to be considered part of a key word. Thus the first word in the Jabberwocky poem, 'Twas, will have the following characters and positions for key word 0:

Position 0: '

Position 1: T

Position 2: w

Position 3: a

Position 4: s

Developing the Program:

You should approach this assignment in several parts. The first part will be to write a menu driven program that prompts the user for the following actions:

  1. Read in the name of a text file to use as a cipher key
  2. Create a cipher using the input text file (and save the result to a file)
  3. Decode an existing cipher (prompt user for a file to read containing the cipher text)
  4. Exit the program

For each choice, create a stub function that will be completed in the remaining steps.

After testing your menu, continue to fill in the stub functions with the following specifications:

Choice #1

For this menu choice, you will prompt the user for the name of a cipher text file (such as the Declaration of Independence). You will read this text file line by line, and place each word, in order, in an array of char strings. As you copy each word into the array, you will keep a running count of the number of words in the text file and convert the letters of each word to lower case. You may assume that you will use no more than the first 5,000 words in the text, and no more than the first 15 characters in a word. However, there is no guarantee that the text will have 5000 words or less and any word in the text is 15 characters or less.

Choice #2

If no file has been chosen for Choice #1 (i.e. the user goes directly to Choice #2 without first choosing Choice #1), you will first prompt the user to enter a cipher text and read it into memory (presumably by calling the function that would be called by Choice #1). You will prompt the user to enter a secret message (in plain text - such as "Computer Science is the best major at GMU!") that is terminated by pressing the "Enter" key. You can assume that the length of this message will be less than 1500 characters (including the carriage return and NULL terminator). You will then parse this message, character by character, converting them to lower case as you go, and find corresponding characters in the words found in the key text word array. You can do this by going through each word in the word array, and then each character in each word, until you find a match with the current message character. There are more efficient ways to perform this operation, and you are encouraged to implement them instead of the given method. Once a character match is found, you will write the index of the word and the index of the character to a character string that you will later write out to a text file. Spaces are to be placed into the text as found in the message and will be used to delimit the separate words in the secret message. Once the message has been encoded, prompt the user for the name of a file to save the encoded message to, and save it to that file.

Choice #3

You will prompt the user for the name of a file containing an encoded text (i.e. a file containing number pairs). Your program will read the file and decode the the text using the indexes pairs given for each character in the word and the text file chosen for Choice #1. If no file has been chosen for Choice #1 (i.e. the users goes directly to Choice #3 without first choosing Choice #1), you will prompt the user to enter a cipher text and read it into memory (presumably by calling the function that would be called by Choice #1). Spaces found in the file are to be treated as spaces in the decoded text. You can assume that the number of characters in the encoded text file is 5000 or less, including any carriage returns or NULL terminator characters. Once the text is decoded, print the message to standard output.

Choice #4

Exit the program.

Additional Specifications:

  • In order to introduce some "randomness" in the specific character encoding, you will generate a random number i from 0..9 inclusive (use the last four digits of your G Number as the seed), and use the ith instance of that character found in the text. (If fewer than i instances of the character is found in the text, loop back and continue the search from the beginning of the document.)
    • Example: Suppose the letter to encode is a 'c'. Using the sentences just above, we find that there are the following 'c' characters:
      • In order to introduCe some "randomness" in the speCifiC CharaCter enCoding, you will generate a random number i from 0..9 inClusive (use the last four digits of your G Number as the seed), and use the ith instanCe of that CharaCter found in the text.
      • If the random number returns 6, then you will use the 'c' from the word "inclusive." (Start counting from 0). If the random number returns 2, you would the second c found in the word "specific."
  • If a given character in the secret message is not found in any word of the text, replace that character with the '#' character in the encoded text (a single '#' character replaces a word/position pair).

Solutions

Expert Solution

PLEASE GIVE IT A THUMBS UP, I SERIOUSLY NEED ONE, IF YOU NEED ANY MODIFICATION THEN LET ME KNOW, I WILL DO IT FOR YOU

#include <stdio.h>

#include <string.h>
#include<stdlib.h>


int readFile(char **words, char *fileName)

{

FILE *read;

printf("Enter the name of a cipher text file:");

scanf("%s", fileName);

read = fopen(fileName, "r");

if (read == NULL)

{

puts("Error: Couldn't open file");

fileName = NULL;

return 0;
}

char line[1000];

int word = 0;

/* read a line by line*/

while (fgets(line, sizeof line, read) != NULL)

{

int i = 0;

int j = 0;

while (line[i] != '\0')

{

if (line[i] != ' ')

{

if (line[i] >= 65 && line[i] <= 90)

{

words[word][j] = line[i];
+32;
}

else

{

words[word][j] = line[i];
}

j++;
}

else

{

words[word][j] = '\n';

j = 0;

word++;
}

i++;
}

words[word][j] = '\n';

word++;
}

return word;
}

// converts a plain text into cipher text

void encode(char **words, char *fileName, int nwords)

{

char line[50];

char result[100];

if (strcmp(fileName, "") == 0)

{

nwords = readFile(words, fileName);
}

getchar();

printf("Enter a secret message(and press enter): ");

gets(line);

int i = 0, j = 0;

int w = 0, k = 0;

while (line[i] != '\0')

{

if (line[i] >= 65 && line[i] <= 90)

{

line[i] = line[i] + 32;
}

w = 0;

int found = 0;

while (w < nwords)

{

j = 0;

while (words[w][j] != '\0')

{

if (line[i] == words[w][j])

{

printf("%c -> %d,%d \n", line[i], w, j);

found = 1;

break;
}

j++;
}

if (found == 1)

break;

w++;
}

i++;
}

result[k] = '\n';
}

void Exit()

{

exit(0);
}

int main()

{

char **keyWords;

char *fileName;

int numWords = 0;

keyWords = malloc(5000 * sizeof(char *));

for (int i = 0; i < 5000; i++)

{

keyWords[i] = (char *)malloc(15);
}

fileName = (char *)malloc(25);

int choice;

//menu

while (1)

{

printf("1) Read in the name of a text file to use as a cipher key\n");

printf("2) Create a cipher using the input text file (and save the result to a file)\n");

printf("3) Decode an existing cipher (prompt user for a file to read containing the cipher text)\n");

printf("4) Exit the program.\n");

printf("Enter your choice: ");

scanf("%d", &choice);

if (choice == 1)

{

numWords = readFile(keyWords, fileName);
}

else if (choice == 2)

{

encode(keyWords, fileName, numWords);
}

else

{

Exit();
}

printf("\n");
}

return 0;
}

THANK YOU!! PLEASE VOTE


Related Solutions

**Use C** You will write an encoder and a decoder for a modified "book cipher." A...
**Use C** You will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number...
Show the gate level implementation of a decoder as well as an encoder, then explain the...
Show the gate level implementation of a decoder as well as an encoder, then explain the functionality of each one, and show what happens if you connect them together.
Show the gate level implementation of a decoder as well as an encoder, then explain the...
Show the gate level implementation of a decoder as well as an encoder, then explain the functionality of each one, and show what happens if you connect them together.
explain a hamming encoder (7,4) hamming decoder (7,4) scan test.
explain a hamming encoder (7,4) hamming decoder (7,4) scan test.
Create a message encoder/decoder. PLEASE USE BASIC PYTHON METHODS/FUNCTIONS. The user enters a message that could...
Create a message encoder/decoder. PLEASE USE BASIC PYTHON METHODS/FUNCTIONS. The user enters a message that could only include alphabetic letters and space. There are 26 alphabetic letters. Consider space the 27th letter. The user then enters a shift code that should be an integer between -26 and 26. The application will show the encoded/decoded message based on the shift code entered. If you encode a message, each letter in the message will be moved forward through the alphabet according to...
COP2271 MATLAB HW9 Homework: Modified Vigenere Cipher Implement a decryption cipher to decode messages using a...
COP2271 MATLAB HW9 Homework: Modified Vigenere Cipher Implement a decryption cipher to decode messages using a secret key. You are required to submit the solution and screenshots for this question. Key programming concepts: if statements, loops, strings Approximate lines of code: 27 (does not include comments or white space) Commands you can’t use: None... Program Inputs • Enter message to decrypt: • Enter secret key: – The user will always enter text for all prompts, no error checking needed. The...
In C++, write a program to implement the Caesar Cipher for both encryption and decryption. The...
In C++, write a program to implement the Caesar Cipher for both encryption and decryption. The program should be able to handle different keys by deciding the key at run time. Thank you :)
Write a c or matlab text code(to be copied ) for Huffman coder and Huffman decoder...
Write a c or matlab text code(to be copied ) for Huffman coder and Huffman decoder that asks the user to enter the string and output the Huffman code for every letter and a code for encoding that will have every letter and its Huffman code and output all the possibilities for the real string. you must show a screen of an input and the output for both the encoder and the decoder
Code a 2:4 decoder with registered out. Also write a testbench of the decoder.
Code a 2:4 decoder with registered out. Also write a testbench of the decoder.
Write a C++ program performing the rot13 cipher, The code should perform like this: The user...
Write a C++ program performing the rot13 cipher, The code should perform like this: The user should be able to input any letter or words, or even sentences where once they have inputted the particular word, each letter goes 13 letters ahead, so an 'A' becomes an 'N', a 'C' becomes 'P', and so on. If rot13 cipher is tested a second time, the original plantext should be restored: 'P' becomes 'C', 'N' becomes 'A'. The 13 letters go in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT