Please complete in Python Need to - ask user for last name, to use as the key fo
ID: 3887678 • Letter: P
Question
Please complete in PythonNeed to - ask user for last name, to use as the key for the Cipher - skip space between words - replicate key to cover entire message
More details attached below: 3.0 Project Functionality 3.1 Overview The primary objective of this project is to implementation of Vigenere Cipher. You have to design and develop a C/CPP/JAVA -based program to encrypt any given message based on the Vignere algorithm. Your last name must be used as the cipher key. You also have to skip the space between the words, while replicating the key to cover the entire message. You can find an example of how the below message has been encrvpted using my last name as the cipher kev increase your understanding of the fundamental A HEALTHY ATTITUDE IS CONTAGIOUS BUT DONT WAIT TO CATCH IT FROM OTHERS. + mod 26) K HOSHAVI KHOSHAVI KH OSHAVIKHOS HAV IKHO SHAV IK HOSHA VI KHOS HAVIKH 3.2 Test Cases The following messages will be given as the input as the test case to your program to check the accuracy of your program A HEALTHY ATTITUDE IS CONTAGIOUS BUT DONT WAIT TO CATCH IT FROM OTHERS. -IF YOU CARRY YOUR CHILDHOOD WITH YOU YOU NEVER BECOME OLDER -FROM PRINCIPLES IS DERIVED PROBABILITY BUT TRUTH OR CERTAINTY IS OBTAINED ONLY FROM FACTS 4.0 Program Code Evaluation 4.1 Evaluation Method Project Code scores will be evaluated by entering aforementioned "stress-test" sentences. Any missing, incorrect, or extra unspecified functionality will result in a proportional or complete deduction of credit 4.2 Operational Code Required Any compiler errors (e.g. gcc or javac is unable to compile the program code), as well as program runtime failures or infinite loops will result no credit for affected parts of the Program Code for this Project. Please verify that your submission is operational prior to final submission. 4.3 Individual Work The entire submission of Program Code and Project Report shall be your own individual original work. Any unauthorized use of shared, jointly written, or re-used code results in no credit for the entire Project.
Explanation / Answer
letters = ['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z',' ','.',',','?','1','2','3','4','5','6','7','8','9','0'] cipher = [] pos_key = [] pos_text = [] pos_cipher = 0 key = [] plain = [] letters_len = 40 import os def find_pos(value): temp = [] i=0 while iRelated Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.