lease look at attached photos. It needs to pass all of the simulations. Thanks in advance Cryptography is the practice of encryption. Information Security uses cryptography techniques to encrypt and decrypt data. A simple encryption method might take plaintext and mix up the letters using some predetermined pattern and then use that pattern to decrypt the data for reading. Ciphers are the algorithms used to put the data into its secret pattern and then systematically decrypt it for reading. This script is going to use a famous simple cipher called the Caesar Cipher. It is a substitution cipher where each letter in the text is 'shifted' in a certain number of places. It uses the alphabet as the primary pattern and then based on the shift number, it would shift all the letters and replace the alphabet with our pattern. For example, if our shift number was 3, then A would be replaced with D, if we performed a right shift. As an example: Text = "THE CAT IS VISIBLE AT MIDNIGHT" Ciphertext = "WKH FDW LV YLVLEOH DW PLGQLIJKW" The keys to decrypt this message are the shift number and the direction. The shift value can be any integer from 0 - 25. The above example uses shift = 3 and the shift direction is right or direction = 'r'. Complete the CipherTest class by adding a constructor to initialize a cipher item. The constructor should initialize the shift to 0, and the direction to 'r' for right shift. If the constructor is called with a shift value, and direction, the constructor should assign each instance attribute with the appropriate parameter value. Complete the following TODO's: (1) create input for text, shift value, and direction (use lower( )) to keep l and r lower case (2) create a cipher item and use the constructor with the above input values (3) usecontrol structures to call shifttoright() if direction is right and call shifttoleft if direction is left. Make sure you print out the return encrypted message inside the control structures. We can create the encrypted text by using the ord ( ) function. This function will return an integer that represents the Unicode code point of the character. Character are represented by different values for upp/er and lower case so an 'a' returns the integer 97. By using the unicode value we can add and subtract our shift value represented by an integer. The given program accepts as input a text string as our message to be encrypted, a shift value, and a direction of 'l' for left and 'r' for right. The program creates a cipher item using the input values. The program outputs the encrypted message based on the shift value and the direction provided.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Please look at attached photos. It needs to pass all of the simulations. Thanks in advance

Cryptography is the practice of encryption. Information Security uses cryptography techniques to encrypt and decrypt data. A simple encryption method might take plaintext and mix up the letters using some predetermined pattern and then use that pattern to decrypt the data for reading.

Ciphers are the algorithms used to put the data into its secret pattern and then systematically decrypt it for reading. This script is going to use a famous simple cipher called the Caesar Cipher. It is a substitution cipher where each letter in the text is 'shifted' in a certain number of places. It uses the alphabet as the primary pattern and then based on the shift number, it would shift all the letters and replace the alphabet with our pattern.

For example, if our shift number was 3, then A would be replaced with D, if we performed a right shift. As an example:

Text = "THE CAT IS VISIBLE AT MIDNIGHT" Ciphertext = "WKH FDW LV YLVLEOH DW PLGQLIJKW"

The keys to decrypt this message are the shift number and the direction. The shift value can be any integer from 0 - 25. The above example uses shift = 3 and the shift direction is right or direction = 'r'.

Complete the CipherTest class by adding a constructor to initialize a cipher item. The constructor should initialize the shift to 0, and the direction to 'r' for right shift. If the constructor is called with a shift value, and direction, the constructor should assign each instance attribute with the appropriate parameter value.

Complete the following TODO's: (1) create input for text, shift value, and direction (use lower( )) to keep l and r lower case (2) create a cipher item and use the constructor with the above input values (3) usecontrol structures to call shifttoright() if direction is right and call shifttoleft if direction is left. Make sure you print out the return encrypted message inside the control structures.

We can create the encrypted text by using the ord ( ) function. This function will return an integer that represents the Unicode code point of the character. Character are represented by different values for upp/er and lower case so an 'a' returns the integer 97. By using the unicode value we can add and subtract our shift value represented by an integer.

The given program accepts as input a text string as our message to be encrypted, a shift value, and a direction of 'l' for left and 'r' for right. The program creates a cipher item using the input values. The program outputs the encrypted message based on the shift value and the direction provided.

 

5:21 1
A learn.zybooks.com
= zyBooks -
test submission - 5:20 PM EDT on 09/17/21
Only show failing tests
Compare output ^
Output differs. See highlights below.
Special character le
Cryptography is fun!
Input
4
r
Your output
None
Expected output
Gvctxskvetlc mw jyrs
Compare output ^
Output differs. See highlights below.
Special character le
Cryptography is fun!
Input
4
Your output
None-
Expected output
Ynulpkcnwldu eo bqjk
Unit test a
Tests that CipherText("The job is done!", 6, "r") correctly ir
Traceback
Tettnt Jall last):
Transcribed Image Text:5:21 1 A learn.zybooks.com = zyBooks - test submission - 5:20 PM EDT on 09/17/21 Only show failing tests Compare output ^ Output differs. See highlights below. Special character le Cryptography is fun! Input 4 r Your output None Expected output Gvctxskvetlc mw jyrs Compare output ^ Output differs. See highlights below. Special character le Cryptography is fun! Input 4 Your output None- Expected output Ynulpkcnwldu eo bqjk Unit test a Tests that CipherText("The job is done!", 6, "r") correctly ir Traceback Tettnt Jall last):
My library > CYB/135: ..
= zyBooks
8 Adam Brygidyr
▼
1.13: LAB: Introduction to ..
Tests that CipherText("The job is done!", 6, "r") correctly initializes item
Traceback (most recent call last):
ТуреError:
init_ () takes from 1 to 3 positional arguments but 4 were given
Your output
None
4: Unit test ^
Tests that CipherText("A cat is visible at midnight", 5, "I") correctly initializes item
Traceback (most recent call last):
ТурeError:
init_ () takes from 1 to 3 positional arguments but 4 were given
Your output
None
Transcribed Image Text:My library > CYB/135: .. = zyBooks 8 Adam Brygidyr ▼ 1.13: LAB: Introduction to .. Tests that CipherText("The job is done!", 6, "r") correctly initializes item Traceback (most recent call last): ТуреError: init_ () takes from 1 to 3 positional arguments but 4 were given Your output None 4: Unit test ^ Tests that CipherText("A cat is visible at midnight", 5, "I") correctly initializes item Traceback (most recent call last): ТурeError: init_ () takes from 1 to 3 positional arguments but 4 were given Your output None
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 2 images

Blurred answer
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education