The Super Spy Read This Carefully!! (For your eyes-only) Your task, should you choose to accept it, is to design an application that will accept any phrase as input and allow the user to encrypt or decrypt it. The program should use one or two keys (two is highly recommended) to encrypt the message. These keys could be made up of an integer - a number between -32767 and +32768 or anything else you think might work. As an example, the key could be used to shift the letters of the alphabet to the right or left. For example, the letter "A" encoded with a key of "3" would produce the letter "D", three letters to its right in the alphabet. If the key is large enough that it goes past the end of the alphabet, the program should "wrap around" to a letter near the beginning of the alphabet. For example the letter "Z" encoded with a key of 3 would become "C". The decoding process should be done in reverse. You can use this scheme if you wish, but I challenge you to design one that I cannot crack! Program Restrictions: · Keep lower case letters as lower case and upper case letters as upper case. · Make no changes to all non-letters (i.e. numbers, punctuation, special characters, etc.) AND these non-letter characters do NOT need to be encrypted. Suggested Program structure: Your program MAY include the following four methods. It may have different/additional ones. Each method must identify its author through commenting. public static boolean isALetter (String letter) Inputs a one character string and returns True if the character is a letter (i.e. a to z or A to Z). Returns false if it is not. A function to check that the password or encryption key is valid. For example if you decide to use the algorithm above: public static int putKeylnRange ( int eneryptkey) • Takes any key in the integer range (-32767 to +32768) as input and returns a number between 1 and 26 (the range of the alphabet). (hint: check if input is within the alphabet) public static char encode (char letter, int eneryKey) Inputs one character and an integer key and returms an encoded character based on the key. public static char decode (char letter, int eneryKey)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Topic Video
Question
Please help me with this using java. A user must be able to input any phrase to encrypt and decrypt It must be you own idea and it should not be cracked by a teacher You can use of the methods said below
The Super Spy
Read This Carefully!! (For your eyes-only)
Your task, should you choose to accept it, is to design an application that
will accept any phrase as input and allow the user to encrypt or decrypt
it. The program should use one or two keys (two is highly recommended)
to encrypt the message. These keys could be made up of an integer - a
number between -32767 and +32768 or anything else you think might work. As an
example, the key could be used to shift the letters of the alphabet to the right or left.
For example, the letter “A" encoded with a key of "3" would produce the letter "D",
three letters to its right in the alphabet. If the key is large enough that it goes past the
end of the alphabet, the program should "wrap around" to a letter near the beginning
of the alphabet. For example the letter “Z" encoded with a key of 3 would become
"C". The decoding process should be done in reverse. You can use this scheme if you
wish, but I challenge you to design one that I cannot crack!
Program Restrictions:
· Keep lower case letters as lower case and upper case letters as upper case.
· Make no changes to all non-letters (i.e. numbers, punctuation, special characters,
etc.) AND these non-letter characters do NOT need to be encrypted.
Suggested Program structure: Your program MAY include the following four methods.
It may have different/additional ones. Each method must identify its author
through commenting.
public static boolean isALetter (String letter)
Inputs a one character string and returns True if the character is a letter (i.e. a to z or A to Z).
Returns false if it is not.
A function to check that the password or encryption key is valid. For example if you decide to use the algorithm above:
public static int putkeylnRange ( int encryptkey )
• Takes any key in the integer range (-32767 to +32768) as input and returns a number between 1 and 26 (the range
of the alphabet). (hint: check if input is within the alphabet)
public static char encode (char letter, int eneryKey )
• Inputs one character and an integer key and returns an encoded character based on the key.
public static char decode (char letter, int encrykey)
Transcribed Image Text:The Super Spy Read This Carefully!! (For your eyes-only) Your task, should you choose to accept it, is to design an application that will accept any phrase as input and allow the user to encrypt or decrypt it. The program should use one or two keys (two is highly recommended) to encrypt the message. These keys could be made up of an integer - a number between -32767 and +32768 or anything else you think might work. As an example, the key could be used to shift the letters of the alphabet to the right or left. For example, the letter “A" encoded with a key of "3" would produce the letter "D", three letters to its right in the alphabet. If the key is large enough that it goes past the end of the alphabet, the program should "wrap around" to a letter near the beginning of the alphabet. For example the letter “Z" encoded with a key of 3 would become "C". The decoding process should be done in reverse. You can use this scheme if you wish, but I challenge you to design one that I cannot crack! Program Restrictions: · Keep lower case letters as lower case and upper case letters as upper case. · Make no changes to all non-letters (i.e. numbers, punctuation, special characters, etc.) AND these non-letter characters do NOT need to be encrypted. Suggested Program structure: Your program MAY include the following four methods. It may have different/additional ones. Each method must identify its author through commenting. public static boolean isALetter (String letter) Inputs a one character string and returns True if the character is a letter (i.e. a to z or A to Z). Returns false if it is not. A function to check that the password or encryption key is valid. For example if you decide to use the algorithm above: public static int putkeylnRange ( int encryptkey ) • Takes any key in the integer range (-32767 to +32768) as input and returns a number between 1 and 26 (the range of the alphabet). (hint: check if input is within the alphabet) public static char encode (char letter, int eneryKey ) • Inputs one character and an integer key and returns an encoded character based on the key. public static char decode (char letter, int encrykey)
Expert Solution
steps

Step by step

Solved in 2 steps with 4 images

Blurred answer
Knowledge Booster
Instruction Format
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education