Write two computer programs to simulate an Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” (Hint: the random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs.)
Thats a very interesting assignment, What have you done so far ?
Which algorithm are you planning to use ?
I would suggest to look at one time pad, it matches your requirement as far as i understand. Also note that pseudorandom number generators is a huge topic by itself.
I'm not sure how much Java programming you have done, but if you're looking for how to create a program, you can look here and here. If you're looking for how to program this specific problem, I would begin by writing out the steps you would take to solve the problem one simple step at a time.
All things are lawful, but not all things are profitable.
jessica stud wrote:I am asking how I would go about starting this? What are the basics I have to research to get this code going?
You have to give us a little more context so we know what "this" means. I hope you don't mean "How do I get this code going with EVE?" because you probably won't get much help on that from these forums.
What discussions/learning materials do you have from your class about encryption/decryption algorithms? Is that something that was discussed in your class? Do you have any example code you can use to pattern your solution after? Is there a specific library of utility classes for encryption/decryption/random number generation that your instructor has provided for you to use for this or do you have to use classes from the Standard Java API? I certainly hope you're not expected to write your own utilities to do all that.
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
Thank you. Found out eve is only a site used to transfer it. The project requires a regular java code. 3 different files to be exact. The encryption program accepts inputs from an existing text file, called “letter.txt.”
The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.”
by the pseudorandom number generators in both encryption and decryption programs