Solving the Double Keyword Cipher

Descripción

Mapa Mental sobre Solving the Double Keyword Cipher, creado por Yasmin F el 22/11/2014.
Yasmin F
Mapa Mental por Yasmin F, actualizado hace más de 1 año
Yasmin F
Creado por Yasmin F hace casi 10 años
113
0

Resumen del Recurso

Solving the Double Keyword Cipher
  1. Iteration (loops)
    1. If the user hasn't inputted a message, then they will outputted with the same question until they do.
      1. If the user hasn't inputted a key, then they will outputted with the same question until they do.
      2. Selection (decision)
        1. To ask whether the user wishes to encrypt, or decrypt a message.
        2. Lists
          1. To be able to list letters of the alphabet.
            1. To be able to list the special characters that should be recognisable to my programme (without outputting errors)
            2. To be able to validate the work
              1. To ensure the appropriate messages are being inputted (particularly the individual characters).
              2. Modulus
                1. So the alphabet may loop together to make encryption and decryption more effective.
                2. Encryption
                  1. To fulfil the criteria of this task.
                    1. So the programme knows what function to apply to the message inputted.
                    2. Decryption
                      1. To fulfil the criteria of this task.
                        1. So the programme knows what function to apply to the message inputted.
                        2. Ask for a message/key
                          1. To fulfil the criteria of this task
                          2. Print
                            1. To output the final result (encrypted message/decrypted message.
                            2. Text file
                              1. I will need a text file to relay information from PyScripter onto a plain white file (for aesthetics).
                              Mostrar resumen completo Ocultar resumen completo

                              Similar

                              Types and Components of Computer Systems
                              Jess Peason
                              Input Devices
                              Jess Peason
                              A level Computing Quiz
                              Zacchaeus Snape
                              Weimar Revision
                              Tom Mitchell
                              Biology Revision - Y10 Mock
                              Tom Mitchell
                              GCSE History – Social Impact of the Nazi State in 1945
                              Ben C
                              Conferences of the Cold War
                              Alina A
                              Physics Revision
                              Tom Mitchell
                              GCSE Biology B2 (OCR)
                              Usman Rauf
                              Bay of Pigs Invasion : April 1961
                              Alina A
                              The Berlin Crisis
                              Alina A