String Processing Eric Roberts CS 106A February 3, 2010.

Slides:



Advertisements
Similar presentations
Chapter 1 Object-Oriented Concepts. A class consists of variables called fields together with functions called methods that act on those fields.
Advertisements

1 Chapter Ten Modular Development. 2 Stepwise Refinement At first, simple programs consist of only one source file and one function (the function main.
Chapter 7 Strings F To process strings using the String class, the StringBuffer class, and the StringTokenizer class. F To use the String class to process.
Interfaces A Java interface is a collection
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Chapter 4: Writing Classes Presentation slides for Java Software Solutions Foundations of Program Design Second Edition by John Lewis and William Loftus.
Chapter 4: Writing Classes Presentation slides for Java Software Solutions Foundations of Program Design Third Edition by John Lewis and William Loftus.
© 2006 Pearson Addison-Wesley. All rights reserved2-1 Console Input Using the Scanner Class Starting with version 5.0, Java includes a class for doing.
©The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4 th Ed Chapter Chapter 9 Characters and Strings (sections ,
Methods in Java Selim Aksoy Bilkent University Department of Computer Engineering
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8—Strings and Characters The Art and Science of An Introduction to Computer Science ERIC S. ROBERTS Java Strings and Characters C H A P T E R 8.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 8 Characters and Strings. Principle of enumeration Computers tend to be good at working with numeric data. The ability to represent an integer.
1 CSC 221: Introduction to Programming Fall 2011 Text processing  Python strings  indexing & slicing, len function  functions vs. methods  string methods:
Introduction to Java Appendix A. Appendix A: Introduction to Java2 Chapter Objectives To understand the essentials of object-oriented programming in Java.
Chapter 2 How to Compile and Execute a Simple Program.
Functions in C++ Eric Roberts CS 106B January 9, 2013.
Chapter 8—Strings and Characters
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Computer Security coursework 2 Dr Alexei Vernitski.
Encryption: A Brief History Author: Margery Waldron.
Program A computer program (also software, or just a program) is a sequence of instructions written in a sequence to perform a specified task with a computer.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CSCI 5857: Encoding and Encryption
A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University ©2011 Pearson Prentice Hall ISBN Chapter 15 JavaScript.
CS50 Week 2. RESOURCES Office hours ( Lecture videos, slides, source code, and notes (
1 Week 12 l Overview of Streams and File I/O l Text File I/O Streams and File I/O.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CMSC 202 Java Console I/O. July 25, Introduction Displaying text to the user and allowing the user to enter text are fundamental operations performed.
Strings and Text File I/O (and Exception Handling) Corresponds with Chapters 8 and 17.
Objective : Students will gain understanding of how sentence structure and subtle overtones of words can help them understand and define them.
CS 115 OBJECT ORIENTED PROGRAMMING I LECTURE 9 GEORGE KOUTSOGIANNAKIS Copyright: 2014 Illinois Institute of Technology- George Koutsogiannakis 1.
Cryptography.
CS100A, Lecture 13, 15 October CS100A Lecture Oct Discussion of Prelim 2 (Tuesday, 20 October, 7:30-9PM) Rooms for Prelim 2 A-K: Hollister.
Expressions Eric Roberts CS 106A January 13, 2016.
 CSC111 Quick Revision. Problem Write a java code that read a string, then show a list of options to the user to select from them, where:  L to print.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Slides prepared by Rose Williams, Binghamton University Console Input and Output.
Keyboard and Screen I/O (Input/Output). Screen Output  System.out is an object that is part of the Java language. (Don’t worry yet about why there is.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Information and Computer Security CPIS 312 Lab 1
Data-Driven Programs Eric Roberts CS 106A February 26, 2016.
String Processing Eric Roberts CS 106A February 1, 2016.
Intelligent Data Systems Lab. Department of Computer Science & Engineering Practices 컴퓨터의 개념 및 실습 4 월 11 일.
Programming – Lecture 9 Strings and Characters (Chapter 8) Enumeration ASCII / Unicode, special characters Character class Character arithmetic Strings.
Substitution Ciphers.
Programming – Lecture 9 Strings and Characters (Chapter 8) Enumeration
Eric Roberts and Jerry Cain
Java Programming: From Problem Analysis to Program Design, 3e Chapter 7 User-Defined Methods.
Input/Output.
Chapter 7: User-Defined Functions II
Jerry Cain and Eric Roberts
Cryptography CS Principles January 19, 2017.
Programming – Lecture 9 Strings and Characters (Chapter 8) Enumeration
Characters Computers use the principle of enumeration to represent character data inside the memory of the machine. There are, after all, a finite number.
CS 106A, Lecture 9 Problem-Solving with Strings
Encryption and Decryption
Chapter 8—Strings and Characters
CS139 October 11, 2004.
slides courtesy of Eric Roberts
slides courtesy of Eric Roberts and Jerry Cain
OBJECT ORIENTED PROGRAMMING I LECTURE 9 GEORGE KOUTSOGIANNAKIS
String Processing 1 MIS 3406 Department of MIS Fox School of Business
Python Strings.
Presentation transcript:

String Processing Eric Roberts CS 106A February 3, 2010

Once upon a time...

Enigma

Cryptography at Bletchley Park I have twice taught courses at Stanford in Oxford when we visited Bletchley Park, which served as the headquarters for the British decryption effort during the war. The museum at Bletchley contains working models of the decryption machines designed by Alan Turing, just as they appeared in the Enigma trailer. The first time around, we were lucky to have Jean Valentine, who worked in Hut 6 during the war, as our host at Bletchley.

Stanford’s Contribution to Cryptography Stanford has long been in the forefront of cryptographic research. In 1976, Professor Martin Hellman and his students Ralph Merkle and Whitfield Diffie developed public-key cryptography, which revolutionized the process of coding messages. Although Hellman, Diffie, and Merkle were granted a U.S. patent for their work, it turns out that much the same technology was invented in England by the successor to the Government Code and Cipher School at Bletchley Park. That work, however, remained classified until the 1990s and had no commercial impact. Merkle/Hellman/Diffie in 1976

String Processing

Encryption Twas brillig, and the slithy toves,Did gyre and gimble in the wabe:Doo plpvb zhuh wkh erurjryhv,Lfr gax wvwx clgat vngeclzx. Twas brillig, and the slithy toves, Did gyre and gimble in the wabe: All mimsy were the borogoves, And the mome raths outgrabe. Twas brillig, and the slithy toves, Did gyre and gimble in the wabe: All mimsy were the borogoves, And the mome raths outgrabe. ABCDEFGHIJKLMNOPQRSTUVWXYZ LZDRXPEAJYBQWFVIHCTGNOMKSU

Creating a Caesar Cipher public void run() { println("This program implements a Caesar cipher."); int key = readInt("Character positions to shift: "); String plaintext = readLine("Enter a message: "); String ciphertext = encodeCaesarCipher(plaintext, key); println("Encoded message: " + ciphertext); } CaesarCipher skip simulation This program implements a Caesar cipher. Character positions to shift:3 Enter a message:JABBERWOCKY Encoded message: MDEEHUZRFNB str JABBERWOCKY key 3 result MDEEHUZRFNB private String encodeCaesarCipher(String str, int key) { if (key < 0) key = 26 - (-key % 26); String result = ""; for (int i = 0; i < str.length(); i++) { char ch = str.charAt(i); if (Character.isUpperCase(ch)) { ch = (char) ('A' + (ch - 'A' + key) % 26); } result += ch; } return result; } str JABBERWOCKY key 3 iresultch MMDMDEMDEEMDEEHMDEEHUMDEEHUZMDEEHUZRMDEEHUZRFMDEEHUZRFNMDEEHUZRFNB'J' 'M' 'A''D''B''E''B''E' 'H''R''U''W''Z''O''R''C''F''K''N''Y''B' public void run() { println("This program implements a Caesar cipher."); int key = readInt("Character positions to shift: "); String plaintext = readLine("Enter a message: "); String ciphertext = encodeCaesarCipher(plaintext, key); println("Encoded message: " + ciphertext); } ciphertext MDEEHUZRFNB plaintext JABBERWOCKY key 3

Exercise: Letter Substitution Cipher One of the simplest types of codes is a letter-substitution cipher, in which each letter in the original message is replaced by some different letter in the coded version of that message. In this type of cipher, the key is often presented as a sequence of 26 letters that shows how each of the letters in the standard alphabet are mapped into their enciphered counterparts: LetterSubstitutionCipher Letter-substitution cipher. Enter 26-letter key:LZDRXPEAJYBQWFVIHCTGNOMKSU Plaintext:LEWIS CARROLL Ciphertext: QXMJT DLCCVQQ ABCDEFGHIJKLMNOPQRSTUVWXYZ LZDRXPEAJYBQWFVIHCTGNOMKSU ||||||||||||||||||||||||||

A Case Study in String Processing Section 8.5 works through the design and implementation of a program to convert a sentence from English to Pig Latin. At least for this dialect, the Pig Latin version of a word is formed by applying the following rules: If the word begins with a consonant, you form the Pig Latin version by moving the initial consonant string to the end of the word and then adding the suffix ay, as follows: 1. scram scram scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr am scr amscram ay If the word begins with a vowel, you form the Pig Latin version simply by adding the suffix way, like this: 2. apple way

Starting at the Top public void run() { Tell the user what the program does. Ask the user for a line of text. Translate the line into Pig Latin and print it on the console. } In accordance with the principle of top-down design, it makes sense to start with the run method, which has the following pseudocode form: public void run() { println("This program translates a line into Pig Latin."); String line = readLine("Enter a line: "); println(translateLine(line)); } This pseudocode is easy to translate to Java, as long as you are willing to include calls to methods you have not yet written:

Designing translateLine The translateLine method must divide the input line into words, translate each word, and then reassemble those words. Although it is not hard to write code that divides a string into words, it is easier still to make use of existing facilities in the Java library to perform this task. One strategy is to use the StringTokenizer class in the java.util package, which divides a string into independent units called tokens. The client then reads these tokens one at a time. The set of tokens delivered by the tokenizer is called the token stream. The precise definition of what constitutes a token depends on the application. For the Pig Latin problem, tokens are either words or the characters that separate words, which are called delimiters. The application cannot work with the words alone, because the delimiter characters are necessary to ensure that the words don’t run together in the output.

The StringTokenizer Class The constructor for the StringTokenizer class takes three arguments, where the last two are optional: –A string indicating the source of the tokens. –A string which specifies the delimiter characters to use. By default, the delimiter characters are set to the whitespace characters. –A flag indicating whether the tokenizer should return delimiters as part of the token stream. By default, a StringTokenizer ignores the delimiters. Once you have created a StringTokenizer, you use it by setting up a loop with the following general form: while (tokenizer.hasMoreTokens()) { String token = tokenizer.nextToken(); code to process the token }

The translateLine Method private String translateLine(String line) { String result = ""; StringTokenizer tokenizer = new StringTokenizer(line, DELIMITERS, true); while (tokenizer.hasMoreTokens()) { String token = tokenizer.nextToken(); if (isWord(token)) { token = translateWord(token); } result += token; } return result; } The existence of the StringTokenizer class makes it easy to code the translateLine method, which looks like this: The DELIMITERS constant is a string containing all the legal punctuation marks to ensure that they aren’t combined with the words.

The translateWord Method private String translateWord(String word) { int vp = findFirstVowel(word); if (vp == -1) { return word; } else if (vp == 0) { return word + "way"; } else { String head = word.substring(0, vp); String tail = word.substring(vp); return tail + head + "ay"; } The translateWord method consists of the rules for forming Pig Latin words, translated into Java: The remaining methods ( isWord and findFirstVowel ) are both straightforward. The simulation on the following slide simply assumes that these methods work as intended.

The PigLatin Program public void run() { println("This program translates a line into Pig Latin."); String line = readLine("Enter a line: "); println( translateLine(line) ); } skip simulation line this is pig latin. This program translates a line into Pig Latin. isthay isway igpay atinlay. this is pig latin.Enter a line: PigLatin private String translateLine(String line) { String result = ""; StringTokenizer tokenizer = new StringTokenizer(line, DELIMITERS, true); while ( tokenizer.hasMoreTokens() ) { String token = tokenizer.nextToken(); if ( isWord(token) ) token = translateWord(token); result += token; } return result; } lineresulttoken tokenizer this is pig latin. thisispiglatin.isthay isthay isway isthay isway igpay isthay isway igpay atinlayisthay isway igpay atinlay.isthayiswayigpayatinlay this is pig latin. private String translateWord(String word) { int vp = findFirstVowel(word); if ( vp == -1 ) { return word; } else if ( vp == 0 ) { return word + "way"; } else { String head = word.substring(0, vp); String tail = word.substring(vp); return tail + head + "ay"; } word this tailheadvp isth2 private String translateWord(String word) { int vp = findFirstVowel(word); if ( vp == -1 ) { return word; } else if ( vp == 0 ) { return word + "way"; } else { String head = word.substring(0, vp); String tail = word.substring(vp); return tail + head + "ay"; } word is tailheadvp 0 private String translateWord(String word) { int vp = findFirstVowel(word); if ( vp == -1 ) { return word; } else if ( vp == 0 ) { return word + "way"; } else { String head = word.substring(0, vp); String tail = word.substring(vp); return tail + head + "ay"; } word pig tailheadvp igp1 private String translateWord(String word) { int vp = findFirstVowel(word); if ( vp == -1 ) { return word; } else if ( vp == 0 ) { return word + "way"; } else { String head = word.substring(0, vp); String tail = word.substring(vp); return tail + head + "ay"; } word latin tailheadvp atinl1 public void run() { println("This program translates a line into Pig Latin."); String line = readLine("Enter a line: "); println( translateLine(line) ); } line this is pig latin.

The End