In this project, you’ll write a program that takes a plaintext sentence like
THE WEATHER IS NICE TODAY and converts it to a ciphertext sentence like
GUR JRNGURE VF AVPR GBQNL. The program can also convert ciphertext back to plaintext, when given the right key.
Don’t worry, you’re about to learn what those words mean!
The science of writing secret codes is called cryptography. For thousands of years cryptography has made secret messages that only the sender and recipient could read, even if someone captured the messenger and read the coded message. A secret code system is called a cipher. The cipher used by the program you’re about to build is called the Caesar cipher.
In cryptography, we call the message that we want to be secret the plaintext. The plaintext could look like this:
HELLO THERE! THE KEYS TO THE HOUSE ARE HIDDEN UNDER THE FLOWER POT.
Converting the plaintext into the encoded message is called encrypting the plaintext. The plaintext is encrypted into the ciphertext. The ciphertext looks like random letters, and we cannot understand what the original plaintext was just by looking at the ciphertext. Here is the previous example encrypted into ciphertext:
YVCCF KYVIV! KYV BVPJ KF KYV YFLJV RIV YZUUVE LEUVI KYV WCFNVI GFK.
But if you know about the cipher used to encrypt the message, you can decrypt the ciphertext back to the plaintext. (Decryption is the opposite of encryption.)
Many ciphers also use keys. Keys are secret values that let you decrypt ciphertext that was encrypted using a specific cipher. Think of the cipher as being like a door lock. You can only unlock it with a particular key.
The key for the Caesar Cipher will be a number from 1 to 26. Unless you know the key (that is, know the number used to encrypt the message), you won’t be able to decrypt the secret code.
The Caesar Cipher was one of the earliest ciphers ever invented. In this cipher, you encrypt a message by taking each letter in the message (in cryptography, these letters are called symbols because they can be letters, numbers, or any other sign) and replacing it with a “shifted” letter. If you shift the letter A by one space, you get the letter B. If you shift the letter A by two spaces, you get the letter C.
Here’s a picture of some letters shifted over by three spaces:
To get each shifted letter, draw out a row of boxes with each letter of the alphabet. Then draw a second row of boxes under it, but start a certain number (this number is the key) of spaces over. After the letters at the end, wrap around back to the start of the boxes.
Here’s an example with the letters shifted by three spaces:
The number of spaces you shift is the key in the Caesar Cipher. The example above shows the letter translations for the key 3.
If you encrypt the plaintext
“HOWDY” with a key of 3, then:
The ciphertext of
“HOWDY” with key 3 becomes
We will keep any non-letter characters the same. To decrypt
“KRZGB” with the key 3, we go from the bottom boxes back to the top:
How do we implement this shifting of the letters as code? We can do this by representing each letter as a number called an ordinal, and then adding or subtracting from this number to form a new ordinal (and a new letter). ASCII (pronounced “ask-ee” and stands for American Standard Code for Information Interchange) is a code that connects each character to a number between 32 and 126.
The capital letters “A” through “Z” have the ASCII numbers 65 through 90. The lowercase letters “a” through “z” have the ASCII numbers 97 through 122. The numeric digits “0” through “9” have the ASCII numbers 48 through 57.
So if you wanted to shift “A” by three spaces, you would do the following:
This might feel weird at first, but you’ll get used to it. Most of the ASCII codes between 0 and 31 are junk left over from the days when computers were giant room-sized machines controlled by jury-rigged typewriters.
Here’s the full ASCII table from asciitable.com - don’t worry, you don’t need to memorize this or anything, I’m just showing it to you in case you find it helpful. I’ve highlighted the section of the table that concerns the uppercase letters A-Z. You only care about the “Dec” (decimal) and “Char” (character) columns in this table.
That’s the whole thing! Notice how e.g. uppercase
J has the ASCII code 74, and lowercase
j has the ASCII code 106.
Python comes with the
ord() function, which lets you convert a letter to its corresponding ordinal number:
To go from an ordinal number back to a letter, you can use the
Let’s try shifting the letter
H over by 3, like we did in the
"Howdy" example above:
print(chr(ord('H') + 3))
It turns into
K, just like we expected!
chr() are going to be your best friends while you’re working on this project.
You’ll probably want to use a
for loop at some point in your program - here’s how you can use a
for loop to do something to each letter of a string:
some_letters = "ABCDEFG" lowercased_letters = "" for letter in some_letters: lowercased_letters = lowercased_letters + chr(ord(letter) + 32) print(lowercased_letters)
That chunk of code lowercases a string, one letter at a time - you might end up doing something similar (but different!) when you’re building up your program’s
If your program is given some plaintext that includes numbers, or lowercase letters, or punctuation marks like
$ or anything that’s not a letter from
Z, it should leave that character unmodified. For example, if given a plaintext string of
HOWDY! Hello. and a key of
5, your program should output the ciphertext
Note that in that message, the
W ends up “wrapping around” to become a
B when it’s encrypted.
Your program should allow the user to both encrypt messages and decrypt them. Your program should look exactly like this when it’s run:
If the user inputs an invalid mode (i.e. something that’s not “encrypt” or “decrypt”), it’s fine if your program crashes.
If the user inputs an invalid key (i.e. something that’s not a number between 0 and 26), it’s fine if your program crashes.
Submit a file called
On the first line of that file, write a comment with your name on it, like this:
# JR Heard
Remember to follow this class’s style guide.
Here are some more features to add to your program once you get basic encryption and decryption working. Do any or all of them!
Make your program work with uppercase and lowercase characters, like this:
When I did this, I ended up switching away from
chr(), and instead made a string like
transformable_characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz' and had my code do stuff based on the position of each letter of the message in my
transformable_characters string. Here’s how you can find the first position of a letter in a string in Python:
# 'l' is in 'Hello', so this evaluates to number 2. print('Hello'.find('l')) # 'z' isn't in 'Hello', so this evalutes to -1, which is # Python's way of saying: I looked for this but couldn't find it! print('Hello'.find('z'))
Add a “brute force” mode that lets you try to decrypt a message even if you don’t know the right key for it - notice the correct translation on Line 5:
This can be done using nested for loops or functions (we haven’t officially covered functions in class yet, but you are welcome to use them if you know how).
This is my favorite one: enhance your program’s “brute force” mode so that it can automatically detect the correct key:
You can do this however you want. Be creative! My solution involved using this text file, which is a list of all of the English words in the 1934 edition of Webster’s Second International Dictionary.
Since internet use will be limited for the final project, if you don’t know how to work with text files you will probably want to stick with the other features for today. You can also come back and add smart brute force another day if it seems intriguing.
If you’d like to figure out how to open a text file in Python and get all the lines out of it, Google around until you find a solution - you can always ask me for help if you get stuck, but I think you’d be surprised how far you can get by just Googling stuff!