It's UWAweek 47

help3007

This forum is provided to promote discussion amongst students enrolled in CITS3007 Secure Coding. If posting a question, it's suggested you check first whether your question is answered in the unit Frequently Asked Questions (FAQ) list, and use the search box (on the right) to see if an answer to your question has already been posted.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message.

Note that any posts must comply with the UWA Code of Conduct and the UWA Academic Conduct Policy. That means you should (a) treat everyone with respect and courtesy, and (b) not post your solutions to an assessment that's in progress.

If asking a programming question, it's recommended you read How do I ask a good question? If reporting or troubleshooting a bug in software used in the unit, it's recommend you read How to report bugs effectively.
Displaying the 5 articles in this topic
Showing 5 of 170 articles.
Currently 37 other people reading this forum.


 UWA week 21 (1st semester, week 12) ↓
SVG not supported

Login to reply

👍?
helpful
12:53pm Wed 22nd May, ANONYMOUS

Hi, When we are validating the key input for the cli function, the spec only mentions that we must check if it is an appropriate int for Caesar encryption and decryption. It does not state about checking if Vigenere is given an appropriate string where each of its characters are in the acceptable range, and is non-empty. Is this implied or does cli not have to worry about this? Thanks


SVG not supported

Login to reply

👍?
helpful
1:31pm Wed 22nd May, ANONYMOUS

I also have a follow up question regarding the Vigenere cipher, if a character does not fall within the acceptable encrypting range and we have to copy it over, do we still advance in our progression along the key or do we not change our position until we use it? For example, if HeLLO was to be encrypted and KEY is the key, would we do: HeLLO KEYKE or HeLLO KKEYK Thanks again


SVG not supported

Login to reply

👍?
helpful
3:41pm Wed 22nd May, Arran S.

You are correct - that's an error in the specification, since it fails to state what you should do in such a case and is therefore incomplete. Well spotted :) You should indeed check that the Vigenère key meets the criteria for validity, and should print an error message and return 1 if it does not.

(Although there's only a very limited range of things you could do, without breaching some other portion of the specification. It would be incorrect for your cli function to ever call the Vigenère functions with arguments that breached the preconditions, so you mustn't do that. And the only way to avoid doing so is by validating the argument passed in cli.)

Cheers

Arran

Hi,

When we are validating the key input for the cli function, the spec only mentions that we must check if it is an appropriate int for Caesar encryption and decryption.

It does not state about checking if Vigenere is given an appropriate string where each of its characters are in the acceptable range, and is non-empty.

Is this implied or does cli not have to worry about this?

Thanks


SVG not supported

Login to reply

👍?
helpful
3:52pm Wed 22nd May, Arran S.

Your question is already answered in the documentation for the Vigenère functions.

Cheers

Arran

ANONYMOUS wrote:

I also have a follow up question regarding the Vigenere cipher, if a character does not fall within the acceptable encrypting range and we have to copy it over, do we still advance in our progression along the key or do we not change our position until we use it?

For example, if HeLLO was to be encrypted and KEY is the key, would we do:

HeLLO KEYKE

or

HeLLO KKEYK

Thanks again


SVG not supported

Login to reply

👍?
helpful
8:09pm Wed 22nd May, ANONYMOUS

Yes, I understand these now, thanks again!

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy