Solving the Double Keyword Cipher

Description

Mind Map on Solving the Double Keyword Cipher, created by Yasmin F on 22/11/2014.
Yasmin F
Mind Map by Yasmin F, updated more than 1 year ago
Yasmin F
Created by Yasmin F over 9 years ago
113
0

Resource summary

Solving the Double Keyword Cipher
  1. Iteration (loops)
    1. If the user hasn't inputted a message, then they will outputted with the same question until they do.
      1. If the user hasn't inputted a key, then they will outputted with the same question until they do.
      2. Selection (decision)
        1. To ask whether the user wishes to encrypt, or decrypt a message.
        2. Lists
          1. To be able to list letters of the alphabet.
            1. To be able to list the special characters that should be recognisable to my programme (without outputting errors)
            2. To be able to validate the work
              1. To ensure the appropriate messages are being inputted (particularly the individual characters).
              2. Modulus
                1. So the alphabet may loop together to make encryption and decryption more effective.
                2. Encryption
                  1. To fulfil the criteria of this task.
                    1. So the programme knows what function to apply to the message inputted.
                    2. Decryption
                      1. To fulfil the criteria of this task.
                        1. So the programme knows what function to apply to the message inputted.
                        2. Ask for a message/key
                          1. To fulfil the criteria of this task
                          2. Print
                            1. To output the final result (encrypted message/decrypted message.
                            2. Text file
                              1. I will need a text file to relay information from PyScripter onto a plain white file (for aesthetics).
                              Show full summary Hide full summary

                              Similar

                              Types and Components of Computer Systems
                              Jess Peason
                              Input Devices
                              Jess Peason
                              A level Computing Quiz
                              Zacchaeus Snape
                              Weimar Revision
                              Tom Mitchell
                              Biology Revision - Y10 Mock
                              Tom Mitchell
                              GCSE AQA Biology - Unit 2
                              James Jolliffe
                              GCSE AQA Physics - Unit 3
                              James Jolliffe
                              Conferences of the Cold War
                              Alina A
                              GCSE Biology AQA
                              isabellabeaumont
                              Physics Revision
                              Tom Mitchell
                              Bay of Pigs Invasion : April 1961
                              Alina A