-
-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
5d54751
commit dee22b5
Showing
15 changed files
with
3,763 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
exercises/practice/affine-cipher/.docs/instructions.append.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Instructions append | ||
|
||
If the input is invalid, output an empty string. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,74 @@ | ||
# Instructions | ||
|
||
Create an implementation of the affine cipher, an ancient encryption system created in the Middle East. | ||
|
||
The affine cipher is a type of monoalphabetic substitution cipher. | ||
Each character is mapped to its numeric equivalent, encrypted with a mathematical function and then converted to the letter relating to its new numeric value. | ||
Although all monoalphabetic ciphers are weak, the affine cipher is much stronger than the atbash cipher, because it has many more keys. | ||
|
||
[//]: # " monoalphabetic as spelled by Merriam-Webster, compare to polyalphabetic " | ||
|
||
## Encryption | ||
|
||
The encryption function is: | ||
|
||
```text | ||
E(x) = (ai + b) mod m | ||
``` | ||
|
||
Where: | ||
|
||
- `i` is the letter's index from `0` to the length of the alphabet - 1. | ||
- `m` is the length of the alphabet. | ||
For the Roman alphabet `m` is `26`. | ||
- `a` and `b` are integers which make up the encryption key. | ||
|
||
Values `a` and `m` must be _coprime_ (or, _relatively prime_) for automatic decryption to succeed, i.e., they have number `1` as their only common factor (more information can be found in the [Wikipedia article about coprime integers][coprime-integers]). | ||
In case `a` is not coprime to `m`, your program should indicate that this is an error. | ||
Otherwise it should encrypt or decrypt with the provided key. | ||
|
||
For the purpose of this exercise, digits are valid input but they are not encrypted. | ||
Spaces and punctuation characters are excluded. | ||
Ciphertext is written out in groups of fixed length separated by space, the traditional group size being `5` letters. | ||
This is to make it harder to guess encrypted text based on word boundaries. | ||
|
||
## Decryption | ||
|
||
The decryption function is: | ||
|
||
```text | ||
D(y) = (a^-1)(y - b) mod m | ||
``` | ||
|
||
Where: | ||
|
||
- `y` is the numeric value of an encrypted letter, i.e., `y = E(x)` | ||
- it is important to note that `a^-1` is the modular multiplicative inverse (MMI) of `a mod m` | ||
- the modular multiplicative inverse only exists if `a` and `m` are coprime. | ||
|
||
The MMI of `a` is `x` such that the remainder after dividing `ax` by `m` is `1`: | ||
|
||
```text | ||
ax mod m = 1 | ||
``` | ||
|
||
More information regarding how to find a Modular Multiplicative Inverse and what it means can be found in the [related Wikipedia article][mmi]. | ||
|
||
## General Examples | ||
|
||
- Encrypting `"test"` gives `"ybty"` with the key `a = 5`, `b = 7` | ||
- Decrypting `"ybty"` gives `"test"` with the key `a = 5`, `b = 7` | ||
- Decrypting `"ybty"` gives `"lqul"` with the wrong key `a = 11`, `b = 7` | ||
- Decrypting `"kqlfd jzvgy tpaet icdhm rtwly kqlon ubstx"` gives `"thequickbrownfoxjumpsoverthelazydog"` with the key `a = 19`, `b = 13` | ||
- Encrypting `"test"` with the key `a = 18`, `b = 13` is an error because `18` and `26` are not coprime | ||
|
||
## Example of finding a Modular Multiplicative Inverse (MMI) | ||
|
||
Finding MMI for `a = 15`: | ||
|
||
- `(15 * x) mod 26 = 1` | ||
- `(15 * 7) mod 26 = 1`, ie. `105 mod 26 = 1` | ||
- `7` is the MMI of `15 mod 26` | ||
|
||
[mmi]: https://en.wikipedia.org/wiki/Modular_multiplicative_inverse | ||
[coprime-integers]: https://en.wikipedia.org/wiki/Coprime_integers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
{ | ||
"authors": [ | ||
"keiravillekode" | ||
], | ||
"files": { | ||
"solution": [ | ||
"affine_cipher.s" | ||
], | ||
"test": [ | ||
"affine_cipher_test.c" | ||
], | ||
"example": [ | ||
".meta/example.s" | ||
] | ||
}, | ||
"blurb": "Create an implementation of the Affine cipher, an ancient encryption algorithm from the Middle East.", | ||
"source": "Wikipedia", | ||
"source_url": "https://en.wikipedia.org/wiki/Affine_cipher" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
.data | ||
inverses: .byte 0, 1, 0, 9, 0, 21, 0, 15, 0, 3, 0, 19, 0, 0, 0, 7, 0, 23, 0, 11, 0, 5, 0, 17, 0, 25 | ||
|
||
.text | ||
.globl encode | ||
.globl decode | ||
|
||
/* extern void encode(char *buffer, const char *phrase, unsigned a, unsigned b); */ | ||
encode: | ||
adrp x12, inverses | ||
add x12, x12, :lo12:inverses | ||
ldrb w9, [x12, x2] | ||
cbz w9, end | ||
|
||
mov w9, w2 /* a */ | ||
mov w10, w3 /* b */ | ||
mov x2, #5 /* group length */ | ||
b process | ||
|
||
/* extern void decode(char *buffer, const char *phrase, unsigned a, unsigned b); */ | ||
decode: | ||
adrp x12, inverses | ||
add x12, x12, :lo12:inverses | ||
ldrb w9, [x12, x2] /* inverse of a */ | ||
cbz w9, end | ||
|
||
sub w10, w3, #4082 /* subtract from `b` a multiple of 26, producing a negative */ | ||
mneg w10, w10, w9 /* inverse of `a`, multiplied by the additive inverse of `b` */ | ||
mov x2, #-1 /* no groups */ | ||
b process | ||
|
||
end: | ||
strb wzr, [x0] /* store null terminator */ | ||
ret | ||
|
||
process: | ||
mov x3, x2 /* remaining letters in group */ | ||
mov w6, #' ' | ||
mov w7, #26 | ||
|
||
.read: | ||
ldrb w4, [x1], #1 /* load byte, post-increment */ | ||
cbz w4, end | ||
|
||
sub w5, w4, #'0' | ||
cmp w5, #10 | ||
blo .accept /* unsigned < */ | ||
|
||
orr w5, w4, #32 /* force lower case */ | ||
sub w5, w5, #'a' | ||
cmp w5, w7 | ||
bhs .read /* unsigned >= */ | ||
|
||
madd w5, w9, w5, w10 /* a * letter + b */ | ||
udiv w12, w5, w7 /* divide by 26 */ | ||
msub w4, w12, w7, w5 /* remainder */ | ||
add w4, w4, #'a' | ||
|
||
.accept: | ||
cbnz x3, .write | ||
|
||
strb w6, [x0], #1 /* store space, post-increment */ | ||
mov x3, x2 /* remaining letters in group */ | ||
|
||
.write: | ||
strb w4, [x0], #1 /* store letter or digit, post-increment */ | ||
sub x3, x3, 1 /* decrement remaining letters in group */ | ||
b .read |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
# This is an auto-generated file. | ||
# | ||
# Regenerating this file via `configlet sync` will: | ||
# - Recreate every `description` key/value pair | ||
# - Recreate every `reimplements` key/value pair, where they exist in problem-specifications | ||
# - Remove any `include = true` key/value pair (an omitted `include` key implies inclusion) | ||
# - Preserve any other key/value pair | ||
# | ||
# As user-added comments (using the # character) will be removed when this file | ||
# is regenerated, comments can be added via a `comment` key. | ||
|
||
[2ee1d9af-1c43-416c-b41b-cefd7d4d2b2a] | ||
description = "encode -> encode yes" | ||
|
||
[785bade9-e98b-4d4f-a5b0-087ba3d7de4b] | ||
description = "encode -> encode no" | ||
|
||
[2854851c-48fb-40d8-9bf6-8f192ed25054] | ||
description = "encode -> encode OMG" | ||
|
||
[bc0c1244-b544-49dd-9777-13a770be1bad] | ||
description = "encode -> encode O M G" | ||
|
||
[381a1a20-b74a-46ce-9277-3778625c9e27] | ||
description = "encode -> encode mindblowingly" | ||
|
||
[6686f4e2-753b-47d4-9715-876fdc59029d] | ||
description = "encode -> encode numbers" | ||
|
||
[ae23d5bd-30a8-44b6-afbe-23c8c0c7faa3] | ||
description = "encode -> encode deep thought" | ||
|
||
[c93a8a4d-426c-42ef-9610-76ded6f7ef57] | ||
description = "encode -> encode all the letters" | ||
|
||
[0673638a-4375-40bd-871c-fb6a2c28effb] | ||
description = "encode -> encode with a not coprime to m" | ||
|
||
[3f0ac7e2-ec0e-4a79-949e-95e414953438] | ||
description = "decode -> decode exercism" | ||
|
||
[241ee64d-5a47-4092-a5d7-7939d259e077] | ||
description = "decode -> decode a sentence" | ||
|
||
[33fb16a1-765a-496f-907f-12e644837f5e] | ||
description = "decode -> decode numbers" | ||
|
||
[20bc9dce-c5ec-4db6-a3f1-845c776bcbf7] | ||
description = "decode -> decode all the letters" | ||
|
||
[623e78c0-922d-49c5-8702-227a3e8eaf81] | ||
description = "decode -> decode with no spaces in input" | ||
|
||
[58fd5c2a-1fd9-4563-a80a-71cff200f26f] | ||
description = "decode -> decode with too many spaces" | ||
|
||
[b004626f-c186-4af9-a3f4-58f74cdb86d5] | ||
description = "decode -> decode with a not coprime to m" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
AS = aarch64-linux-gnu-as | ||
CC = aarch64-linux-gnu-gcc | ||
|
||
CFLAGS = -g -Wall -Wextra -pedantic -Werror | ||
LDFLAGS = | ||
|
||
ALL_LDFLAGS = -pie -Wl,--fatal-warnings | ||
|
||
ALL_CFLAGS = -std=c99 -fPIE $(CFLAGS) | ||
ALL_LDFLAGS += $(LDFLAGS) | ||
|
||
C_OBJS = $(patsubst %.c,%.o,$(wildcard *.c)) | ||
AS_OBJS = $(patsubst %.s,%.o,$(wildcard *.s)) | ||
ALL_OBJS = $(filter-out example.o,$(C_OBJS) $(AS_OBJS) vendor/unity.o) | ||
|
||
CC_CMD = $(CC) $(ALL_CFLAGS) -c -o $@ $< | ||
|
||
all: tests | ||
qemu-aarch64 -L /usr/aarch64-linux-gnu ./$< | ||
|
||
tests: $(ALL_OBJS) | ||
@$(CC) $(ALL_CFLAGS) $(ALL_LDFLAGS) -o $@ $(ALL_OBJS) | ||
|
||
%.o: %.s | ||
@$(AS) -o $@ $< | ||
|
||
%.o: %.c | ||
@$(CC_CMD) | ||
|
||
vendor/unity.o: vendor/unity.c vendor/unity.h vendor/unity_internals.h | ||
@$(CC_CMD) | ||
|
||
clean: | ||
@rm -f *.o vendor/*.o tests | ||
|
||
.PHONY: all clean |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
.text | ||
.globl encode | ||
.globl decode | ||
|
||
encode: | ||
ret | ||
|
||
decode: | ||
ret |
Oops, something went wrong.