Skip to content

Commit fd5799d

Browse files
committed
Sync docs and metadata
1 parent ad2cc24 commit fd5799d

File tree

9 files changed

+125
-87
lines changed

9 files changed

+125
-87
lines changed

exercises/practice/affine-cipher/.docs/instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Where:
2020

2121
- `i` is the letter's index from `0` to the length of the alphabet - 1.
2222
- `m` is the length of the alphabet.
23-
For the Roman alphabet `m` is `26`.
23+
For the Latin alphabet `m` is `26`.
2424
- `a` and `b` are integers which make up the encryption key.
2525

2626
Values `a` and `m` must be _coprime_ (or, _relatively prime_) for automatic decryption to succeed, i.e., they have number `1` as their only common factor (more information can be found in the [Wikipedia article about coprime integers][coprime-integers]).

exercises/practice/eliuds-eggs/.docs/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The position information encoding is calculated as follows:
5858

5959
### Decimal number on the display
6060

61-
16
61+
8
6262

6363
### Actual eggs in the coop
6464

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Instructions
22

3-
Determine whether a credit card number is valid according to the [Luhn formula][luhn].
3+
Determine whether a number is valid according to the [Luhn formula][luhn].
44

55
The number will be provided as a string.
66

@@ -10,54 +10,59 @@ Strings of length 1 or less are not valid.
1010
Spaces are allowed in the input, but they should be stripped before checking.
1111
All other non-digit characters are disallowed.
1212

13-
### Example 1: valid credit card number
13+
## Examples
1414

15-
```text
16-
4539 3195 0343 6467
17-
```
15+
### Valid credit card number
1816

19-
The first step of the Luhn algorithm is to double every second digit, starting from the right.
20-
We will be doubling
17+
The number to be checked is `4539 3195 0343 6467`.
18+
19+
The first step of the Luhn algorithm is to start at the end of the number and double every second digit, beginning with the second digit from the right and moving left.
2120

2221
```text
2322
4539 3195 0343 6467
2423
↑ ↑ ↑ ↑ ↑ ↑ ↑ ↑ (double these)
2524
```
2625

27-
If doubling the number results in a number greater than 9 then subtract 9 from the product.
28-
The results of our doubling:
26+
If the result of doubling a digit is greater than 9, we subtract 9 from that result.
27+
We end up with:
2928

3029
```text
3130
8569 6195 0383 3437
3231
```
3332

34-
Then sum all of the digits:
33+
Finally, we sum all digits.
34+
If the sum is evenly divisible by 10, the original number is valid.
3535

3636
```text
37-
8+5+6+9+6+1+9+5+0+3+8+3+3+4+3+7 = 80
37+
8 + 5 + 6 + 9 + 6 + 1 + 9 + 5 + 0 + 3 + 8 + 3 + 3 + 4 + 3 + 7 = 80
3838
```
3939

40-
If the sum is evenly divisible by 10, then the number is valid.
41-
This number is valid!
40+
80 is evenly divisible by 10, so number `4539 3195 0343 6467` is valid!
41+
42+
### Invalid Canadian SIN
43+
44+
The number to be checked is `066 123 468`.
4245

43-
### Example 2: invalid credit card number
46+
We start at the end of the number and double every second digit, beginning with the second digit from the right and moving left.
4447

4548
```text
46-
8273 1232 7352 0569
49+
066 123 478
50+
↑ ↑ ↑ ↑ (double these)
4751
```
4852

49-
Double the second digits, starting from the right
53+
If the result of doubling a digit is greater than 9, we subtract 9 from that result.
54+
We end up with:
5055

5156
```text
52-
7253 2262 5312 0539
57+
036 226 458
5358
```
5459

55-
Sum the digits
60+
We sum the digits:
5661

5762
```text
58-
7+2+5+3+2+2+6+2+5+3+1+2+0+5+3+9 = 57
63+
0 + 3 + 6 + 2 + 2 + 6 + 4 + 5 + 8 = 36
5964
```
6065

61-
57 is not evenly divisible by 10, so this number is not valid.
66+
36 is not evenly divisible by 10, so number `066 123 478` is not valid!
6267

6368
[luhn]: https://en.wikipedia.org/wiki/Luhn_algorithm

exercises/practice/luhn/.docs/introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22

33
At the Global Verification Authority, you've just been entrusted with a critical assignment.
44
Across the city, from online purchases to secure logins, countless operations rely on the accuracy of numerical identifiers like credit card numbers, bank account numbers, transaction codes, and tracking IDs.
5-
The Luhn algorithm is a simple checksum formula used to ensure these numbers are valid and error-free.
5+
The Luhn algorithm is a simple checksum formula used to help identify mistyped numbers.
66

77
A batch of identifiers has just arrived on your desk.
88
All of them must pass the Luhn test to ensure they're legitimate.
9-
If any fail, they'll be flagged as invalid, preventing errors or fraud, such as incorrect transactions or unauthorized access.
9+
If any fail, they'll be flagged as invalid, preventing mistakes such as incorrect transactions or failed account verifications.
1010

1111
Can you ensure this is done right? The integrity of many services depends on you.

exercises/practice/meetup/.docs/instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Your task is to find the exact date of a meetup, given a month, year, weekday and week.
44

5-
There are five week values to consider: `first`, `second`, `third`, `fourth`, `last`, `teenth`.
5+
There are six week values to consider: `first`, `second`, `third`, `fourth`, `last`, `teenth`.
66

77
For example, you might be asked to find the date for the meetup on the first Monday in January 2018 (January 1, 2018).
88

exercises/practice/phone-number/.docs/instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Instructions
22

3-
Clean up user-entered phone numbers so that they can be sent SMS messages.
3+
Clean up phone numbers so that they can be sent SMS messages.
44

55
The **North American Numbering Plan (NANP)** is a telephone numbering system used by many countries in North America like the United States, Canada or Bermuda.
66
All NANP-countries share the same international country code: `1`.

exercises/practice/sieve/.docs/instructions.md

Lines changed: 67 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,37 +6,96 @@ A prime number is a number larger than 1 that is only divisible by 1 and itself.
66
For example, 2, 3, 5, 7, 11, and 13 are prime numbers.
77
By contrast, 6 is _not_ a prime number as it not only divisible by 1 and itself, but also by 2 and 3.
88

9-
To use the Sieve of Eratosthenes, you first create a list of all the numbers between 2 and your given number.
10-
Then you repeat the following steps:
9+
To use the Sieve of Eratosthenes, first, write out all the numbers from 2 up to and including your given number.
10+
Then, follow these steps:
1111

12-
1. Find the next unmarked number in your list (skipping over marked numbers).
12+
1. Find the next unmarked number (skipping over marked numbers).
1313
This is a prime number.
1414
2. Mark all the multiples of that prime number as **not** prime.
1515

16-
You keep repeating these steps until you've gone through every number in your list.
16+
Repeat the steps until you've gone through every number.
1717
At the end, all the unmarked numbers are prime.
1818

1919
~~~~exercism/note
20-
The tests don't check that you've implemented the algorithm, only that you've come up with the correct list of primes.
21-
To check you are implementing the Sieve correctly, a good first test is to check that you do not use division or remainder operations.
20+
The Sieve of Eratosthenes marks off multiples of each prime using addition (repeatedly adding the prime) or multiplication (directly computing its multiples), rather than checking each number for divisibility.
21+
22+
The tests don't check that you've implemented the algorithm, only that you've come up with the correct primes.
2223
~~~~
2324

2425
## Example
2526

2627
Let's say you're finding the primes less than or equal to 10.
2728

28-
- List out 2, 3, 4, 5, 6, 7, 8, 9, 10, leaving them all unmarked.
29+
- Write out 2, 3, 4, 5, 6, 7, 8, 9, 10, leaving them all unmarked.
30+
31+
```text
32+
2 3 4 5 6 7 8 9 10
33+
```
34+
2935
- 2 is unmarked and is therefore a prime.
3036
Mark 4, 6, 8 and 10 as "not prime".
37+
38+
```text
39+
2 3 [4] 5 [6] 7 [8] 9 [10]
40+
41+
```
42+
3143
- 3 is unmarked and is therefore a prime.
3244
Mark 6 and 9 as not prime _(marking 6 is optional - as it's already been marked)_.
45+
46+
```text
47+
2 3 [4] 5 [6] 7 [8] [9] [10]
48+
49+
```
50+
3351
- 4 is marked as "not prime", so we skip over it.
52+
53+
```text
54+
2 3 [4] 5 [6] 7 [8] [9] [10]
55+
56+
```
57+
3458
- 5 is unmarked and is therefore a prime.
3559
Mark 10 as not prime _(optional - as it's already been marked)_.
60+
61+
```text
62+
2 3 [4] 5 [6] 7 [8] [9] [10]
63+
64+
```
65+
3666
- 6 is marked as "not prime", so we skip over it.
67+
68+
```text
69+
2 3 [4] 5 [6] 7 [8] [9] [10]
70+
71+
```
72+
3773
- 7 is unmarked and is therefore a prime.
74+
75+
```text
76+
2 3 [4] 5 [6] 7 [8] [9] [10]
77+
78+
```
79+
3880
- 8 is marked as "not prime", so we skip over it.
81+
82+
```text
83+
2 3 [4] 5 [6] 7 [8] [9] [10]
84+
85+
```
86+
3987
- 9 is marked as "not prime", so we skip over it.
88+
89+
```text
90+
2 3 [4] 5 [6] 7 [8] [9] [10]
91+
92+
```
93+
4094
- 10 is marked as "not prime", so we stop as there are no more numbers to check.
4195

42-
You've examined all numbers and found 2, 3, 5, and 7 are still unmarked, which means they're the primes less than or equal to 10.
96+
```text
97+
2 3 [4] 5 [6] 7 [8] [9] [10]
98+
99+
```
100+
101+
You've examined all the numbers and found that 2, 3, 5, and 7 are still unmarked, meaning they're the primes less than or equal to 10.
Lines changed: 26 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,40 @@
11
# Instructions
22

3-
Implement a simple shift cipher like Caesar and a more secure substitution cipher.
3+
Create an implementation of the [Vigenère cipher][wiki].
4+
The Vigenère cipher is a simple substitution cipher.
45

5-
## Step 1
6+
## Cipher terminology
67

7-
"If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out.
8-
If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others."
9-
—Suetonius, Life of Julius Caesar
8+
A cipher is an algorithm used to encrypt, or encode, a string.
9+
The unencrypted string is called the _plaintext_ and the encrypted string is called the _ciphertext_.
10+
Converting plaintext to ciphertext is called _encoding_ while the reverse is called _decoding_.
1011

11-
Ciphers are very straight-forward algorithms that allow us to render text less readable while still allowing easy deciphering.
12-
They are vulnerable to many forms of cryptanalysis, but Caesar was lucky that his enemies were not cryptanalysts.
12+
In a _substitution cipher_, each plaintext letter is replaced with a ciphertext letter which is computed with the help of a _key_.
13+
(Note, it is possible for replacement letter to be the same as the original letter.)
1314

14-
The Caesar Cipher was used for some messages from Julius Caesar that were sent afield.
15-
Now Caesar knew that the cipher wasn't very good, but he had one ally in that respect: almost nobody could read well.
16-
So even being a couple letters off was sufficient so that people couldn't recognize the few words that they did know.
15+
## Encoding details
1716

18-
Your task is to create a simple shift cipher like the Caesar Cipher.
19-
This image is a great example of the Caesar Cipher:
17+
In this cipher, the key is a series of lowercase letters, such as `"abcd"`.
18+
Each letter of the plaintext is _shifted_ or _rotated_ by a distance based on a corresponding letter in the key.
19+
An `"a"` in the key means a shift of 0 (that is, no shift).
20+
A `"b"` in the key means a shift of 1.
21+
A `"c"` in the key means a shift of 2, and so on.
2022

21-
![Caesar Cipher][img-caesar-cipher]
23+
The first letter of the plaintext uses the first letter of the key, the second letter of the plaintext uses the second letter of the key and so on.
24+
If you run out of letters in the key before you run out of letters in the plaintext, start over from the start of the key again.
2225

23-
For example:
26+
If the key only contains one letter, such as `"dddddd"`, then all letters of the plaintext are shifted by the same amount (three in this example), which would make this the same as a rotational cipher or shift cipher (sometimes called a Caesar cipher).
27+
For example, the plaintext `"iamapandabear"` would become `"ldpdsdqgdehdu"`.
2428

25-
Giving "iamapandabear" as input to the encode function returns the cipher "ldpdsdqgdehdu".
26-
Obscure enough to keep our message secret in transit.
29+
If the key only contains the letter `"a"` (one or more times), the shift distance is zero and the ciphertext is the same as the plaintext.
2730

28-
When "ldpdsdqgdehdu" is put into the decode function it would return the original "iamapandabear" letting your friend read your original message.
31+
Usually the key is more complicated than that, though!
32+
If the key is `"abcd"` then letters of the plaintext would be shifted by a distance of 0, 1, 2, and 3.
33+
If the plaintext is `"hello"`, we need 5 shifts so the key would wrap around, giving shift distances of 0, 1, 2, 3, and 0.
34+
Applying those shifts to the letters of `"hello"` we get `"hfnoo"`.
2935

30-
## Step 2
36+
## Random keys
3137

32-
Shift ciphers quickly cease to be useful when the opposition commander figures them out.
33-
So instead, let's try using a substitution cipher.
34-
Try amending the code to allow us to specify a key and use that for the shift distance.
38+
If no key is provided, generate a key which consists of at least 100 random lowercase letters from the Latin alphabet.
3539

36-
Here's an example:
37-
38-
Given the key "aaaaaaaaaaaaaaaaaa", encoding the string "iamapandabear"
39-
would return the original "iamapandabear".
40-
41-
Given the key "ddddddddddddddddd", encoding our string "iamapandabear"
42-
would return the obscured "ldpdsdqgdehdu"
43-
44-
In the example above, we've set a = 0 for the key value.
45-
So when the plaintext is added to the key, we end up with the same message coming out.
46-
So "aaaa" is not an ideal key.
47-
But if we set the key to "dddd", we would get the same thing as the Caesar Cipher.
48-
49-
## Step 3
50-
51-
The weakest link in any cipher is the human being.
52-
Let's make your substitution cipher a little more fault tolerant by providing a source of randomness and ensuring that the key contains only lowercase letters.
53-
54-
If someone doesn't submit a key at all, generate a truly random key of at least 100 lowercase characters in length.
55-
56-
## Extensions
57-
58-
Shift ciphers work by making the text slightly odd, but are vulnerable to frequency analysis.
59-
Substitution ciphers help that, but are still very vulnerable when the key is short or if spaces are preserved.
60-
Later on you'll see one solution to this problem in the exercise "crypto-square".
61-
62-
If you want to go farther in this field, the questions begin to be about how we can exchange keys in a secure way.
63-
Take a look at [Diffie-Hellman on Wikipedia][dh] for one of the first implementations of this scheme.
64-
65-
[img-caesar-cipher]: https://upload.wikimedia.org/wikipedia/commons/thumb/4/4a/Caesar_cipher_left_shift_of_3.svg/320px-Caesar_cipher_left_shift_of_3.svg.png
66-
[dh]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
40+
[wiki]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

exercises/practice/simple-cipher/.meta/config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
".meta/example.sh"
1818
]
1919
},
20-
"blurb": "Implement a simple shift cipher like Caesar and a more secure substitution cipher.",
20+
"blurb": "Implement the Vigenère cipher, a simple substitution cipher.",
2121
"source": "Substitution Cipher at Wikipedia",
2222
"source_url": "https://en.wikipedia.org/wiki/Substitution_cipher"
2323
}

0 commit comments

Comments
 (0)