CPSC 225 Intermediate Programming Spring 2025

Project 3: Solitaire

Checkpoint: Wed Mar 26 at 11:59pm
Due: Wed Apr 2 at 11:59pm


Introduction

The projects are opportunities to work on larger programs, and to bring together and apply topics from the course. This assignment provides practice with linked lists outside of the usual insert-into-a-linked-list and remove-from-a-linked-list examples that come up when talking about data structures. It also provides an example of a case where choosing the right data structure — in this case, doubly-linked circular lists — can make solving a problem easier. (As you are working on the program, consider what would be involved if you used an array instead.)

This assignment also hammers home the idea of decomposing a complex task into smaller subtasks and testing each subtask separately — if you do not do this, verifying that your program works (and figuring out what when wrong if it doesn't) will be much more difficult.

Checkpoint

The checkpoint deadline is a guideline for pacing. There isn't anything to hand in, but you should treat it like a real deadline — if you aren't on track to meet it, you run a greater risk of not completing the project on time.

Revise-and-Resubmit and Late Work

Fixing problems is an important component of learning, and most assignments will have an opportunity for revise-and-resubmit. The resubmit deadline will be announced when the initial handin is handed back, and will generally allow a week or so for revision.

Revise-and-resubmit requires there to be something to revise and feedback to act on — it is not intended as a de facto extension. To be eligible for revise-and-resubmit, there must be some effort put into the assignment (a 3 or higher) for the original handin.

Late work is generally not accepted. If circumstances beyond your control prevent you from making any progress on an assignment before it is due, you are at significant risk of falling behind in the course. Come talk to me ASAP!

Allowed Resources, Working With Others, and Getting Help

You may use the course materials (slides, examples) posted on the course webpage and the course Canvas site as well as the textbook.

You are encouraged to come to office hours and Teaching Fellows for help with thinking through getting started, Java help, debugging help, or help with anything else you might be stuck on.

The use of generative AI (such as ChatGPT), homework help websites, or other resources (friends, YouTube, etc) as learning cheats is not permitted. "As a learning cheat" means generating, finding, copying, etc code that you incorporate directly or with only minor modifications into your solution. The most egregious version of this is generating the entire program, but the prohibition applies to even small sections of code as well.

Using other resources as learning aids is permitted, but you are strongly encouraged to utilize the course materials, office hours, and Teaching Fellows as your primary sources of help. "As a learning aid" is to understand concepts — e.g. getting examples of loops to understand how to write loops in general or the specific syntax for loops in Java, not their specific application to this program. ("An example of a program to play flip" is a solution, not an example, and is not a learning aid.)

Handin

To hand in your work:


Solitaire

In Neal Stephenson's novel Cryptonomicon, two characters use an encryption system based on a deck of playing cards to exchange secret messages. This encryption system (known as "Solitaire") was designed by Bruce Schneier (a well-known cryptologist and security expert) specifically for the book.

The idea of encryption is to facilitate the sending of secret messages over an open channel - the sender encodes the message in a way that appears as nonsense to anyone who might see it, but which the intended recipient can decode to obtain the original message. This is essential in the age of online transactions - you don't want someone to see that credit card number you are sending over the Internet!

A simple and well-known encryption method is the Caesar cipher. In this scheme, each letter in the original message is replaced by the letter k positions later in the alphabet. For example, with a shift of 3 (k=3), A would be replaced with D, B would be replaced with E, C would be replaced with F, and so forth. (Wrap around at the end of the alphabet, so X would be replaced with A, Y with B, and Z with C.) To decrypt the message, just apply the process in reverse - replace D with A, E with B, etc.

This is not a very secure scheme, as there are only 25 possible shifts and it wouldn't take long, even by hand, to try them all and decipher the message. However, if a different shift amount is used for each character... The idea of Solitaire is to generate a series of shift values (called a keystream) instead of using the same shift for every character. The name "Solitaire" comes from the use of a deck of cards to generate the keystream values. (It is designed to be a secure encryption scheme that can be carried out by hand in the field.)

The details of the Solitaire algorithm that you'll be implementing can be found in the section Solitaire — Technical Description below.


Task

Your task is to create a program which allows the user to encrypt and decrypt text using a slightly modified version of the original Solitaire Encryption Algorithm as described in the section Solitaire — Technical Description below. This modification sacrifices some of the security of the original algorithm, but makes it a bit easier to implement without really changing the flavor of the algorithm.

In creating this program, you'll write five classes:

An overview of the program organization and the specifics of the classes you should implement, including their instance variables, constructors, and methods, can be found in the Code Specifications section below. You should read through that whole section to gain an understanding of what you'll be doing before you start implementing. Note that you must use the provided code and create/implement the classes and methods as described below — you will not receive credit otherwise.

Additional requirements:

Setup

The provided code for this project has been provided only in compiled form. Add the provided jar file to your project and your project's build path as was done in lab 2:

Plan of Attack

Checkpoint

To be on track, you should have implemented and tested the SolitaireDeck class by the checkpoint deadline given at the beginning of this handout. Of course, being ahead of that is even better!


Code Specifications

Program Organization

This program is organized into five main classes:

There are also two supporting classes provided in solitaire.jar:

Click on the links for the API documentation on how to use these classes.

Classes

Implement the classes described below. Name methods as specified, and define parameters in the order listed. Be sure include Javadoc comments for the class and each method. Also identify any class invariants and method preconditions in the appropriate comments and add runtime checks for those conditions where it is productive to do so.

SolitaireTester

Create a class SolitaireTester with a main program containing the standard are-assertions-on boilerplate you've seen in the testers in lab 2, lab 4, and Omino.

As you implement the rest of the classes below, add tester subroutines for each method being tested as well as specific test cases for those methods in the style of the testers from lab 2, lab 4, and Omino.

SolitaireDeck

The class SolitaireDeck represents the deck of cards used to generate keystream values. It stores the cards and supports deck-manipulation operations like joker swaps, triple cuts, and count cuts. For flexibility, this is designed to support any size of deck (≥ 1); note that "deck size" does not include jokers, so a deck with size 26 actually contains 28 cards.

The cards should be stored using a circular doubly-linked list. See the Other Notes section below for more information on circular doubly-linked lists.

Instance variables:

Constructors:

The first constructor should initialize the deck to contain the specified number of cards (with values 1..n) plus two jokers (A and B). The jokers should both have the value n+1 where n is the deck size. The cards should be in order by value from 1..n with the two jokers at the end (joker A before joker B). For a deck size of 26, this will be:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27A 27B

The second constructor is for testing (why it isn't public). The deck string should be in the same form that the toString method produces. You can split such a string into an array with a separate value for each card using String's split method, as in Omino:

  String str = "1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 27A 26 8 3 24 6 4";
  String[] cards = str.split(" +");

Methods:

For countCut(n), count the top card as 1 and make the cut after the nth card. Thus n=1 means to cut the deck after the top card, n=2 means to cut the deck after the second card, and so forth. n < 1 doesn't make sense.

toString should list the values of each card in order from the top of the deck, separated by spaces. For example:

1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 27A 26 8 3 24 6 4

Note that SolitaireCard's toString already produces the correct string representation for a single card, so you just need to put them together into a single string for the whole deck.

Correctness:

The SolitaireDeck operations perform complex manipulations of the deck structure, and there is plenty of potential for making a mistake in the linked list manipulations. While it is difficult to state anything too specific about the correct result of an operation without having a specific starting state, it is possible to state two class invariants: that the linked list structure is consistent (for every node a, the previous of a's next and the next of a's previous should both be a) and that the deck contains (only) cards 1..n and two jokers. Furthermore, checking these invariants is at least somewhat easier than the deck manipulations themselves.

Add the following helper methods, then use assertions to check the class invariants (structure and content) at the end of every method that modifies the linked list in any way. Don't forget to turn on assertion checking in the main program in SolitaireTester! (Refer back to lab 2 if you don't remember how to do this.)

Hint: to check the contents, you need a way to know at a given node whether or not that node's value has already been seen and, at the end, that there aren't any values missing. The first problem can be solved with a boolean array - use a value of false in slot i to mean that value i has not yet been seen in the deck and true to mean that it has. (The jokers will need to be special-cased since they both have the same value, but you could use slot 0 for joker A and the slot corresponding to the value for joker B.) For each node, check the value of that slot before setting it - if it is already true, a duplicate entry has been found. The second problem can be solved by either checking that there are no false values in the array once the entire deck has been gone through, or by counting the number of nodes in the deck and verifying that is decksize+2 (with no duplicates found).

Testing:

Add test cases to SolitaireTester for the public constructors and methods of SolitaireDeck. The descriptions of the deck operations include examples — use those as a starting point, but be sure to add additional test cases as needed to cover all of the behaviors and possible special cases.

How do you know if a method worked? For the deck-manipulation operations, a correct result is a valid list structure (verified by checking the class invariations) and the cards in the deck being in the right order — compare string representations of the deck to check the card order.


KeystreamGenerator

KeystreamGenerator handles generating the keystream values.

Instance variables:

Constructor:

Methods:

Testing:

Add test cases to SolitaireTester to cover the public constructors and methods. But there are a couple of wrinkles...

Wrinkle #1 is that the result of a constructor is correctly-initialized instance variables — in this case, a correctly keyed deck. But there aren't any methods in KeystreamGenerator to provide access to the deck. To address this, add a helper method to support testing:

Wrinkle #2 is how do you know what the expected result is for a particular test case? Keying the deck and then generating keystream values are complex operations, and it's not meant to be easy to figure out the answer without going through the process to generate it. What to do?

First, note that the most complicated parts of the KeystreamGenerator methods are the deck manipulations done by SolitaireDeck; the KeystreamGenerator methods just connect them together. That means that if you know that the SolitaireDeck methods work (which you do, because you wrote a thorough tester for them), you can probably reason fairly confidently that the KeystreamGenerator methods are correct.

Second, note that the encryption example provides starting state and expected output for keystream initialization and the first keystream value - two test cases! The example also shows a series of keystream values - it's a little unusual as a test case, but you could generate a bunch of keystream values and check that your answers match the example. While these test cases aren't necessarily a comprehensive set of cases, it's better than nothing.


SolitaireEncoder

SolitaireEncoder handles the actual encryption and decryption processes. It has only static methods.

Static methods:

Both methods will need to create a new KeystreamGenerator keyed with the specified passphrase before carrying out the encryption or decryption process described in the Encryption and Decryption sections.

Testing:

Add test cases for encrypt and decrypt. As with KeystreamGenerator, you are testing a complex process and there's not a shortcut to knowing the right answer without following that process. However, the example in the Encryption section provides one message and its encrypted version, which can be used as a test case for both encryption and decryption. It is also the case that decryption should undo encryption, so you can test for bugs in one of the processes by checking that the result of decryption matches the original message,


SolitaireMain

SolitaireMain contains the main program, which should allow the user to encrypt and decrypt messages as described.

The user should first be prompted for a passphrase. The program should then repeatedly ask the user whether she wants to encrypt a message, decrypt a message, or quit. Quitting should end the program; in the other cases, the user should be prompted for the message to encrypt or decrypt and the result displayed.

For example: (input entered by the user is shown with bold underline to distinguish it from your program's output)

enter passphrase: secret key
encrypt, decrypt, or quit? [e/d/q] e
enter message: you'll never guess this message!

encrypted: UKTUMUXRMOSPGVWSADBUHPJSFC

encrypt, decrypt, or quit? [e/d/q] d
enter encrypted message: UKTUMUXRMOSPGVWSADBUHPJSFC

decrypted: YOULLNEVERGUESSTHISMESSAGE

encrypt, decrypt, or quit? [e/d/q] q

The same passphrase should be used for the entire session - don't re-prompt for a new passphrase after each encryption or decryption. Passphrases and messages are assumed to be a single line, though they may contain other whitespace (such as spaces or tabs).

Your program should be robust - it should not crash, do something unexpected, or work incorrectly if the user does not use it correctly. Error messages should be user-friendly.

Testing:

Test your program by running it. All of the encryption and decryption functionality should be covered by your test cases in SolitaireTester, so the only tests you should need at this point are that the user interaction is correct and that the main program is robust.


Extra Credit Features

Extra credit features are things you can add for extra credit. Make sure you complete the requirements of the assignment first, however, before tackling extra credit options!

Some options:


Solitaire — Technical Description

Building Blocks

Deck Operations

The original Solitaire algorithm is based on a standard deck of 52 playing cards, plus two jokers. To make things a little more manageable, you'll be implementing a simplified version of Solitaire using a half-deck of just 26 cards plus two jokers. Furthermore, the cards will be represented with just the numbers 1-26 instead of suit and value. The jokers should be distinguishable in some way - we'll call them "joker A" and "joker B". For example:

  1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 27A 26 8 3 24 6 4

There are four operations that are applied to the deck of cards as part of carrying out the Solitaire algorithm: two kinds of joker swaps, triple cuts, and count cuts. Each is described below.

Joker Swap - Joker A

In a joker swap, joker A is swapped with the card that comes after it in the deck. For example: (bold underline highlights the changes)

before: 1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 27A 26 8 3 24 6 4
after:  1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 27A 8 3 24 6 4

If joker A is last, it is still swapped with the next card (which happens to be the top card when the deck is treated as a continuous loop). The card considered to be the top card doesn't change.

before: 1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 4 26 8 3 24 6 27A
after:  1 27A 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 4 26 8 3 24 6

This is still a swap, since the sequence of cards surrounding 27A in the "before" deck is ... 24 6 27A 1 23 25 ... and in the "after" deck is ... 24 6 1 27A 23 25 ... It's just that we don't move the top card to the bottom of the deck to take the former bottom card's position.

Note that if joker A is first, the top card of the deck does change:

before: 27A 1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 8 3 24 6 4
after:  1 27A 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 8 3 24 6 4
Joker Swap - Joker B

A joker swap involving joker B is similar, but joker B is moved down two cards in the deck by performing two swaps.

before: 1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 27A 8 3 24 6 4
after:  1 23 25 2 22 27B 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 27A 8 3 24 6 4

The cases of joker B being the last or next-to-last card in the deck are handled similarly to joker A. The top card of the deck only changes if joker B is the first card, not if joker B is merely swapped with the top card.

Triple Cut

In a triple cut, the cards above the first joker (the one closest to the top of the deck) are exchanged with the cards below the second joker. For this step, it doesn't matter which joker is A or B.

before: 1 23 25 2 22 27B 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 27A 8 3 24 6 4
after:  8 3 24 6 4 27B 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 26 27A 1 23 25 2 22
Count Cut

A count cut involves several steps:

Keying the Deck

In order to successfully exchange messages, the person decrypting the message must use the same sequence of keystream values as the person encrypting the message - which means that both parties must start with their decks of cards arranged in the same way. The process of arranging the cards in the deck in a certain order is known as keying the deck.

Since directly communicating the order of the cards in the deck is cumbersome, a secret passphrase (known only to the two parties who are exchanging messages) is used instead - the passphrase is essentially a shorthand for specifying the deck order. To key the deck using a passphrase:

  1. Start with the cards of the deck arranged in order from the lowest card to the highest card (and joker A before joker B).

  2. Repeat the following steps for each character of the passphrase:

Keystream Generation

The central part of the Solitaire algorithm is the generation of a keystream - a sequence of numeric values which will then be used to encrypt or decrypt a message. To generate the next value in the keystream:

Encrypting and Decrypting Messages

Encryption

To encrypt a message:

  1. Initialize the keystream generator (see Keying the Deck").

  2. For each character in the original message:

The encrypted message is just the resulting sequence of encrypted letters.

For example, consider the message you'll never guess this message! and the passphrase SECRET KEY.

First, start with the deck in order:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27A 27B

Key the deck using the passphrase:

1 23 25 27B 2 22 10 11 12 13 14 15 16 17 18 19 20 21 7 5 9 27A 26 8 3 24 6 4

Encrypt the message: (the example shows the steps applied to the whole message at once, but note that you should go through all five steps for each character in turn)

The final encrypted message: UKTUMUXRMOSPGVWSADBUHPJSFC

Decryption

Decryption is nearly the same as encryption. However, it is vital that the same sequence of keystream values be generated - this means that for decryption, the keystream generator must be initialized the same way it was when the encryption process was started.

To decrypt a message:

  1. Initialize the keystream generator (see Keying the Deck).

  2. For each character in the encrypted message:

The decrypted message is just the sequence of decrypted letters - aside from the missing spaces and punctuation, this should be the same as the original message.


Other Notes

Circular Doubly-Linked Lists

Recall from class the difficulties of moving backwards in a linked list - any time we needed a node before the current node, it was necessary to start at the head and scan forward. A doubly-linked list solves this problem because each node stores both next and previous pointers - you can then back up by simply following the previous pointer instead of the next pointer. (When you change the list structure, be sure to update both the next and previous pointers of each node as needed.)

A circular list is one in which the last node's next pointer refers back to the first node instead of being null. (In a doubly-linked circular list, the first node's previous pointer similarly refers to the last node.) There is still a head pointer to locate a node in the list - in the case of the deck, this indicates the top card in the deck.

Some care is needed to properly print or otherwise visit all of the nodes in a circular linked list - you can't just go until you reach null! Draw a picture of an example and trace through your code by hand to make sure you have gotten the logic right.

An advantage of circular lists is that you can often avoid having to special-case things involving the last node of the list. For example, you don't have to special-case the handling of the jokers at the end of the list in the joker swap operations if you use a circular list.


Credits

This assignment is based on materials by Lester McCann.