{"id":117,"date":"2026-01-25T03:08:56","date_gmt":"2026-01-25T03:08:56","guid":{"rendered":"https:\/\/theroyalscode.com\/students\/d_eanes\/?p=117"},"modified":"2026-01-25T03:37:16","modified_gmt":"2026-01-25T03:37:16","slug":"free-friday-12-5-25","status":"publish","type":"post","link":"https:\/\/theroyalscode.com\/students\/d_eanes\/2026\/01\/25\/free-friday-12-5-25\/","title":{"rendered":"Free Friday: 12\/5\/25"},"content":{"rendered":"\n<p>Today, I watched a video and created a simple substitution cipher program using Python. I learned how to encrypt and decrypt messages using a random key from this video. The program takes a message from the user, replaces each character with a randomly shuffled character, and then letsthe message to be decrypted back to its original form.<\/p>\n\n\n\n<p><strong>SNIPPET<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#ENCRYPT\nplain_text = input(\"Enter a message to encrypt: \")\ncipher_text = \"\"\n\nfor letter in plain_text:\n    index = chars.index(letter)\n    cipher_text += key&#91;index]\n\nprint(f\"original message : {plain_text}\")\nprint(f\"encrypted message: {cipher_text}\")<\/code><\/pre>\n\n\n\n<p>^This part handles encryption. It goes through each character of the user\u2019s message, it finds its position in the original list, and it replaces it with the corresponding character in the shuffled key. The program then prints both the original and encrypted messages.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"78\" src=\"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-24-220822.png\" alt=\"\" class=\"wp-image-119\" srcset=\"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-24-220822.png 623w, https:\/\/theroyalscode.com\/students\/d_eanes\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-24-220822-300x38.png 300w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Today, I watched a video and created a simple substitution cipher program using Python. I learned how to encrypt and decrypt messages using a random key from this video. The program takes a message from the user, replaces each character with a randomly shuffled character, and then letsthe message to be decrypted back to its&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-117","post","type-post","status-publish","format-standard","hentry","category-free-friday"],"_links":{"self":[{"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":2,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":120,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/posts\/117\/revisions\/120"}],"wp:attachment":[{"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theroyalscode.com\/students\/d_eanes\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}