The Rise of the Empire

Chapter 552: The 1st Generation God Machine Enig 1

Two months later, against the still biting cold wind, the delegation of the German General Staff once again set foot on the train to Bavaria. This time, a series of high-ranking officials and Prussian cryptographers, including Chief of Staff Schlieffen and Moltke Jr., and the Minister of War of Prussia, almost all participated in the delegation, and the lineup was unprecedentedly strong. A group of people came to Munich, the capital of Bavaria, with a frustrated sense of loss and a trace of anger. On the second day, the prince and related personnel received Prussian guests from afar. \u003c/p\u003e "Everyone, we should be happy, at least we have exchanged a little money for future victories, haven't we? This money is nothing to His Majesty the Emperor and the Kingdom of Prussia. Don't you As for this." Seeing Earl Schlieffen and his party with a gloomy face, the prince jokingly said that since he is a loser, he must have the consciousness of a loser. The development direction of advanced productive forces? Arrogance is the greatest enemy of progress, why don't you understand? \u003c/p\u003e "Well, well, let's get down to business. Next, I would like to invite Arthur Scherbius, the director of the Bavarian Secrecy Bureau and the designer of the new encryption method, to introduce this encryption, which can be called a revolution in cryptography. method." The prince saw that the senior Prussian officials in front of him were not interested in his jokes, so he decisively began to talk about the topic. \u003c/p\u003e"Dear gentlemen, military ciphers have appeared on the battlefield since the time of Julius Caesar. In the ensuing history of thousands of years, the battle between coders and crackers has never stopped. In order to ensure the security of ciphers Confidentiality, the coder increases the confidentiality of the password by means of simple substitution, complex substitution, key, and lattice cipher, while the cracker uses various methods such as normal distribution, guessing, stealing, and bribery to decipher the code. "\u003c/p\u003e" But judging from the current situation, the crackers have the upper hand, because no matter how the coders change the way the code is written, the most basic tools they can rely on are pens, Using paper and your own brain, the passwords written cannot be too complicated, because the encryption personnel need to convert the plaintext into ciphertext one by one, and the translators also need to reverse this process. Daily changing keys and complicated forms Encryption and decryption work is extremely complicated, and there are no clever encryption methods in history, but unfortunately they cannot be popularized because of the too complicated process, after all, ensuring that the information that should be sent is sent out is the most basic requirement of communication!"\u003c/p \u003e "With the invention of radio technology, our password encryption work has fallen into a more unfavorable situation. Our previous passwords were not transmitted through closed lines or personnel, which was relatively safe in itself, but now, with the advent of radio waves Diffusion, anyone on the corresponding frequency can easily receive our signal, and then their crackers can crack it, just like what we did before, our actions have no secrets from our opponents. "\u003c/p\u003e"So, if we want to develop a new encryption method that is difficult to crack, we must start from the tools in our hands. Simple pencils and white paper can no longer meet the needs of the times. Secondly, we must also Change the simple correspondence of classical ciphers. This relationship not only refers to one-to-one correspondence, but refers to all regular and checkable shifts and key encryption. Only by doing these two points can the existing cracking methods Completely ineffective. Adhering to these two requirements, we developed a special password machine to solve this problem!" After Arthur finished speaking, he signaled his assistant to put a small box on the table, and then opened the box. \u003c/p\u003eThis is something similar in shape to a typewriter, with a keyboard underneath and a set of light bulbs representing letters in the middle. And the top set of rotors on the machine. And when Arthur opened the cover of this machine,

Inside leaked intricate machinery and an assortment of differently colored wires, some of which were apparently detachable. \u003c/p\u003e"This, this is really a precise machine." Xiao Maoqi walked over and carefully looked at the structure inside. This machine gave him the impression that although he didn't understand it very well, it looked very powerful. \u003c/p\u003e"Are you replacing manual labor with mechanical encryption and decoding? This is indeed a breakthrough, allowing many complex ciphers to be popularized. The sender and receiver can quickly complete the encryption with one such machine. Complete the coding and decoding work." A Prussian cryptography expert quickly discovered the problem, but limited by his vision, he only saw the speed of sending and decoding the cipher Improve and make the corresponding relationship more complicated, but did not find the most essential problem, and the simple corresponding relationship was broken. \u003c/p\u003e"You're right, but it's not the key. The most important thing about this cipher machine is that every letter that is the same in the plaintext corresponds to a different letter in the ciphertext, as you can see , these rotors are rotatable. When I press the first letter a on the keyboard, this letter may correspond to e on the ciphertext. And when we input 26 letters, the first rotor has rotated It has been a week, and if there is a rotor at this time, then there will be a repeated present, and the phenomenon of repetition is a taboo in cryptography, so we need to change it! So we added other rotors!"\u003c/p\u003e "No. After the first rotor rotates for a week, it will drive the second rotor, so if you input the identification of a, it may correspond to f. By analogy, when there are three rotors, each rotor has 26 letters, then there are only 26* The repetition will only occur after 26*26 letters, and the number of letters is so huge that the length of a total of 17,576 letters can completely allow us to send most of the telegrams! So, this is why, everyone is intercepting After receiving our telegram, all we see are random garbled codes. If we send a book in ciphertext, just adding two rotors at the back is enough to make the book undecipherable! " Arthur said with some pride. \u003c/p\u003e"These three rotors are the core of the encryption and decoding of the whole machine. When we want to encrypt, we first adjust the positions of the three rotors according to the requirements. This is one of the 17576 situations. Feel free to let Let the other party guess. Then we press the letters on the keyboard according to the plaintext, and then the corresponding ciphertext will be displayed on the light bulb. We only need to write down the ciphertext and send it out, which completes the encryption. And The recipient only needs to reverse this process, press the ciphertext on the keyboard, and then record the plaintext under the flashing light bulb. This completes the deciphering, and the key of this encryption machine is also very simple, which is three The initial position of the first rotor!" The prince on the side added. \u003c/p\u003eThanks to book friend Wang Yao for the young guard rabbit, the first guard tank brigade, slowly traveling k, chen111, the three-foot cat, the happy hero, and the fat cow king\u003c/a\u003e~~~! And the \u003c/a\u003e support of book friends Greedy Worm, Fat Lao Lu, Fengyu 15, ei09, and Linar--! Subscription hit the lowest level of the week yesterday --! It is estimated to be more than 1000 lower than the average subscription--! The author's heart is cold and cold--! Ask for a subscription\u003c/a\u003e~~~! ! \u003c/p\u003e\u003c/div\u003e

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like