Chapter 552: A Generation of Divine Machines Ennig 1

Two months later, in the still bitter cold wind, the delegation of the German General Staff once again stepped on the train to Bavaria. Pen, fun, pavilion www. biquge。 This time, a series of high-ranking officials and Prussian cryptography experts, including the Chief of the General Staff, Count Schlieffen and Moltke Jr., as well as the Prussian Minister of War, almost all participated in the delegation, and the lineup was unprecedentedly strong. The group arrived at Munich, the capital of Bavaria, with a sense of loss and a hint of anger. The next day, the prince and his men received the Prussian guests who had come from afar.

"Guys, we should be happy, at least we're not paying a little money for a future victory, aren't we? This amount of money is nothing to His Majesty the Emperor or to the Kingdom of Prussia. That's not the case, you guys. Looking at Count Schlieffen and his entourage, whose face was a little gloomy, the prince jokingly said, since he is a loser, he must have the consciousness of a loser, and he is always the first in the world, how can the highest idea of German science and technology lead the development direction of advanced productive forces? Arrogance is the worst enemy of progress, why don't you understand?

"Well, well, let's get down to business. The following is the head of the Bavarian Secrecy Bureau, the designer of the new encryption method, Arthur. Shelbius will introduce this encryption method, which can be called a revolution in cryptography. The prince saw that the Prussian dignitaries in front of him were not interested in his jokes, so he decisively began to talk about the subject.

"Distinguished gentlemen, since the time of Julius Caesar, military codes have appeared on the battlefield, in the following thousands of years of history, the battle between coders and crackers has never stopped, in order to ensure the confidentiality of passwords, coders from simple substitution, complex substitution, keys, frame passwords and other ways to increase the confidentiality of passwords, and crackers use Zhengtai distribution, guessing, stealing and buying and other ways to decipher the code."

But from the current situation, the cracker side can be said to have the advantage, because no matter how the coder changes the way the code is written, the most basic tools they can rely on are the pen in their hands, paper and their own brain, and the code written cannot be too complicated, because the cryptographer needs to convert the plaintext into ciphertext one by one, and the translator also needs to reverse the process. The encryption and decryption work is extremely complicated by changing keys and complicated tables every day, and it is not that there are no clever encryption methods in history, but unfortunately they are too complicated to promote at an older age, after all, it is the most basic requirement of communication to ensure that the information that should be sent out! ”

"With the invention of radio technology, our password encryption work has fallen into a more disadvantageous situation, our previous passwords are not transmitted through closed lines or personnel, and they are relatively safe in themselves, but now, with the spread of radio waves, anyone can easily receive our signal at the corresponding frequency, and then their crackers will crack it, just like we did before, our actions are no secret for the opponent."

"So, if we want to develop a new, hard-to-crack encryption method, we have to start with the tools in our hands, and the pencil and blank paper alone are no longer enough to meet the needs of the times. Second, we must also change the simple correspondence of classical ciphers, which refers not only to one-to-one correspondence, but to all regularly traceable shifts and key encryption. Only by doing these two things can the existing cracking methods be completely ineffective. With these two requirements in mind, we have developed a special password machine to solve this problem! With that, Arthur motioned for his assistant to place a small box on the table, and then opened it.

It's something similar to a typewriter, with a keyboard underneath and a set of light bulbs representing letters in the middle. And the top set of rotors of the machine. When Arthur opened the lid of the machine, it leaked out of the complex machinery and various colored wires, some of which were clearly removable.

"This, this is really a sophisticated machine." Little Moltke walked over and took a closer look at the structure inside, and this machine gave him the feeling that although he didn't understand it very well, it looked very powerful.

"Are you replacing humans with mechanical encryption and decoding? This is indeed a breakthrough that allows many complex ciphers to be promoted, and the sender and receiver can quickly complete the encoding and decoding work as long as they are equipped with such a machine. A Prussian cryptographer quickly discovered the problem, but due to the limitations of his vision, he only saw the speed of sending and decoding passwords, and made the correspondence more complicated, but did not find the most essential problem, and the simple correspondence was broken.

"You're right, but it's not the point, the most important thing about this cipher machine is to make every same letter on the plaintext correspond to a different letter on the ciphertext, as you can see, these rotors can be rotated, when I press the first letter a on the keyboard, this letter may correspond to the e on the ciphertext. And when we enter 26 letters, the first rotor has been rotated for a week, and if there is a rotor at this time, then there will be a repetition now, and the repetition phenomenon is a big taboo in cryptography, so we need to change it! So we added other rotors! ”

"After the first rotor rotates for a week, it will drive the second rotor, so if you enter A again, he may correspond to F. And so on, when there are three rotors, each rotor has 26 letters, then only 26*26*26 letters will be repeated, and this number of letters is so huge, a total of 17576 letters of length can allow us to send most of the telegrams! So, that's why, all you see after intercepting our telegrams is random gibberish, and if we send a book in ciphertext, just adding two more rotors to the end is enough to make the book undecipherable! Arthur said with some smugness.

"These three rotors are the core of the whole machine encryption and decoding, when we want to encrypt, first according to the requirements, the position of the three rotors is adjusted, this is one of the 17576 cases, let the other party guess at will. Then we press the letters on the keyboard according to the plaintext, and then the corresponding ciphertext will be displayed on the light bulb, we just need to write down these ciphertexts and send them out, which completes the encryption. The receiver only needs to reverse this process, press the ciphertext on the keyboard, and then record the plaintext under the shining light bulb, which completes the decipherment, and the key of this encryption machine is also very simple, which is the initial position of the three rotors! The prince added.

Thanks to the book friend Wang Yao's Young Guard Rabbit, the First Guards Tank Brigade, Slow Swim K, Chen111, Three-Foot Cat, Happy Male Army, and Fat Cow King for their rewards~~~! As well as the monthly pass support of the lazy worm of book friends, fat Lao Lu, Fengyu 15, ei09, and linar--! Yesterday's subscription was the lowest in the week--! That's an estimated more than 1000 --! lower than the average subscription The author's heart is cold--! Ask for subscription, ask for tips~~~!! (To be continued.) )