The Rise of the Empire

Chapter 552: 1st generation **** machine Enig one



Two months later, despite the bitter cold wind, the delegation of the German General Staff once again boarded the train to Bavaria. This time, a series of senior officials and Prussian cryptographers, including the chief of the general staff, Earl Schlieffen and Little Mochi, and the Prussian Minister of War, almost all participated in this delegation, and the lineup was unprecedentedly strong. With a sense of frustration and a trace of anger, the group came to Munich, the capital of Bavaria. On the second day, the prince and related personnel received Prussian guests from afar.

"Everyone, we should be happy, at least we can't use a little money to exchange for future victory, right? This little money is nothing to the emperor, to the Kingdom of Prussia. You should not be like this. "Looking at Count Schlieffen and his party with a gloomy expression, the prince said jokingly, since he is a loser, he must have the consciousness of a loser. He is always the number one in the world. How can the highest German science and technology lead the development of advanced productivity? direction? Arrogance is the greatest enemy of progress, why don't you understand?

"Um, well, let's get down to business. Now I have Arthur Shelbyus, the director of the Bavarian Security Bureau, the designer of the new encryption method, to introduce this encryption method that can be called a cryptographic revolution." Seeing that these high-ranking Prussian officials were not intriguing about themselves, they decisively began to talk about the subject.

"Dear gentlemen, since the time of Emperor Caesar, military codes have appeared on the battlefield. In the subsequent thousand years of history, the battle between coders and crackers has never stopped. In order to ensure the confidentiality of codes, code Those who use simple substitutions, complex substitutions, keys, and box passwords to increase the confidentiality of passwords, while crackers use various methods such as normal distribution, guessing, stealing, and buying to decipher the password."

"But from the current situation, the **** has the advantage, because no matter how the coder changes the way the password is written, the only basic tools they can rely on are pen, paper and their own brains. , The passwords written cannot be too complicated, because the encryption staff needs to convert the plaintext into ciphertext one by one, and the translator also needs to reverse this process. The keys and complicated forms that are changed every day make encryption and decryption work. It's extremely complicated. Historically, there is not no clever encryption method, but unfortunately it is too complicated to promote it at older ages. After all, ensuring that the information that should be sent out is the most basic requirement of communication!"

"With the invention of radio technology, our password encryption work has fallen into a more unfavorable situation. Our previous passwords were not transmitted through closed lines or personnel, and they were relatively safe. But now, with the spread of radio waves , Anyone can easily receive our signal at the corresponding frequency, and then their **** will crack it. Just like we did before, our actions have no secrets to the opponent.”

"So, if we want to develop a new, hard-to-crack encryption method, we must change from the tools in our hands. Simple pencils and white paper can no longer meet the needs of the times. Secondly, we must also change the simple Correspondence, this relationship not only refers to one-to-one correspondence, but refers to all regular and checkable shifts and key encryption. Only by achieving these two points can the existing cracking methods be completely invalid. For these two requirements, we have developed a special password machine to solve this problem!" After Arthur finished, he motioned to his assistant to put a small box on the table, and then opened the box.

This is something similar in appearance to a typewriter, with a keyboard underneath and a group of light bulbs representing letters in the middle. And the top rotor of the machine. When Arthur opened the cover of the machine, complicated mechanical equipment and wires of various colors leaked out, some of which were obviously detachable.

"This, this is really a sophisticated machine." Xiao Maoqi walked over and took a closer look at the structure inside. This machine gave him the feeling that although he didn't understand it very well, it was very powerful.

"Are you using mechanical encryption and decoding to replace manual work? This is indeed a breakthrough, which allows many complex passwords to be promoted. The sender and receiver can quickly complete the encoding and translation as long as they are equipped with such a machine. Code work.” For the layman to watch the excitement and the insider to watch the doorway, a Prussian cryptographer quickly discovered the problem. However, limited by his vision, he only saw the increase in the speed of password sending and decoding, and The correspondence is more complicated, and the most essential problem is not found, and the simple correspondence is broken.

"You are partly right, but it is not the key. The most important thing about this cipher is that the same letter in the plaintext corresponds to a different letter in the ciphertext. As you can see, these rotors are It can be rotated. When I press the first letter a on the keyboard, this letter may correspond to the e in the ciphertext. And when we input 26 letters, the first rotor has already rotated once, this If there is a rotor at that time, then there will be a repetitive present, and repetition is a taboo in cryptography, so we need to change it! So we added other rotors!"

"After the first rotor rotates one revolution, it will drive the second rotor. So, if you enter the identification of a, it may correspond to f. By analogy, when there are three rotors, each rotor has 26 letters, then only There will be repetitions after 26*26*26 letters~www.novelhall.com~ and the number of letters is so huge, the length of a total of 17,576 letters can make us send most of the telegrams! So! , That’s why, after intercepting our telegram, what you see is some irregular garbled codes. If we send a book in ciphertext, we only need to add two rotors at the back, which is enough to let This book has become undecipherable!" Arthur said triumphantly.

"These three rotors are the core of the encryption and decoding of the entire machine. When we want to encrypt, we first adjust the position of the three rotors according to the requirements. This is one of 17,576 cases. Feel free to let the other party guess. . Then we press the letters on the keyboard according to the plaintext, and then the corresponding ciphertext will be displayed on the light bulb. We only need to write down these ciphertexts and send them out. This completes the encryption. This process is reversed. Press the ciphertext on the keyboard, and then record the plaintext under the shiny light bulb. This completes the deciphering. The encryption key of this encryption machine is also very simple, that is, the initial three rotors. Location!" The prince on the side added.

Thank you book friend Wang Yao for the young guard rabbits, the first guard tank brigade, the slow swim k, chen111, the three-foot cat, the happy hero, and the fat cow king~~~! And the support of the lazy worm of the book friends, the fat old Lu, Fengyu 15, ei09, Linar--! Yesterday’s subscription was the lowest this week--! It is estimated to be more than 1,000 lower than the average subscription--! The author's heart is so cool--! Seeking subscription~~~! !