The Rise of the Empire

Chapter 553: The 1st Generation God Machine Enig II

"But this method is not very safe. Although there are many 17576 situations, if the other party can get a cipher machine and use the enumeration method to decipher it, adjust the rotor to a certain position, and then enter the ciphertext , to see if the text is meaningful. This can still be cracked theoretically, and if the other party has multiple such machines, the cracking efficiency will be greatly improved." Schlieffen put forward his own opinion. \u003c/p\u003e"Isn't this very smart? Considering the other party's access to passwords or password equipment, how did the Russians obtain the codebook of the German High Seas Fleet from the beginning of World War I, but in the end the German Navy didn't know How about changing or getting a new set of passwords?" The prince complained frantically in his heart. It seems that there is still a big gap between knowing and doing things! \u003c/p\u003e "If you add rotors, you can also solve this problem, but what we need is a more convenient decoding device, not a huge and expensive machine, and the cost and volume must be moderate." Schlieffen continued. \u003c/p\u003e"What you said is very reasonable. We have tried it. If the other party uses our machine to crack it by enumeration, it will take about two weeks of Griffin 24 hours a day. Therefore, we also set up Two other security measures are set to increase the difficulty of cracking. For example, the three rotors can be disassembled, and their positions and numbers can be adjusted, which increases the difficulty of cracking by 6 times! And this is not counted Finally, we also added an adjustable connection inside the machine, this connection allows the letters to be interconnected, for example, we connect a to d, when we type a, it actually changes before it enters the rotor It becomes d, and then encrypted by the rotor, and vice versa, when we type d, it first undergoes encryption once to become a, and then changes with the rotor. After these two steps, the encrypted ciphertext is almost impossible Use violent means to crack it!" Arthur said with a smile. \u003c/p\u003eThe replacement of the positions of the three rotors has limited improvement in the difficulty of password cracking, but the replacement of 26 letters will definitely increase the difficulty of cracking to a terrifying level! Adding a few threads at will can increase the number of experiments by the cracking party to more than 100 million times! Coupled with the fact that there is no repetition of the telegram, this kind of cipher is theoretically impossible to break, at least from the perspective of the Prussians! "We finally solved the problem of telegram secrecy once and for all." A Prussian officer exclaimed. \u003c/p\u003e"No, this encryption method can be cracked! Because our enemies may obtain this cipher machine, for example, from our internal traitors, for example, from the battlefield, as long as they get a cipher machine , then they can copy, then our rotor encryption becomes useless, and as long as they can get the key of the day and know the location of the rotor, then it is possible to crack the content, although the replacement of letters makes theoretical deciphering It becomes very difficult, but they can still guess, even if they cannot fully crack the connection, it is still possible to obtain approximate information!" Just when the Prussian military was full of praise for this cipher machine, Ruprecht ** ** Said a word that shocked them even more! \u003c/p\u003e"It is true that the key is changed every day, but the order of the wiring and the arrangement of the rotors is agreed in advance. The only thing that can be changed randomly is the corresponding order of the rotors! The first six letters, the first letter and the fourth letter are all replaced by a plaintext, and if an ingenious mathematician can obtain this cipher machine and use this substitution, then it will be easy to crack There will be a chance, and in the eyes of these people, the key of the day becomes a cycle of different lengths, and this cycle is determined by the position of the rotor and the initial direction, and the connection method that is the most common is ruled out! "\u003c/p\u003e"Yes,

Although there are still many cases of this experiment, it makes it possible to decipher the entire information after all. If the other party has copied many cipher machines, then they still have the possibility of cracking. "Arthur also agreed. After all, the traverser has rich experience in later generations. They know how this riddle machine was cracked in history!" In order to prevent the other party from using the same method to encrypt, we also designed a Mechanical decoding machine, as long as there is a similar cipher machine, and with this kind of decoding machine, we can experiment with the key of the three-rotor cipher machine of the day within 2 hours! Therefore, I think there is no unbreakable password in this world! "\u003c/p\u003e The cracking machine that Arthur mentioned is the "bomb" machine that the Poles used to crack the charade in history. In fact, the Eniger cipher machine was cracked before the outbreak of World War II. That is Because of the small number of rotors and the habits of the transmitter itself. Although the "bomb" machine provides some ideas, there is still a long way to go from a machine that can actually crack more rotors and a cipher machine that can be reversed. History In the later period, the Allied forces also relied on guesswork and even deception to obtain information to analyze the code. The German Navy’s cipher machine was cracked even later, and it could only be effective after obtaining a completed naval cipher machine. Crack.\u003c/p\u003eSo, according to what the prince said, the Eniger cipher machine can be cracked, but it needs a lot of manpower and material resources. After all, you know the method and there is still a considerable distance from cracking it, at least in the environment of World War I Next, if you are careful, the Eniger cipher machine is still almost unsolvable, because the Polish mathematicians who discovered the Eniger cipher machine have not yet been born, and even before the end of World War 1, they were still Germans.. ....And if the prince can wear the crown on this plane, Poland will definitely not exist. Therefore, in the next 20 years, the military multi-rotor Eniger cipher machine will still be safe!\u003c/p\u003e"That is Say, we have a relatively reliable encryption method, but at the same time, in order to keep it secret, we must also step up internal management. Even before the final battle begins, we cannot promote this epoch-making equipment, is that right? ? Xiao Maoqi asked.\u003c/p\u003e "That's right, any equipment has a shelf life, and as time goes by, the other party can always find its weaknesses and problems!" So in order to make our military communications absolutely safe, we need to keep the secret of this machine first! "The prince nodded and said.\u003c/p\u003eSo, the German military began to change its own password system in secret. Before the outbreak of World War I, the German navy, army and air force had prepared enough Eniger codes before the war. Machines and technicians, and when the war suddenly came, Britain and France found that their espionage systems tended to collapse within a day. Of course, this is a later story, so let’s not mention it for the time being.\u003c/p\u003eThe second is here~~~ !Please subscribe!\u003c/a\u003e~~~!\u003c/p\u003e\u003c/div\u003e

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like