Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 1346 Enigma Code Machine

The rotor of the Eniger password machine is a display screen, which displays every letter in the alphabet, and a keyboard in front of the display screen. This era is still a mechanical key, and it takes a lot of force to press it than in later generations to press the computer keyboard. When you type a letter on the keyboard, a light with a different letter on the display screen will light up. This is the letter used to write the password in the letter, but you must look quickly and carefully, because the light will only light for a short time.

The rotor of the Eniger Code cipher is rotating. When the first rotor rotates to a position, it will coincide with 26 letters one by one. When the first rotor and 26 positions are matched, it will return to its original position. When the second rotor and 26 positions are matched, it will return to its original position and then rotate from the third rotor to its position. With this encoding, as long as the telegram is not more than 17,576 letters long, the alphabet will not be repeated.

During operation, you can also take away the wheels of the rotor and put them back in order. Because each rotor has different lines and different arrangements produce different passwords. Therefore, there are 105,456 possibilities. Adding a plug-in board in front of the machine makes the change pattern double, so there are more than 10,000,000,000 different alphabets in total.

After Hessler came to power, the Teutonic Army used it for military communications after significantly increasing the complexity of this cipher machine. In fact, the Eniger cipher machine is still mechanical encryption. Although it seems very complicated, as long as it has a large number of telegrams, it can still be deciphered. However, in the Teutonic Army's view, as long as it increases the complexity, no one can find its rules within a certain period of time.

However, the Teutonics were too confident, and soon Turing, a famous mathematician in the White Eagle Kingdom, joined the decoding group. He used the bomb decoding method designed by the Plain people before the war to develop a bomb decoding machine. The bomb decoding machine uses hundreds of cipher gears to work at the same time, and can quickly calculate the encoding rules used in Eniger code. Even if the Teutonics change the password book once a month and change the password once a day, it will still be cracked in a very short time.

After such a decoding process, Turing learned that no matter how complex the mechanical encoding is, it can still be quickly deciphered. As a mathematician master, Turing consulted several power engineers and began to design a machine that encrypts electrical signals, which is the electronic cryptographic machine used by the White Eagle Kingdom today.

The principle of the electronic cipher machine is the same as that of a computer, but it is relatively simple. However, the White Eagle Kingdom still cannot be assured of such a password. Because when Turing used a bomb decoder to decipher the military password of Hualanguo, he found that no matter how hard he tried, he could not crack it. This discovery scared Turing into a cold sweat. Thinking that the Eniger code machine that the Teutonics cipher machine, which was hailed by the Teutonics, was cracked by himself, he felt that Hualanguo should also have a way to crack the electronic cipher machine. In order to perform secondary encryption, Turing proposed an encryption method, language encryption method, to the White Eagle Kingdom military.

This method is very simple to say and has nothing to do with mathematics. Its principle is to use language difficult to understand by ethnic minorities as a password. The other party has no way to understand the structure of this language, so it is naturally impossible to crack it. The White Eagle Army quickly turned its attention to the Navajo people living at the junction of Arizona and New Mexico.

The grammar and pronunciation of the Navajo people are extremely weird, and it sounds a bit like the strange call of a beast. The grammar and sound quality of this language are almost impossible to learn for non-Navajo people, and this language is in written form. The White Eagle Army used the difficulty and secret of this language to form the Navajo communications force.

These Navajo people used daily Navajo language and about 400 password words designed by themselves to form weird passwords with almost no regularity, and then recreated new words to write them. Although these passwords are also written in electronic password machines, no one can understand them except the Navajo people.

After obtaining such double encryption, the Baiying Kingdom military thought that it had mastered a password that could not be cracked at all, so they dared to use radio communication to communicate with each other unscrupulously before the war.

Unfortunately, no password can be kept confidential forever. Even the weirdest language and coding rules have one thing in common, that is, rules. Even if this rule changes, is complex and difficult to understand, as long as you have sufficient computing power, you can find out the real content of the password.

The White Eagle and the Teutonic people made the same mistake and were too confident in encrypting their passwords. And they were indeed too sad because they didn't know that there was a No. 0 base in Hualan, which had a glorious mastermind that surpassed the current one thousand years of technology.

If there are other aspects, the Honor Master may be lacking, but in terms of calculation, even if the mathematician masters all over the world are tied together, it is difficult to compare their pros and cons. This does not mean that today's mathematician masters are all idiots, but because the achievements of later generations are based on the research of their predecessors.

The principle of manufacturing glory is contributed by these mathematical masters, but that is the result of later generations standing on their shoulders and developing thousands of years later. Such comparisons have been very unfair from the beginning. With an invincible decoding machine like Honor, Hualanguo has no code that cannot be untie.

Under the decoding of glory, the language rules of the Navajo clan were cracked, and it accidentally obtained a long-extinct language information. The combat plan of the White Eagle Kingdom was cracked and placed on the table of the General Staff of the Hualan Kingdom. With this information, Liu Bozhao and Bai Chongxi were enough to design a combat plan that would make the White Eagle Kingdom doomed.

The White Eagle Kingdom's action plan, number of troops and departure date were placed on the table of the General Staff Headquarters, which gave the generals more choices. After the joint research between the General Staff Headquarters and the Navy Department, an offensive plan was finally made to fight the North and the South. The Eastern Ocean Fleet decided to concentrate superior forces to deal with Halsey's main fleet, and to make sure to level the current gap in naval strength before the other side reacted.

The main fleet of the East Ocean, led by Xiao Jinguang, set sail from various ports under the excuse of cruise, and headed south along the course within the island chain, with the goal of a sea area north of Yizhou Island. The fleet that was supposed to go to New Guinea Island turned south and headed to the northern end of the Yizhou Strait. This seemed to be a failure that could easily expose the target, but in fact they had a reason to have to come.
Chapter completed!
Prev Index    Favorite Next