Font
Large
Medium
Small
Night
Prev Index    Favorite Next

550 The Battle of Passwords 1

"Dear Emperor, you seem to be tired of stylized politics and various activities now. If that's the case, how about we go about doing something more meaningful? A game that tests intelligence and rational analysis more. Personally, I am not at ease with the intelligence security of the central governments of Prussia and Germany. I once organized an intelligence analysis team in my spare time, and they used the idea of ​​normal distribution and resolving matrix equations to decipher the telegraph system in Bavaria, and the result was very

To my surprise, one of the experts thought privately that there are various loopholes in the cryptographic systems of Germany, France or the British. As long as there is enough financial and material support, all the passwords are worthless in front of them. This made me very uneasy, so I decided to develop a brand new encryption method to solve this problem. Now, this system has its own advantages and I want to try its security." Ruprecht wrote in a letter to the German Emperor.

Ruprecht first established contact with the German Emperor through pen pals. Now, although there is a more direct way, the two are still willing to communicate in words when they seem to have nothing to do. Some content that is inconvenient to convey or communicate by phone is transmitted to each other through letters.

"Prussian intelligence encryption is absolutely safe and there is no problem. However, if someone wants to give it a try, I am willing to give you a chance, but this requires a lottery. If possible, I also want to see what your so-called new encryption method is." The German Emperor wrote in his letter with some disapproval. Although he does not believe what **** said, this is indeed a very interesting game."

"I will use the Prussian military password to transmit some information. I will send three to seven special marks and special significance every week. You do the same. For every piece of intelligence deciphered by the other party, 20,000 marks! How about it?" As an emperor of a country, this little money is nothing, and it is all for entertainment. The German emperor is still very at ease with his own intelligence system. At the same time, he also wants to see what new tricks this future Bavarian king can come up with in this field!

"As you wish, dear Emperor, if you feel it is difficult for one person to bear this heavy bet, you can bring your ministers to play this game together. I think we will benefit from each other. I have obtained a lot of marks, and you have foreseeed danger." His Highness **** wrote confidently in his reply.

"Crazy guy! I will definitely make you pay for your arrogance! If you are willing to end this game, you only need to deliver 1 million marks to me. How about?" The German Emperor's anger was fully reflected in the letter, because he felt that the other party was insulting him, no, insulting the IQ of the Kingdom of Prussia!

"Tell the little Moltke to use our latest adfgv password to encrypt it, and then send the cipher text to the arrogant Bavarian prince. As for the content? Just copy a copy of the order we just gave to Krupp." The German emperor ordered.

So on the eve of Christmas in 1902, a new game between the German Emperor and Ruprecht began. At this time, the German Army had already begun to gradually update the password and used this new type of frame password called adfgv by insiders for transmission. Moltke also became interested after receiving the German Emperor's instructions. He also wanted to know whether the password that had just been created within the German Army, which was claimed to be undecipherable, was really as excellent as the inventor of the password.

Soon, when the password officially began to be used within the German military, the game between the two sides officially began! The three telegrams in the first week were sent out, but the result was like a stone bull entering the sea without any news. Similarly, Bavaria also sent three telegrams, which the German experts could not decipher. However, in this contest, no one cared too much about the gains and losses of a week. It was very simple to be willing. When a telegram system appeared, it would be absolutely impossible to decipher in a short period of time. The key to deciphering telegrams is repetition and correspondence to facts. The former is to explore the relationship between ciphertext and plaintext and encryption methods, while the latter is to verify the correspondence between ciphertext and facts.

Not to mention a week, for a whole month, neither side could decipher the other's telegram. Because both sides knew nothing about each other's algorithms, it was very troublesome to need to screen information from the corresponding events. Although it was very calm on the surface, in fact, under the calm appearance, both sides had gradually changed. The Prussian side was still collecting a large number of Bavarian military dynamics to correspond to the content in the telegram. **** has begun to crack the password encryption method.

"Dear Your Highness ****, I take back what I said before. The Prussian side is not all waste in cryptographic mathematics. This time, the frame password they created is very interesting. At least it is very difficult to guess this information using classical normal distribution and statistical principles, because they introduced a password to determine the position of the frame during the deciphering process. In this way, it is indeed not easy to calculate the files after two encrypted times." In ****'s office, the Bavarian chief intelligence master Arthur Shelbius and his assistant Richard Ritter were reporting his work to the prince during this period.

The so-called classical encryption is actually to directly replace the letters in the plain text with seemingly irregular codes agreed in advance. The middle may be replaced many times to increase the difficulty of cracking. However, because it is a simple one-to-one correspondence, no matter how many times you replace it, it is easier to find the correspondence after comparing it with the facts, because no matter how you replace it, a paragraph of text in the cipher text can only correspond to the corresponding plain text, and just guess it directly when necessary.

For example, you received a piece of intelligence, and the information was sent to a certain war zone, but the next day the enemy of a certain war zone suddenly launched an attack. Well, if you are sure that this piece of intelligence has something to do with this attack, then just look for the corresponding relationship. This piece of intelligence will definitely mention the location, time and process of the attack, right? Then just look for it directly. It doesn’t matter if you can’t find it once, accumulate some materials to continue searching. There are so many telegrams on the battlefield, and you can always find the corresponding relationship quickly. This is the so-called classical encryption. Of course, this encryption method is outdated. Even the Prussian military does not need it...
Chapter completed!
Prev Index    Favorite Next