One of the fun codenics: from the small man of Holmes

xiaoxiao2021-03-06  109

Please take a look at the following picture first.

Is this just a simple picture?

People who have seen Holmes probes should be impressive - That is the "small person password" that appears in "dancing people". The problem in the big detective in this story is to crack this password to get the information implicit in the picture to obtain the clue of the case. Smart Holmes is of course in the clue in the horses, and the horses in the horses. Although this story is fictitious, it includes rich password knowledge. Let's follow the Holmes, launch a journey of learning password knowledge.

Just starting, the big discharge of this painting is of course not possible to know what it means. But the only speculated is that this string drawing represents a string or numbers. That's right! The so-called "password" is a method designed to cover the obeys, transfer secret messages to the other party. Almost as long as there is secret, in order to protect the secret, there is a password. Therefore, the origin of the password is very early, and when human beings can communicate with each other, the password is born. The original information is clear and white, clear, called "clear text"; "Ming Wen" has become a "secret" through a certain rule method, it turns into secrets.

There is only this small person ("Cipheet") in the Fuyang, and if there is no more cizephology, more clues are unable to know it. Because if a small person represents a letter, so many words consisting of small people together have thousands of possibilities, which cannot be cracked by one by one. There are 2,615 other characters as shown in the figure, which is simply an astronomical figure (there is no computer at that time). Furthermore, if these small people represent a number, and these numbers correspond to a word on a page in a book? There are many kinds of possibilities, and this clue is based on this clue to analyze the expressions, and there is no difference between and no one. It can therefore be said that this password is very safe, people can't crack - that is, the height of "Perfect Security). In passwordology, there is only one way to do theoretically absolute security: "One secret". It is the method of adding recryr if it is only used once, and it will be discarded. In the second battle period, spies have a loose page, and each page records encrypted decryption methods. After each encryption, the page is destroyed to ensure safety.

It seems that we have to pinch a big detective. How did he solve a problem?

(to be continued)

转载请注明原文地址:https://www.9cbs.com/read-124927.html

New Post(0)