Reprinted from the Thoughts Science www.myscience.com.cn, the author is tightening
Human use of password history, from today, you can always trace back to Babien's mason text. Ancient Egyptians, ancient Romans, ancient Arabs ... Almost all civilizations in almost world have used passwords. Military and diplomacy has always been the most important field of password applications, kings, generals, diplomats, and conspiracy molecules, etc. In order to protect their own information during communication, they are not known by outsiders, and use diaphoretical passwords; Secret, they tried their brains and tried to decorate the password of the opponent. Encryption and decryption has always been cryptographic. This coin is opposed to each other and facilitates each other. In all passwords used in military and diplomacy, the most famous probabilies should belong to ENIGMA used in Germany in the Second World War, meaning "mystery"). First, the birth until the end of the First World War, all passwords are used by handmade. Directly, it is a way of pencil paper. In my country, the Posts and Telecommunications Board code coding and decoding until late (probably the early 1980s) is still using this manual method. Hand-coded ways bring a lot of inconvenience to one side of the password. First, this makes the efficiency of sending information extremely low. Ming Text (which is no encrypted original text) must be converted into a ciphertext by an encrypted staff. Considering that it is not possible to repeat the same way to copy the same way to ciphertext (this is easy to make the enemy to specify this conversion method), and the encryption personnel cannot keep the conversion method in mind. The conversion is usually used in the table, and the table is different, so the decoding speed is extremely slow. The password is also used to convert secret text to its plain text in the same way. Second, this efficient low manual operation also makes many complex confidentiality performance, and the simple encryption method cannot afford the power of decryption. When the decryption is proud of the spring breeze, the ViGenere password and its variaries have been considered for hundreds of years. The invention of radio reporting makes it easy to interceise secrets. Whether it is military aspects, there is a reliable and effective way to ensure the security of communications. In 1918, the German inventor Arthur Scherbius and his friend Richard Ritter have founded Shel Bius and Ritt. This is a special business that transforms new technologies into applications. It is very similar to the current high-tech companies, the profits are not small, but the risk is very large. Shelbus is responsible for research and development, and it is chasing the new trend at the time. He has studied electrical applications in Hannover and Munich. One of his ideas is to replace the encryption method of the excessive pencil paper with electrical technology in the twentieth century.
Arthur Shel Buse
The encrypted electronics mechanical electronic mechanical mechanics of Shel Buse is called Enigma, in the later generation,
It will prove to be one of the most reliable encryption systems in history, and to this reliability
Blindly optimistic, making it a disaster that users have been underway. This is a later voice, and it is not mentioned.
Enigma
Enigma looks a box filled with complex and exquisite components. If
We open it, you can see that it can be decomposed into a very simple part. under
The picture of the face is a schematic diagram of its most basic part, we can see it's three parts:
Disc, rotor and display.
On the photo of Enigma above, we see the following part of the horizontal panel is the key.
Dish, a total of 26 keys, keyboard arrangement close to the computer keyboard we use now. in order to
Make the message as short as possible, it is more difficult to decipher, space and punctuation symbols are omitted. In the schematic
We only draw six keys. In the active photo, the upper button is the display, which is indicated
The 26 small lamps of the same letters are composed. When a key on the keyboard is pressed, the small light corresponding to the ciphertext after this letter is on the display. Similarly,
We only painted six small lights on the picture. Above the display is three rotors, their main
Part is hidden under the panel, in the schematic, we only draw a rotor for the time being.
The keyboard, the rotor and the display are connected by the wire, and the rotor itself integrates 6 lines (in
Troune 26 in the actual object, the signal of the keyboard corresponds to the different lights different from the display. Presentation
In the intention, we can see that if the A key is pressed, the light B will be bright, which means A is added
Secret adduct B. Similarly, we see that B is encrypted into a, C is encrypted into D, D is encrypted
It became f, E was encrypted into E, F was encrypted into C. So if we follow the keyboard
When you enter CAFE, the DBCE will be displayed on the display. This is the simplest encryption party
One of the laws, replace each letter to replace another letter, so
The encryption method is called "simple replacement password".
Simple replacement password has appeared very early in history. The famous "Caesarfa" is one
Simple replacement, which puts each letter and it in the alphabet in the alphabet
The letter corresponds to the letter. For example, let's take three positions, then one of the letters is as follows.
The table shows:
Ying code alphabet:
Abcdefghijklmnopqrstuvwxyz
Password alphabet:
DefghijklmnopqrStuvwxyzabc
So we can get cis from plain text: (Veni, Vidi, Vici, "I come, I see,
I conquer the name "is the name of Schille, Caesar, Dawn, the Name, the name of the old home garden
Say
Ming text:
Veni, VIDI, VICI
Ciphertext:
Yhal, Ylgl, YLFL
Obviously, this simple approach is only 26 possibilities, not enough to be practical. One
It is proposed a more casual one, such as
Ying code alphabet:
Abcdefghijklmnopqrstuvwxyz
Password alphabet:
JQKLZNDOWECPAHRBSMYITUGVXF
You can even define a password alphabet pattern without using Latin letters. But use this
The ciphertext obtained by the method is quite easy to crack. By late Nineteen, Allah
Bo's password decipherous expert has mastered the frequency of frequencies with statistics.
Broken simple replacement password. The principle of crack is simple: in each pinyin text language, each
The frequency of letters is not the same, for example, in English, the number of times of e has a big difference
It is higher than other letters. So if there is enough ciphertext, through statistics, each letter
At the current frequency, we can guess a letter in the password corresponding to which letter in the clear code
(Of course, it is also necessary to fracture the basic password for basic passwords such as the context). Conan Dao in him
The famous Holmes probation focuses on "dancing people" detailed Mesy
Rate statistical to decipher the process of dancing humanoid passwords.
So if the effect of the rotor is just replacing a letter to another, then
It is too big to mean. But everyone may have guess, the so-called "rotor", it
Will turn! This is the most important design of Shelbuus about Enigma - when keyboard
When the previous button is pressed, the corresponding cixed is displayed on the display, and then the direction of the rotor is
Automatically rotate a letter (in the schematic diagram, turn 1/6 turns, and in practice
Turn 1/26 loop). The following schematic represents the case of continuously type 3 B:
When the first typing B, the signal is lit by the connection in the rotor, the lamp A is on, the rotor is turned, and the password corresponding to each letter will change; the second time Into B, it
The corresponding letter becomes C; similarly, when the B is typed in the third time, the light e shin.
The photo left is a complete rotor, the right side is the decomposition of the rotor, and we can see the wire mounted in the rotor.
Here we see the key to enigma encryption: This is not a simple replacement password.
When the same letter b is different from different locations in a clear text, it can be replaced by different letters, and the secret
The same letter in different locations can represent different letters in the clear, frequency analysis
There is no use here. This encryption method is called "duplex replacement password".
But we see, if you type 6 letters (26 letters in the real thing), rotor
It will turn around and return to the original direction. At this time, the encoding is initially repeated. and
During the encryption process, the phenomenon of repetition is dangerous, which can make people trying to decipher the password
Seeing regular things. So Shel Buse has added a rotor on the machine. In the first
After a rotor turns a whole circle, there is a tooth on the top of the second rotor, making
It rotates the position of a letter. Look out below (for simplicity, now
In we expressed it as a flat form):
Here we assume that the first rotor (the one on the left) has been turned into a circle.
Press the B key to the display on the display; when the B key is released, the first rotor is also driven the second
The rotor rotates at the same time, so when I type B in the (b), the encrypted letter is f;
When the button B is released again, only the first rotor is rotated, so the third time in the (c).
When it corresponds to b, it is the letter B.
We see such a method to 6 * 6 = 36 (26 * 26 = 676)
The original encoding will be repeated later. In fact, there are three rotors in enigma (the late Second World War II
German Navy enigma even has four rotors), no repetition direction reached 26 * 26 * 26
= 17576.
On this basis, Shelbus is very cleverly plus one end of the three rotors.
The reflector is connected with the same alphabet in the keyboard and the display. Reflector and
Like the rotor, connecting a letter on another letter, but it does not rotate. At first glance
It seems that there is no use of such a fixed reflector, it does not increase the editor you can use.
The number of codes, but linked it with the decoding will see that this design is unique.
See below:
We see that the same letters in the keyboard and display are connected together by the wires. In fact there
It is a very clever switch, but we don't need to know the specific situation. We only
Need to know that when a button is pressed, the signal is not transferred directly from the keyboard to the display (
This is not encrypted), but first through three rotors, one line is connected.
After the reflector returns to three rotors, reach the display by another line, ratio
If the B key is pressed by the B key in the picture above, it is D lamp. Let's see if it is not a B button at this time.
But the D key, then the signal is just in the opposite direction of the B key being pressed, and finally
Arrive at the B lamp. In other words, in this design, although the reflector does not increase like a rotor.
Possible non-repetitive directions, but it can make the decoded process and encoding process completely
kind.
reflector
Imagine to send a message with Enigma. Send a trafficker first to adjust three turn
The direction of the child, one of them in 17576 directions (in fact the rotor's initial direction is the key, this is the number of transceivers must be pre-cordial), then type the plain text,
And record the shiny letters, then use the encrypted message such as telegraph
The way is sent. When the recipient receives the text, use the same ENIGMA.
According to the original agreement, adjust the direction of the rotor to the same initial direction as the sender.
Then type the ciphertext received in turn, and record the shiny letters again, it will be clear
Text. So the process of encryption and decryption is exactly the same - this is the work of the reflector.
use. Take a little consideration, we can easily understand that a side effect brought by the reflector is
One letter will never be encrypted into itself, because one letter in the reflector is always
Connect to another different letters.
Reflector and three rotors installed in enigma
Then, the initial direction of the rotor determines the encryption method of the entire ciphertext. If the communication is
With an enemy monitoring, he will receive a complete ciphertext, but because I don't know the initial of the three rotors.
The direction, he has to test this key for one direction. The problem lies in 17576
This number is not too big in the initial direction. If people trying to decompipulate the ciphertext to adjust the rotor
To a certain direction, then type a piece of ciphertext, look at whether the output is like it is meaningful.
information. If not, then try the next initial direction of the rotor ... if you try a party.
For about a minute, while he works 24 hours a day, then it is about two weeks.
You can find all the possible initial directions of the rotor. If the opponent is decipherted simultaneously with many machines,
Then, the time required will be greatly shortened. This degree of confidentiality is not enough.
Of course, Sher Bius can also add a rotor more, but we see a rotor each plus
The possibility of the initial direction is only multiplied by 26. In particular, increasing the rotor will increase Enigma
Volume and cost. Shel Buse hopes that his encryption machine is easy to carry (in fact
It is the final size of 34cm * 28cm * 15cm), not a pang with a dozen rotors.
Items. First of all, he made three rotors to disassemble each other, so that
The likelihood of the initial direction becomes six times the original. Suppose the number of three rotors is 1, 2, 3,
Then they can be put into 123-132-213-231-312-321 six different locations, of course now
The two sides of the sending and receiving news must be pre-contemplated in advance, but also to set this
Use one in six arrangements.
The next step of Shelbuus adds a connecting plate between the keyboard and the first rotor. This
The block connecting plate allows the user to connect a letter and another letter with a connection.
Thus this letter will be converted to another letter before entering the rotor.
This connection can have the up to six (later ENIGMA has more connection), so
You can make 6 signals of the letter to each other, and the letters that are not plugged into the connection remain unchanged.
In the real map of ENIGMA above, we see this connection board below the keyboard.
Of course, the connection between the connecting panels is also the need to pre-agree.
In the above schematic, when the B key is pressed, the lamp C is on.
So the initial direction of the rotor itself, the mutual position between the rotor, and the connecting plate
The condition of the line constitutes all possible keys, let us come to a total of a total of how much
.
The three rotors have different directions of 26 * 26 * 26 = 17576 different possibilities;
Different relative positions between three rotors are 6 possibilities;
Two two two exchanges on the connecting board 6 have a very huge number of letters,
100391791500 species;
So a total of 17576 * 6 * 100391791500, about 10000000000000000,
Ten monthly possibility.
As long as it is based on the key mentioned above, the transceiver can use Enigma to use enigma.
Easily encrypt and decrypt. But if you don't know the key, this huge possibility
Before, attempts to try to find a key is completely unobs. We see the connection board pair
The increase in the increase in the possibility, then why Sher Bius wants to design it so much
What about the children? The reason is that the connecting board itself is actually a simple replacement password.
Unit, during the entire encryption process, the connection is fixed, so use it is very easy to use.
Frequency analysis method is decipherous. Although the rotor system is not available, it is encrypted
In the process, they constantly rotate, so that the entire system becomes a complex replacement system, frequency analysis
The law will no longer be powerful, at the same time, the connecting plate has increased the number of possibilities.
It is desirable to make a violent decomposition method (that is, a method of trying all possibilities).
In 1918, White Hilby applied for ENIGMA's patents. He thought that since his own hair
Ming can provide excellent encryption means, but also highly encrypted decryption efficiency, certain
Soon selling very quickly. He provided a basic enigma for the business community.
Personnel offer a luxurious model with a printer. But he seems to make a mistake. his
The price of the machine is approximately $ 30,000 (if you order a thousand sets, each
It is also $ 4,000). This price makes the customer look down. Although Shel Bius is a business
The family claims that if their important trade secrets are known, they have been learned.
The loss will be much higher than the price of Enigma, but entrepreneurs still think they have no
Forces to buy Enigma. The new invent of Shelbuus did not bring like he expected.
How much responses. There is not much attention to his inventions in terms of the army.
The disappointment of Shel Bius is imagination. But he is not the only person in this regard.
And he also thought of invented the three inventors of the other three countries.
The idea of using a rotor's electrical encryption machine. In 1919, the Netherlands inventor Alexander Koch
(Alexander Koch) registered similar patents, but it did not make it commercialized.
In 1927, he had to sell his patent. In Sweden, Avede Damm (ARVID DAMM)
I also got a lot of patents, but until 1927 he died when he died.
Go to the market. In the United States, Edward Hebern invented his "wireless lion"
The people are full of hope. He opened a factory with $ 38 million, but only sold
Ten machines worth a thousand dollars worth a thousand dollars. 1926 Hepburn by California
East prosecution, was sentenced to sin.
However, Shelbus suddenly runs. The British government issued two questions about a big
The warfare file made the German army began to interested his inventions. One of them was 1923
The published Winston Churchill's book "World Crisis", one of which mentioned the UK
And Russia cooperation in military, pointed out that the Russians have successfully decipherted certain German military secrets.
Code, and use these results, the UK's 40 bureaus (British government responsible for the spyware machine)
Structure) can systematically obtain a German encryption intelligence. Germany is almost ten years later
I know this truth. The second document is also the result of the Royal Navy in 1923
The official report of the First World War, which tells the interception of the military union military.
Deciphering the decisive advantages of the German communication. These files constitute a German intelligence
The recessive allegations of the department, they finally admitted that "Since the radio communication is intercepted and deciphered by the ENC,
The German naval command department is like a collection of his own cards on the table and the British navy. "
In order to avoid re-falling in such a situation, the Germans will carry out the invention of Shelbyus.
Feasibility study, finally concluded that this encryption machine must be equipped. Open from 1925
At the beginning, Shel Buse's factory began to produce Enigma, and the Germans began to use these machines. Then the government agency, such as state-owned enterprises, railway departments, etc.
Enigma. These new models of machines are different from some of the commercial models that have been sold.
So the user of commercial machines does not know how the government and military machines are specific.
.
In the next decade, the German army equipped approximately 30,000 ENIGMA. Sher
The inventions of the Bisus make Germany with the most reliable encryption system. On the Second World War
Opening, the Secretary of the German communication was unparalleled in the world at the time. It seems that you can say this,
The role of Enigma played in the early victory in the first stage of Nazi Germany is decisive, but
We will also see that it plays an important role in the destruction of Hitler.
But Shel Bius did not see all this. Once I am in the trocha, he
Falling on a wall, died of visceral damage on May 13, 1929.