Password Master 5th century BC, the ancient Greek Sparta appeared in the original cryptograph, wrapped around a wooden stick with a strap, and writing a clear text along the longitudinal axis of the wooden stick, and only a messy cousin letter on the unar chaos. . The decryptors only need to find the same diameter wooden stick, and then wrap the strand, and read out the meaningful plaintext along the longitudinal axis direction of the wooden stick. This is the earliest transpositional cryptography. 1 century BC, famous
Caesar password
It is used in the Gaul War, which is a simple and easy monolithic alternative password. ARM's 9th century, Arabic password student Al Jin Di (Al 'Kindi is also known as Ishaq, (801? ~ 873), or astronomers, philosophers, chemists and music theoretists Decipongable frequency analysis method, by analyzing the frequency deciphering password that appears by the calculation of the text. In the mid-16th century, Italy's mathematician Kaldano (G.cardano, 1501-1576) invented the Kaldano leaflet, covered in ciphertext, can read the plaintext from the hub, this is earlier A disseminated password. In the late 16th century, the British Philips (Philips) used the frequency analysis to successfully cracked the Crypts of Scottish Queen Mary, and the letter planned to assassinate the British Queen Elizabeth. Decided to send Mary to the header. Almost in the same period, French diplomatic officer Wikarnar (or translated as Virgionel) Blaise de ViGenere (1523-1596) proposed a famous Viternalefrangi and VigenrecyPher. This is a multi-table encrypted alternative password that can make Al-Jindi and Phillips failure. Kasiski, Prussia, Prussia, to crack it from the length of keyword. Barles Babbage, Barles Babbage, also cracks from Winnar Passwords by carefully analyzing the structure of the coded letter. At the beginning of the 20th century, the First World War I changed to the crucial moment, the special agency "No. 40 No. 40" of the British decided password was decipherted by the famous "Zimmer Meman Telegraph", prompting the United States to give up neutral participation. Change the process of war. At the end of the battle, it was accurately said that in 1918, the American mathematician Gilbert Varim invents a one-time note password, which is an encryption system that is absolutely unfinished, and is known as a holy cup of password coding. But the difficulty of generating and distributing a large number of random keys makes it actually applied, and the security is more secure from the other hand. In the Second World War, in the process of deciphering the famous "Enigma" cryptographic password password passwords, mathematicians and scientists were joined in the decoding team dominated by linguists and humanities. The father of the computer is Alan Mathison Turing, is added at this time, invented a more highly decoding method. At the same time, this excellent team designed the first computer of human beings to assist in cracking. Obviously, more and more popular computers are also military transit products. Americans decipher the Japanese "Jiuqi" cryptographic machine password called "紫 密". For the former, many major military operations in Germany do not become secrets; relying on the latter, the US military killed the Master of the March of Pearl Harbor's Japanese Fleet of the Japanese Fleet. Also in the Second World War, Indiana Vajo's indigenous language was used as a secret code.