2014是什么年| 甲状腺有什么反应| 荷花是什么生肖| 心脏做什么检查最准确| 副军级是什么军衔| 做梦来月经了什么预兆| 全距是什么意思| 家里出现蛇是什么征兆| 血清铁是什么意思| 心肌酶高是什么意思| babies是什么意思| 衣原体感染男性吃什么药| 浅表性胃炎吃什么药好使| 间隙是什么意思| 荷花是什么季节| 北京的区长是什么级别| left什么意思| 凭什么是什么意思| 枫叶的花语是什么| 神经性皮炎是什么原因引起的| 手掌心出汗是什么原因| 阴道瘙痒什么原因| 一片狼藉是什么意思| 拔罐对身体有什么好处和坏处| 星星是什么的眼睛| 肠胃不好吃什么水果| 大限是什么意思| 肠息肉是什么症状| 什么是用户名| 阳气最强的树是什么树| 阳寿是什么意思| 突然想吃辣是什么原因| 美帝是什么意思| 早上一杯温开水有什么好处| 眼睛睁不开是什么原因| 脂溢性皮炎用什么药膏| 什么季节| 牛黄安宫丸治什么病| 发烧吃什么食物最好| 一直耳鸣是什么原因引起的| 子宫薄是什么原因造成的| 小龙虾什么季节| 结节是什么原因引起的| 肌层回声欠均匀是什么意思| 胃溃疡吃什么药好得快| 梦见自己来月经了什么预兆| 哈伦裤配什么上衣好看| 满天星是什么意思| 字字珠玑什么意思| 中途疲软吃什么药| 蕊五行属什么| 女左上眼皮跳是什么预兆| 玉树临风什么意思| 慢性非萎缩性胃炎伴糜烂吃什么药| 男性生殖器官叫什么| 前列腺增生是什么原因引起的| 一月10号是什么星座| 纲目是什么意思| 自缢什么意思| 青蛙是什么生肖| 小腿疼是什么原因| 男性尿很黄是什么原因| 短板是什么意思| 牛油果吃了有什么好处| 男性尿道痒吃什么药| pickup是什么意思| 囚徒是什么意思| 耳垂后面疼是什么原因| 沆瀣一气是什么意思| 中耳炎吃什么消炎药| 晚八点是什么时辰| 鸡屎藤和什么相克| 有氧运动是什么意思| 香港有什么东西值得买| 骏五行属什么| 开店需要什么手续| 低血压高什么原因| 猫爱吃什么| 扁桃体发炎引起的发烧吃什么药| 只是女人容易一往情深是什么歌| 瞳孔缩小见于什么病| 棉花代表什么生肖| 草泥马是什么| 十月十九是什么星座| obl是什么意思| 喜用神是什么| 肉桂属于什么茶类| 当逃兵会有什么后果| 发蒙是什么意思| 阑尾炎手术后吃什么好| rag什么意思| 为什么老是口腔溃疡| 8月是什么月| 三昧什么意思| 苦命是什么意思| 真数是什么| 什么是hr| 2.16是什么星座| 五行属火适合什么行业| nmd是什么的缩写| 生不如死什么意思| 孕妇可以吃什么| 神父和修女是什么关系| 为什么晚上睡不着觉| 优生十项是检查什么| 去火喝什么茶最好| 感冒发烧能吃什么水果| 潋滟什么意思| 手热脚热是什么原因| 六度万行 是什么意思| 到底为什么| 利尿是什么意思| 梦见跟妈妈吵架是什么意思| 91年的属什么生肖| 正太是什么意思| 蕾丝边是指什么意思| 惊什么失什么| 不经历风雨怎能见彩虹是什么意思| 北京大裤衩建筑叫什么| 生日吃什么| 浑身没劲吃什么药| 什么是疝气| 阴险是什么意思| 房颤什么意思| 什么是公历年份| 什么书买不到| 扇子骨是什么肉| 03年是什么年| 老人嘴唇发紫是什么原因| 为什么新疆人不吃猪肉| 腹直肌分离是什么意思| 植物神经紊乱吃什么中成药| 拍拖是什么意思| 属蛇的人适合佩戴什么| 女人经期吃什么食物好| 胎停了有什么症状| 尿毒症是什么引起的| 1994年五行属什么| 十一月一日是什么星座| 内脏吃多了有什么危害| 手发麻什么原因| 轰20什么时候首飞| 黄瓜有什么营养价值| 脸上反复长痘是什么原因| 指甲发紫是什么原因| 红蜘蛛用什么药最有效| 孕妇鼻子出血是什么原因| 沉沦是什么意思| 榴莲有什么营养| 玉屏风颗粒治什么病| 手爆皮是什么原因| 送长辈什么礼物好| charcoal是什么颜色| 黄体破裂是什么| 儿童拖鞋什么材质好| 慰安妇是什么意思| 土黄色裤子配什么颜色上衣| r0lex是什么牌子手表| ckd3期是什么意思| 儿童坐飞机需要带什么证件| 小孩做ct对身体有什么影响| 肛窦炎用什么药| 花苞裤不适合什么人穿| 糖耐量受损是什么意思| 全身发烫但不发烧是什么原因| 肝的反射区在什么部位| 什么发型适合自己| 子宫内膜异位是什么原因造成的| 来袭是什么意思| kb是什么| 低密度脂蛋白偏高是什么意思| 手腕疼去医院挂什么科| 血压低有什么办法| 疱疹是什么样的| 分水岭是什么意思| 主动脉瓣退行性变是什么意思| 孕妇多吃什么食物好| 甲沟炎什么症状| 桑叶泡水喝有什么功效和作用| 尿液中有白色沉淀物是什么原因| 酚氨咖敏片的别名叫什么| 早上吃什么水果最好| hiv是什么意思| 打氨基酸点滴有什么好处和害处| 眼珠子疼是什么原因| 细菌感染是什么引起的| 劳士顿手表什么档次| 猴日冲虎是什么意思| 委曲求全是什么生肖| 肝胆湿热用什么药| 关灯吃面什么意思| 生物素是什么| 孕20周做什么检查| 乌龟都吃什么| 什么动物最容易摔倒| 减肥能吃什么水果| 爱叶有什么作用和功效| 岁月匆匆是什么意思| 霉菌是什么病| 屎是黑色的是什么原因| 碧玺五行属什么| 肾小球滤过率是什么意思| 梦到被蛇咬是什么意思周公解梦| 为什么不建议做冠脉cta检查| 氨基酸的作用是什么| 917是什么星座| 解脲脲原体阳性是什么| 胃炎吃什么食物好养胃| 杨少华什么辈分| 梦见被狗咬是什么预兆| 3.1415926是什么意思| 痔疮长什么样| p是什么意思医学| 没有什么就没有发言权| 过敏性咳嗽吃什么药好| 圆脸适合什么短发| 企鹅吃什么食物| 毛毛虫吃什么| 吃榴莲有什么坏处| 洪都拉斯为什么不与中国建交| 联通查流量发什么短信| 丝瓜和什么相克| 海藻是什么| 什么鱼吃泥鳅| 外感风热是什么意思| 吃了避孕药有什么副作用| 十月一日什么星座| 魅可口红属于什么档次| 交公粮是什么意思| 拉青色大便是什么原因| 男性疝气是什么病| 冬日暖阳是什么意思| 女朋友生日送什么| 血小板太高会导致什么| 璋字五行属什么| 政府是干什么的| 乳杆菌是什么| 2013年属什么| 什么人不适合做纹绣师| 仙人板板 是什么意思| 月经推迟7天是什么原因| 3月11日是什么星座| 腰痛应该挂什么科| 猪润是什么| 过期牛奶可以做什么| 大智若愚什么意思| 信徒是什么意思| 蓝矾对人有什么危害| 什么叫重本大学| 荨麻疹有什么忌口吗| 猪肝和什么菜搭配吃好| 竹字五行属什么| 病毒性疣是什么病| 为什么眉毛越来越少| 芒种是什么意思| 仙居杨梅什么时候上市| 湾湾是什么意思| 眼白有黄斑是什么原因| 雾霾蓝配什么颜色好看| 便秘吃什么药效果好| 尿结晶是什么意思| 思伤脾是什么意思| 经常梳头有什么好处| m是什么码| 百度Jump to content

日媒称中国削减钢铁产能成效显著:多地钢铁厂高炉已不冒烟

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
A portion of the "Zimmermann Telegram" as decrypted by British Naval Intelligence codebreakers. The word Arizona was not in the German codebook and had therefore to be split into phonetic syllables.
Partially burnt pages from a World War II Soviet KGB two-part codebook
百度   有了基础保障,党委主体作用同等重要。

In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into something else. A code might transform "change" into "CVGDK" or "cocktail lounge". The U.S. National Security Agency defined a code as "A substitution cryptosystem in which the plaintext elements are primarily words, phrases, or sentences, and the code equivalents (called "code groups") typically consist of letters or digits (or both) in otherwise meaningless combinations of identical length."[1]:?Vol I,?p. 12? A codebook is needed to encrypt, and decrypt the phrases or words.

By contrast, ciphers encrypt messages at the level of individual letters, or small groups of letters, or even, in modern ciphers, individual bits. Messages can be transformed first by a code, and then by a cipher.[2] Such multiple encryption, or "superencryption" aims to make cryptanalysis more difficult.

Another comparison between codes and ciphers is that a code typically represents a letter or groups of letters directly without the use of mathematics. As such the numbers are configured to represent these three values: 1001 = A, 1002 = B, 1003 = C, ... . The resulting message, then would be 1001 1002 1003 to communicate ABC. Ciphers, however, utilize a mathematical formula to represent letters or groups of letters. For example, A = 1, B = 2, C = 3, ... . Thus the message ABC results by multiplying each letter's value by 13. The message ABC, then would be 13 26 39.

Codes have a variety of drawbacks, including susceptibility to cryptanalysis and the difficulty of managing the cumbersome codebooks, so ciphers are now the dominant technique in modern cryptography.

In contrast, because codes are representational, they are not susceptible to mathematical analysis of the individual codebook elements. In the example, the message 13 26 39 can be cracked by dividing each number by 13 and then ranking them alphabetically. However, the focus of codebook cryptanalysis is the comparative frequency of the individual code elements matching the same frequency of letters within the plaintext messages using frequency analysis. In the above example, the code group, 1001, 1002, 1003, might occur more than once and that frequency might match the number of times that ABC occurs in plain text messages.

(In the past, or in non-technical contexts, code and cipher are often used to refer to any form of encryption).

One- and two-part codes

Codes are defined by "codebooks" (physical or notional), which are dictionaries of codegroups listed with their corresponding plaintext. Codes originally had the codegroups assigned in 'plaintext order' for convenience of the code designed, or the encoder. For example, in a code using numeric code groups, a plaintext word starting with "a" would have a low-value group, while one starting with "z" would have a high-value group. The same codebook could be used to "encode" a plaintext message into a coded message or "codetext", and "decode" a codetext back into plaintext message.

In order to make life more difficult for codebreakers, codemakers designed codes with no predictable relationship between the codegroups and the ordering of the matching plaintext. In practice, this meant that two codebooks were now required, one to find codegroups for encoding, the other to look up codegroups to find plaintext for decoding. Such "two-part" codes required more effort to develop, and twice as much effort to distribute (and discard safely when replaced), but they were harder to break. The Zimmermann Telegram in January 1917 used the German diplomatic "0075" two-part code system which contained upwards of 10,000 phrases and individual words.[3]

One-time code

A one-time code is a prearranged word, phrase or symbol that is intended to be used only once to convey a simple message, often the signal to execute or abort some plan or confirm that it has succeeded or failed. One-time codes are often designed to be included in what would appear to be an innocent conversation. Done properly they are almost impossible to detect, though a trained analyst monitoring the communications of someone who has already aroused suspicion might be able to recognize a comment like "Aunt Bertha has gone into labor" as having an ominous meaning. Famous example of one time codes include:

  • In the Bible, Jonathan prearranges a code with David, who is going into hiding from Jonathan's father, King Saul. If, during archery practice, Jonathan tells the servant retrieving arrows "the arrows are on this side of you," it's safe for David to return to court, if the command is "the arrows are beyond you," David must flee.[4]
  • "One if by land; two if by sea" in "Paul Revere's Ride" made famous in the poem by Henry Wadsworth Longfellow
  • "Climb Mount Niitaka" - the signal to Japanese planes to begin the attack on Pearl Harbor
  • During World War II the British Broadcasting Corporation's overseas service frequently included "personal messages" as part of its regular broadcast schedule. The seemingly nonsensical stream of messages read out by announcers were actually one time codes intended for Special Operations Executive (SOE) agents operating behind enemy lines. An example might be "The princess wears red shoes" or "Mimi's cat is asleep under the table". Each code message was read out twice. By such means, the French Resistance were instructed to start sabotaging rail and other transport links the night before D-day.
  • "Over all of Spain, the sky is clear" was a signal (broadcast on radio) to start the nationalist military revolt in Spain on July 17, 1936.

Sometimes messages are not prearranged and rely on shared knowledge hopefully known only to the recipients. An example is the telegram sent to U.S. President Harry Truman, then at the Potsdam Conference to meet with Soviet premier Joseph Stalin, informing Truman of the first successful test of an atomic bomb.

"Operated on this morning. Diagnosis not yet complete but results seem satisfactory and already exceed expectations. Local press release necessary as interest extends great distance. Dr. Groves pleased. He returns tomorrow. I will keep you posted."

See also one-time pad, an unrelated cypher algorithm

Idiot code

An idiot code is a code that is created by the parties using it. This type of communication is akin to the hand signals used by armies in the field.

Example: Any sentence where 'day' and 'night' are used means 'attack'. The location mentioned in the following sentence specifies the location to be attacked.

  • Plaintext: Attack X.
  • Codetext: We walked day and night through the streets but couldn't find it! Tomorrow we'll head into X.

An early use of the term appears to be by George Perrault, a character in the science fiction book Friday[5] by Robert A. Heinlein:

The simplest sort [of code] and thereby impossible to break. The first ad told the person or persons concerned to carry out number seven or expect number seven or it said something about something designated as seven. This one says the same with respect to code item number ten. But the meaning of the numbers cannot be deduced through statistical analysis because the code can be changed long before a useful statistical universe can be reached. It's an idiot code... and an idiot code can never be broken if the user has the good sense not to go too often to the well.

Terrorism expert Magnus Ranstorp said that the men who carried out the September 11 attacks on the United States used basic e-mail and what he calls "idiot code" to discuss their plans.[6]

Cryptanalysis of codes

While solving a monoalphabetic substitution cipher is easy, solving even a simple code is difficult. Decrypting a coded message is a little like trying to translate a document written in a foreign language, with the task basically amounting to building up a "dictionary" of the codegroups and the plaintext words they represent.

One fingerhold on a simple code is the fact that some words are more common than others, such as "the" or "a" in English. In telegraphic messages, the codegroup for "STOP" (i.e., end of sentence or paragraph) is usually very common. This helps define the structure of the message in terms of sentences, if not their meaning, and this is cryptanalytically useful.

Further progress can be made against a code by collecting many codetexts encrypted with the same code and then using information from other sources

  • spies
  • newspapers
  • diplomatic cocktail party chat
  • the location from where a message was sent
  • where it was being sent to (i.e., traffic analysis)
  • the time the message was sent,
  • events occurring before and after the message was sent
  • the normal habits of the people sending the coded messages
  • etc.

For example, a particular codegroup found almost exclusively in messages from a particular army and nowhere else might very well indicate the commander of that army. A codegroup that appears in messages preceding an attack on a particular location may very well stand for that location.

Cribs can be an immediate giveaway to the definitions of codegroups. As codegroups are determined, they can gradually build up a critical mass, with more and more codegroups revealed from context and educated guesswork. One-part codes are more vulnerable to such educated guesswork than two-part codes, since if the codenumber "26839" of a one-part code is determined to stand for "bulldozer", then the lower codenumber "17598" will likely stand for a plaintext word that starts with "a" or "b". At least, for simple one part codes.

Various tricks can be used to "plant" or "sow" information into a coded message, for example by executing a raid at a particular time and location against an enemy, and then examining code messages sent after the raid. Coding errors are a particularly useful fingerhold into a code; people reliably make errors, sometimes disastrous ones. Planting data and exploiting errors works against ciphers as well.

  • The most obvious and, in principle at least, simplest way of cracking a code is to steal the codebook through bribery, burglary, or raiding parties — procedures sometimes glorified by the phrase "practical cryptography" — and this is a weakness for both codes and ciphers, though codebooks are generally larger and used longer than cipher keys. While a good code may be harder to break than a cipher, the need to write and distribute codebooks is seriously troublesome.

Constructing a new code is like building a new language and writing a dictionary for it; it was an especially big job before computers. If a code is compromised, the entire task must be done all over again, and that means a lot of work for both cryptographers and the code users. In practice, when codes were in widespread use, they were usually changed on a periodic basis to frustrate codebreakers, and to limit the useful life of stolen or copied codebooks.

Once codes have been created, codebook distribution is logistically clumsy, and increases chances the code will be compromised. There is a saying that "Three people can keep a secret if two of them are dead," (Benjamin Franklin - Wikiquote) and though it may be something of an exaggeration, a secret becomes harder to keep if it is shared among several people. Codes can be thought reasonably secure if they are only used by a few careful people, but if whole armies use the same codebook, security becomes much more difficult.

In contrast, the security of ciphers is generally dependent on protecting the cipher keys. Cipher keys can be stolen and people can betray them, but they are much easier to change and distribute.

Superencipherment

It was common to encipher a message after first encoding it, to increase the difficulty of cryptanalysis. With a numerical code, this was commonly done with an "additive" - simply a long key number which was digit-by-digit added to the code groups, modulo 10. Unlike the codebooks, additives would be changed frequently. The famous Japanese Navy code, JN-25, was of this design.

References

  1. ^ A History of U.S. Communications Security; the David G. Boak Lectures Archived 2025-08-06 at the Wayback Machine, National Security Agency (NSA), Volumes I, 1973, Volumes II 1981, partially released 2008, additional portions declassified October 14, 2015
  2. ^ "16.2: Substitution Ciphers". Mathematics LibreTexts. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  3. ^ "Zimmermann Telegram: The Original Draft" Archived 2025-08-06 at the Wayback Machine, 2007, Joachim von zur Gathen, "Cryptologia", Volume 31, Issue 1
  4. ^ I Samuel 20:20-22
  5. ^ Friday (1982) by Robert A. Heinlein
  6. ^ Radio Free Europe / Radio Liberty: "Middle East: Islamic Militants Take Jihad To The Internet" By Jeffrey Donovan Archived 2025-08-06 at the Wayback Machine, 16 June 2004.

Sources

  • Kahn, David (1996). The Codebreakers : The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner.
  • Pickover, Cliff (2000). Cryptorunes: Codes and Secret Writing. Pomegranate Communications. ISBN 978-0-7649-1251-1.
  • Boak, David G. (July 1973) [1966]. "Codes" (PDF). A History of U.S. Communications Security; the David G. Boak Lectures, Vol. I (2015 declassification review ed.). Ft. George G. Meade, MD: U.S. National Security Agency. pp. 21–32. Retrieved 2025-08-06.
  • American Army Field Codes In the American Expeditionary Forces During The First World War, William Friedman, U.S. War Department, June 1942. Exhibits many examples in its appendix, including a "Baseball code" (p. 254)

See also

骨密度挂什么科 绝对值是什么意思 高压低是什么原因 小孩肚子疼是什么原因引起的 如火如荼是什么意思
球虫病有什么症状 胎盘低要注意什么 vc是什么药 益生菌什么时候吃最好 去拉萨需要准备什么
女孩第一次来月经需要注意什么 o型血为什么招蚊子 inr医学上是什么意思 高考四百分左右能上什么学校 试孕纸什么时候测最准
农历10月26日是什么星座 喉咙发炎吃什么药最好 头孢加酒有什么反应 什么是肛裂 月经前长痘痘是什么原因
利益最大化是什么意思hcv9jop1ns2r.cn 儿童节送老婆什么礼物0735v.com 什么工作轻松hcv8jop8ns9r.cn 黑皮肤适合穿什么颜色的衣服hcv8jop6ns3r.cn 尿路感染吃什么药最快hcv7jop6ns6r.cn
大象吃什么hcv9jop1ns8r.cn 例假少是什么原因hcv8jop2ns6r.cn 心影稍大是什么意思dajiketang.com 痛风吃什么食物hcv9jop5ns9r.cn 包皮龟头炎用什么药hcv8jop5ns8r.cn
缸垫呲了什么症状hcv8jop6ns2r.cn 10月7日什么星座hcv8jop4ns9r.cn 出血热是什么病hcv9jop7ns0r.cn 发泡实验是检查什么的hcv7jop7ns2r.cn 盗汗和自汗有什么区别hcv7jop7ns4r.cn
风言风语是什么意思hcv8jop7ns7r.cn 恐龙生活在什么时代hcv9jop6ns0r.cn 咽颊炎吃什么药hcv7jop6ns5r.cn 什么炖鸡汤好喝又营养hcv9jop1ns6r.cn 你喜欢我什么我改xinjiangjialails.com
百度