Chapter 23: Espionage Information?

Morse code has a specific translation mechanism, Liu Fang is very familiar with this, he recalls what he saw from the book, while translating, in less than ten minutes, the content that has just been recorded has become English letters and punctuation, only one paragraph is pure numbers. Pen, fun, and www.biquge.info

Generally speaking, Morse code can be read and recognized after it is translated, that is, the code is translated into complete words and sentences, but Liu Fang's translation is only a mess of letters and punctuation marks, which makes him feel very strange.

"Could it be that this is an improved way of encrypting information from spies?"

On the other side of the world, in Seattle, USA, the staff of the American Computer Information Security Center are busy nervously, and a middle-aged man with glasses is pacing back and forth in the hall, frowning and thinking about the problem while observing the content on the large display screen.

Not long after, someone came running over to report the situation to him: "Mr. Michelle, we have sent a high-frequency signal compiled according to Morse code to the satellite, and the receiving station on the RB side has received the signal and is currently decoding it." ”

Michelle is the supervisor here, and he nodded when he heard the debriefing: "Ask them how long it will take for them to convert the signal into code that the computer can recognize." ”

"Okay, I'll ask."

After his men left, Michelle frowned and said to himself, "Is this really reliable?" ”

The U.S. Center for Computer Information Security is conducting a technical demonstration on whether the transmission of computer wireless signals can maintain communication distance while maintaining security.

In order to ensure security, the military asked the National Computer Information Security Center to find a way to encrypt wireless information, and Michelle was busy for several months, and they continued to try various possibilities to find the most secure and reliable wireless transmission method.

At present, the test is to encrypt the computer wireless signal by Morse code, the main working principle is: firstly, in the compression process of the information, the coding sequence is disrupted, and then the security package is added to the information, the security package records the correct order of the restoration code, and the remote wireless terminal will use a special decoder after receiving the signal, and the encrypted information is restored and processed, so that the received signal can be recognized by the computer.

Under normal circumstances, the transmission of wireless signals needs to go through the following steps: high-frequency superposition of signals through specific equipment - sending signals through power capacitance equipment (such as antennas) - radio waves propagating in the air - receiving by the antenna at the receiving end - reaching the information restoration equipment (such as radio or television) - amplifying the electrical signal - removing the superimposed high-frequency signals - decoder restoring the signal into a language that the device can understand, which is the whole process of radio information transmission.

It seems complicated, in fact, it is not difficult to understand, this is like transporting a relatively fragile thing to another place, you need to provide it with a safe and reliable carrier, because there is a large number of clutter in the earth's space, so the signal itself is not suitable for direct transmission, only increase its strength, turn it into a high-frequency signal that is not easy to be interfered with by clutter, and then remove the carrier (that is, the high-frequency signal) after arriving at the destination, in order to ensure the quality of information transmission.

This is just the transmission of information, if it involves security, there are more issues to consider, especially the military's information, which is generally kept secret from the outside world, and if ordinary transmission methods are used, hostile countries can easily crack it.

The struggle between countries is not only reflected in the open, but also in the dark, Americans attach great importance to computer wireless transmission technology, they feel that it can greatly save time and cost, but at the same time, security must also be taken into account.

After fighting with the Soviets for so many years, the Americans knew very well that the Soviet intelligence department was very powerful, and they did not dare to swagger in transmitting signals; in order not to give up this very fine technology, they did not hesitate to spend a lot of money on various technical demonstrations of information encryption, and wanted to break through the technical barriers in the shortest possible time, so that they could throw off their old rivals, the Soviets, in terms of communication technology.

Thinking of the attitude of the person in charge of the military, Michelle couldn't help but show a trace of sadness, few of these officials understand technology, they don't know the difficulty, they only know that they keep urging, which makes Michelle feel heavy pressure, in just a few months, Michelle's gray hair is more than twice as much as before.

"Well, let's hope it succeeds this time, otherwise I'm really overwhelmed."

After Michelle sighed, his subordinates ran over again: "Director, I just asked, and the people on the RB side said that there was a problem with the information in the process of restoration. ”

Michelle frowned: "Did they find out what went wrong?" ”

"There is no specific conclusion yet, but according to the speculation of the technicians, it should be that there is a problem with the decoder."

"You go and call the people from IBM, these guys have been saying that there will be no problem with the decoder, and now I'm going to see what they have to say! If it really doesn't work, let them explain it to the military! ”

When Michelle was losing his temper, Liu Fang was analyzing these messy English letters and symbols, and after reading for a long time, Liu Fang was still confused.

Up to now, Liu Fang feels more and more that this is an encrypted message sent by a spy, in Liu Fang's impression, spies are some elusive and murderous people who don't blink, if they meet a spy in reality, Liu Fang absolutely doesn't say a word, and runs as far as he can.

But now it's different, he received these signals through radio equipment, no matter how powerful the other party is, it is impossible to know who his surname is, in the face of the chaotic encrypted information, Liu Fang's child's heart came out, and he showed a look of excitement: "It looks like it's difficult, it's interesting when the difficulty is high, hum, I don't believe I can't crack you!" ”

Liu Fang shifted his gaze to the purely digital information as he spoke: "If nothing else, this number should hide the key elements to crack this information, well, let's start with it." ”

Liu Fang used his terrifying arithmetic ability to begin to analyze this number, he tried to find out some of the laws that may be hidden in it, and the effort paid off, Liu Fang studied for more than ten minutes, and finally made a discovery.