Chapter 20 Frequency Hopping Communication

"Captain Murong, in fact, you can consider trying to use radio interference methods, if you use your means, you can completely interfere with foreign radio and network communications! Even, you can do a lot of things when it comes to anti-jamming. Pen %Fun %Cabinet www.biquge.info For example, if the enemy is listening to our communications, what should we do? When we send intelligence to the front lines, we will inevitably be spied on. In this way, if our enemies know our communication frequencies, then we will definitely be spied on. We have passwords, but who can guarantee that our codes will not be deciphered? Tie Ying asked.

Murong Chunxiao also nodded and said, "Although the communication frequency and password we use are relatively unique, and they are specially designed by asking someone to design them. However, even if our communication protocol standards and passwords are unique, it does not mean that we are completely secure. Because there are experts in foreign countries, and there are similar experts in foreign armies. Once they know our communication frequency, and they know our communication protocol, they can simulate it. Once the simulation is out, they can all listen to it. ”

"We communicate through unique frequencies, unique military communication protocols, and various passwords, three layers to ensure the security of our communications, first of all, we must use the communication frequency band as secret as possible, so as to avoid the enemy knowing our frequency or even the spectrum. Then special military communication protocols were adopted to avoid easy knowledge by the enemy. And even if the protocol is broken, we must know our communication password, and it is useless not to know the password. We keep our communications private through frequency, protocol, and cryptography. ”

When it comes to professionalism, this Murong Chunxiao also obviously seems to know his own professionalism. She studied radio communication and network communication, so she was naturally very familiar with the things here. In the military, in order to maintain confidentiality, the communication frequencies and network protocol standards used are different from those used for civilian use. However, civilian ones are not compatible with military use, just as the new version of the operating system can be compatible with the software of the old version of the operating system, but the software of the old version of the operating system cannot use the software of the new operating system.

Almost no matter what, military technology is more high-end, more advanced, and more willing to spend money than civilian technology most of the time. And Murong Chunxiao naturally understands this thing, this communication frequency is the first layer of secrecy, to avoid the enemy from knowing his frequency or even the spectrum, which is conducive to ensuring that it will not be easily monitored. The communication protocol is the second layer of secrecy, and the communication protocol of each country is different, and it is not possible to easily connect with the other party's network. Even if you know the frequency, if you don't know the communication protocol of the other party, you can't easily access the network.

Of course, once the enemy knows the frequency and cracks your communication protocol, they will simulate it themselves. He can also infiltrate the communication network as a spy, pretend to be his own communication point, and then intercept your messages.

In fact, more than 100 years ago, after the Ming Empire first invented the telegraph, all countries began to study the method of monitoring telegraphs. In particular, wireless telegraphy can be received by the whole world as long as it is sent. There would have been interception and surveillance, and later military coded communications were invented. But as the saying goes, if there is a spear, there is a shield, and the road is one foot high, and the magic is one foot high, and if you can figure out the code, then others will also think about deciphering the code, so the two sides have one more project in terms of communication and intelligence, that is, the other party's communication code.

Later, after the invention of the network and various communication systems, everyone once again had an additional layer of defense. Originally, it was a two-layer defense method for radio passwords, but now there is an additional layer, that is, the communication protocol, which has an additional layer of defense between the radio frequency and the password. In this way, even if you know the communication frequency, you will not be able to enter the network communication system of this frequency, and you will not be able to "join" it, because the protocol is different! Even, if they rush in, they may be intercepted by the military gateway, or even conduct anti-tracking.

"But the way we currently use to prevent surveillance is generally in the context of military agreements. We can design in terms of military network communication protocols, with a completely different architecture, so that we can avoid the enemy's cracking. Murong Chunxiao said.

However, Tie Ying asked rhetorically: "There are three kinds of defense at present, one is through radio frequency, and the second is through communication network protocols. The third and final layer is the password as a defense. But think clearly, password defense isn't as secure as you used to think. Although the telegraph was used in the past, passwords were memorized in people's heads or on paper at that time, and could not be easily stolen. If an enemy wants to steal the codebook, they must do so through an agent. However, nowadays, the codebook is stored in the form of electronic files in the computer of the individual. So what if an enemy eavesdropper breaks the protocol and infiltrates our communications network? If they have a few more masters like you, they'll probably copy these codebooks from our other computers! Our method of putting it in the computer is actually not very secure, and the codebook is not very secure. In the past, if you wanted to copy a document, you had to take a photo or print it. But now, just right-click with the mouse and copy it, and that's it, it really doesn't have to be too difficult. So, if the enemy cracks our communication protocol, then we will definitely not be able to defend effectively. ”

Murong Chunxiao also smiled bitterly, because Tie Ying was right. At present, although it is hot to use electronic equipment, it is possible to write passwords directly in the computer. Nowadays, there is no need to manually translate communications, as was the case in the past. Unless it's a top-level strategic intelligence, it won't use human power to translate, and it will directly get the codebook into the computer as a program, and then it can be automatically translated when needed. At present, tactical campaign information is also automatically translated by computer programs. In addition to the first-level and second-level passwords, the third, fourth, and fifth levels of passwords are all automatically translated by the computer.

So once the enemy invades the system, in case the other party still has a master, then he can click the right button at any time to copy it. Although this process is exaggerated, it is enough to show that once the enemy cracks the protocol, the passwords stored in the computer are obviously not very secure, and their security cannot be guaranteed. Technology is convenient for humans, but it is also convenient for enemies.

"Hey, so we basically change the level 5 password once a day, the level 4 password every five days, and the level 3 password once a month. This way we keep it as secret as possible! Murong Chunxiao replied.

Tie Ying thought for a moment and said, "Why don't you consider setting up an extra layer of secrecy?" So our communications are entirely based on communication network protocols to contain the enemy? In this way, although we have three layers of defense, in fact, the biggest role is actually the second layer of communication protocol layer? Isn't that too risky? ”

"Well, how about not doing that? This is the case in all countries, focusing on the development and transformation of that communication protocol. Murong Chunxiao replied.

However, Tie Ying asked rhetorically: "Why can't we make a fuss about the communication frequency and spectrum, by keeping the communication frequency secret, so that we can avoid the enemy from invading our protocol!" As long as we ensure that our frequencies are not leaked in the first place, how can the enemy know that we are successfully probing our protocol? ”

"This is impossible, and the frequencies of the whole world have been divided at present. The military and civilian are separated, and then everyone understands the military, and everyone also understands the communication spectrum of various countries. Even if they still don't know, they all know what range our spectrum is in. If they really want to test it, they can start the monitoring system and test the monitoring one by one. In the past, it was still necessary to use human resources to monitor, but now it is completely dependent on computers. Once we use too much at the same frequency, it is easy for the enemy to know what our frequency is. Therefore, the defense ability in terms of frequency is very poor, and it is difficult to defend effectively! Murong Tianxiao replied.

Tie Ying laughed and said, "My eldest Miss Murong, you are really still a little confused!" You're only thinking about defense from a technical point of view, but why don't you think about a strategic defense point? Technology is hard-hitting, and the technology of our countries is actually similar, and we have enemies who may be worse than us, but not too much. But we can use strategy to widen the gap here, you just think that it is purely on the protocol side and on the frequency side. Why can't we defend from a strategic mindset so that we can be better. ”

"You should know that you don't win eggs in the same basket, right? If the eggs are placed in the same basket at the same time, it can easily be taken away by outsiders. If we compare this communication frequency to a basket of eggs, why should we concentrate all the communication content in this basket? Why can't we communicate on multiple frequencies at the same time? ”

"Communicating with multiple frequencies at the same time? This is impossible, just like a five-pin, it is impossible to tear it into two copies at the same time for transmission! Murong Chunxiao said.

Tie Ying shook his head and said: "You're not right, I remember the flow of communication, which is to convert words into passwords, and then modulate the passwords through the modem, and finally adjust them into electrical signals, and then propagate them through electromagnetic waves, and finally the other party's modem receives them and demodulates them, and then they can be turned into passwords again, and they are translated through the codebook program in the computer, so that they also become the content of the message." ”

"In that case, as far as I know, network protocol data should be in frames. Then the 'frames' are combined into the data content, and then it becomes the information communication content. You might as well treat this information and data content as a 'frame', and a frame as an object. And then it's like going through different roads, and then getting these goods to that 'destination', and finally combining these 'frames' again into something that needs to be used. You treat that information as a 'single thing', and naturally you think it is indivisible. But if you ignore the essence of the information and communications, you just treat them as 'frames' that can be reassembled when they reach their destination. Just like when we build a house, the cement and steel bars come from different manufacturers and even different cities. But we can come together through different means of transportation and build a big house, so can you say that this house is a thing? ”

"So, you just think of this information as a 'frame' and send it through different channels. And this channel, that is, different frequencies, so that you can also go through different channels. ”

Murong Chunxiao suddenly exclaimed: "What you mean is that through different frequencies, send these 'frames', and then the other party receives them at the same time, so that in the end, these 'frames' are assembled into the content that is really needed." That's right! As a technician, how could I not have thought of it? It stands to reason that I should have studied network communication, but I am not as good as you as a person in charge of operational command, I am really ......"

Tie Ying thought secretly: "Hehe, although I didn't learn network communication in my previous life and this life, I have many years of experience in leading troops. Am I not even aware of frequency hopping communication? ”

However, what Tieying didn't expect was that this Murong Chunxiao quickly drew inferences and said, "If that's the case, then we can adjust the frequency frequently, so that we can transmit content through different frequencies." Then we can assemble a program in the computer that can change the frequency communication at any time when necessary. If I design this level, I can even change the frequency almost hundreds of times a second, so that if I have this program installed here, then I can change the frequency hundreds of times a second. The enemy may only be able to monitor one frequency, and even if they get one of them, the content of the message they intercept will be very small, or even very fragmentary. They can't know which frequencies we're using, so they can't all effectively decipher our protocols, and then our protocols are much more secure. ”

"If that's the case, it's really amazing, it's a revolution in communications! In this way, our ability to keep our communications confidential in the future will be improved. ”