Joke Collection Website - Blessing messages - Was Morse code invented by Alfred Weir or Morse?
Was Morse code invented by Alfred Weir or Morse?
It's the latter.
Morse code was invented by American Morse in 1844.
History of Morse Code
The earliest Morse code was dots and dashes representing numbers. Numbers correspond to words, and you need to look up a code table to know the number corresponding to each word. Use one key to hit points, strokes, and pauses in between.
Although Morse invented the telegraph, he lacked the relevant expertise. He signed an agreement with Alfred Vail to help him build more practical equipment. Vail conceived a scheme that would allow each character and punctuation mark to be sent independently of the other through dots, dashes, and pauses in between. They reached an agreement and agreed to put this scheme of identifying different symbols into Morse's patent. This is now known as American Morse code, and it was used to transmit the world's first telegraph.
This code can be transmitted using a radio signal with a smooth and intermittent tone, usually called a continuous wave (Continuous Wave), abbreviated as CW. It could be an electrical pulse in a telegraph wire, or it could be a mechanical or visual signal (such as a flash of light).
Generally speaking, any encoding method that can represent written characters as a variable-length signal can be called Morse code. But now the term is used to refer specifically to two types of Morse code that represent English letters and symbols: American Morse code, which was used in wired telegraph communication systems; and International Morse code, still in use today, uses only dots and dashes. (pause removed).
Telegraph companies charged based on the length of the letter to be sent. Commercial codes are carefully designed codes composed of five characters that are sent as one word. For example: BYOXO ("Are you trying to crawl out of it?"; LIOUY ("Why do you not answer my question?"); AYYLU ("Not clearly coded, repeat more clearly."). These are five-character abbreviations. It can be sent alone in Morse code. In network terms, we will also say that some of the most commonly used Morse codes are still used in amateur radio: Q and Z: they were originally used by telegraph operators.
On January 8, 1838, Alfred Vail demonstrated a telegraph code using dots and dashes, which was the predecessor of Morse code. .
As an information encoding standard, Morse code has a long life that cannot be surpassed by other encoding schemes. Morse code was used as an international standard in maritime communications until 1997. When the French Navy stopped using Morse code, the last message sent was: "Attention all, this is our last cry before eternal silence"
Morse code consists of a dot (.) The two symbols of , stroke (-) are composed according to the following principles:
1. One point is a basic signal unit, and the length of each stroke is equivalent to the length of 3 points.
2. Within a letter or number, the interval between dots and dashes should be the length of two points.
3. The interval between letters (numbers) and letters (numbers) is 7 points. length.
A .-
B -...
C -.-.
D -..
< p> E .F ..-.
G --.
H ....
I ..< /p>
J .---
K -.-
L .-..
M --
N -.
O ---
P .--.
Q --.-
R .-.
S ...
T -
U ..-
V ...-
W .--
X -..-
Y -.--
Z --..
1 .- ---
2 ..---
3 ...--
4 ....-
5 .....
6 -....
7 --...
8 ---..
9 ----.
0 -----
? ..--..
/ -..-.
() -.--.-
- -....-
. .-.-.-
There is another To represent Morse code: draw the flag to the left to represent a horizontal line and to the right to represent a dot. Not many people know this method anymore.
Several common password forms:
1. Fence transposition method.
That is, alternately arrange the letters in the message to be transmitted into upper and lower rows, and then arrange the letters in the lower row after the upper row to form a password.
Example: Stealing an example from Asai^^
TEOGSDYUTAENNHLNETAMSHVAED
Solution:
Cut the letters into two lines, As follows
T E O G S D Y U T A E N N
H L N E T A M S H V A E D
Then put the letters in the second row into the first row to get the following results
THE LONGEST DAY MUST HAVE AN END.
2. Caesar shift cipher.
It is the simplest misalignment method, moving the alphabet forward or backward by a few places, for example:
Plain code table: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Password table :DEFGHIJKLMNOPQRSTUVWXYZABC
This forms a simple password table. If I want to write frzy (ie, plaintext), then the password is compiled into iucb (ie, ciphertext) according to the above password table. You can choose how many digits to shift in the password table, and the number of digits to move is the key.
3. Hex conversion password.
For example, if you are given a bunch of numbers, which may seem dizzy at first glance, you can observe the pattern of the numbers, convert them into decimal numbers, and then follow the order of each number in the alphabet. Spell the correct letters.
Example: 110 10010 11010 11001
Solution:
Obviously, these numbers are composed of 1 and 0, so what do you think of quickly? Binary numbers, right? Well, then try converting these numbers into decimal and get the numbers 6 18 26 25, which correspond to the alphabet, and the plain text is frzy, haha~
4. Letter frequency password.
Regarding the word frequency password, I here provide you with the frequency of occurrence of English letters, where the numbers are all percentages:
a 8.2 b 1.5 c 2.8 d 4.3
p>e 12.7 f 2.2 g 2.0 h 6.1
i 7.0 j 0.2 k 0.8 l 4.0
m 2.4 n 6.7 o 7.5 p 1.9
q 0.1 r 6.0 s 6.3 t 9.1
u 2.8 v 1.0 w 2.4 x 0.2
y 2.0 z 0.1
The word frequency method is actually to calculate the frequency of each letter in the article The frequency of occurrence in , then roughly guess the clear code table, and finally verify whether your calculation is correct. This method takes a long time to count the frequency of letter occurrences. I will not give examples and questions here. If you are interested, please refer to "Dancing Little Man" and "Golden Beetle".
5. Vigenard Square.
The frequency analysis mentioned above can easily crack long ciphertexts, so Vigenard inherited the experience of his predecessors and created this Vigenard square matrix, thereby overcoming the word frequency Analyzing the shortcomings of easily cracking passwords has become a more powerful form of password compilation.
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
2 C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
3 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
4 E F G H I J K L M N O P Q R S T U V W X Y Z A B C D< /p>
5 F G H I J K L M N O P Q R S T U V W V W X Y Z A B C D E F G H
9 J K L M N O P Q R S T U V W X Y Z A B C D E F G H I< /p>
10 K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
11 L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
12 M N O P Q R S T U V W W X Y Z A B C D E F G H I J K L M
14 O P Q R S T U V W X Y Z A B C D E F G H I J K L M N< /p>
15 P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
16 Q R S T U V W B C D E F G H I J K L M N O P Q R
19 T U V W X Y Z A B C D E F G H I J K L M N O P Q R S< /p>
20 U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
21 V W G H I J K L M N O P Q R S T U V W
24 Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
25 Z A B C D E F G H I J K L M N O P Q R S T U V W clear code table (letters on the first line), password table (26 lines below) and key. Let me give an example below.
Example:
Key: frzy
Password: qfuc
Solution: The first letter, look at the fifth line starting with f , corresponding to the clear code table, the letter marked by the letter q is found to be l. Find the following letters by analogy. The resulting plain text is love.
Some emerging password forms:
1. Using the keyboard
Whether it is a computer keyboard or a mobile phone keyboard, it is a good tool for generating passwords. You can Use dislocation, or arrangement of shapes, etc. The same goes for using a mobile phone keyboard. In addition, the mobile phone keyboard can also make fuss about the letters of the keyboard. For example, you can use 51 to represent the letter j, 73 to represent the letter r, etc.
Example:
r4a6
This password uses the computer keyboard to move the plaintext letters upward one position to obtain the ciphertext. The crack result is frzy.
852 74123 74123698 74269 78974123456 7412369
Is this row of numbers confusing? In fact, it's very simple. Just type the letters in sequence according to the small keyboard and see the shape they form. The answer is I L O V E U.
2. Letter shape
I once received such a password text message, but unfortunately it was cracked, causing the sender of the text message to be ridiculed very seriously by me^^! I mentioned earlier I don’t remember, I just remember that it was followed by hep poo6. You can type this out from your mobile phone, and then turn the phone upside down to read it, forming the plain text of the password, good day~~~:)
- Previous article:How long will it take to find out after the provident fund is paid?
- Next article:How to remove the software under iqoo8 lock screen?
- Related articles
- Payment slip for overdue credit card
- The housekeeper lost her encryption dog.
- Why does the mini-world send verification code show abnormal sending?
- How to refuse advertising spam messages on mobile phones!
- How does Huawei change the storage location of SMS?
- About the college entrance examination, there are always admissions offices calling me.
- You can't send text messages after using the card in the US version of 4s.
- I want to borrow 20 thousand without using the mobile phone verification code. Is it okay?
- 96 1 10 can I send a message to report it?
- Why can scammers send fraudulent information from the number of Agricultural Bank of China 95599?