Joke Collection Website - Public benefit messages - Morse code, ... fault decoding, fault decoding, fault decoding, fault decoding,

Morse code, ... fault decoding, fault decoding, fault decoding, fault decoding,

Morse code consists of dots (. ) and dash (-) symbols are in accordance with the following principles:

1, a point is a basic signal unit, and the time length of each stroke is equivalent to the time length of three points.

2. In a letter or number, the interval between points and strokes should be the length of two points.

The interval between letters (numbers) and letters (numbers) is 7 o'clock.

Answer. -

B - ...

c。 -.

D - ..

e。

F..-.

I ...

H ....

I ..

j。 -

Kay. -

Me. - ..

meta-position

No.

Oh-

p。 - .

Ask. -

r。 -.

S ...

T -

U..-

V...-

w。 -

X -..-

You -

Z - ..

1 .-

2..-

3...-

Four ...

five .....

6 - ....

7 - ...

8 - ..

9 - .

0 -

? ..- ..

/ -..-.

() -.- .-

- -....-

. . -.-.-

There is another way to express Morse code: draw the flag to the left to indicate a horizontal line and to the right to indicate a point. This method is unknown to many people.

Several common password forms:

1, fence translocation method.

That is, the letters in the information to be transmitted are alternately arranged in two lines, and then the letters in the next line are arranged after the letters in the previous line, thus forming a password.

Example: an example of stealing Xi.

teogsdyutaennhlnnetamshvaed

Solution:

Divide the letters into two lines, as follows

T E G S D Y U T A E N N

H L N E T A M S H V A E D

Then put the letters of the second line into the first line respectively, and get the following results.

The longest day has an end.

2. Caesar changed the password.

In other words, the simplest method of dislocation is to move the alphabet forward or backward by several numbers, for example:

Clear code: ABCDEFGHIJKLMNOPQRSTUVWXYZ

Password table: DEFGHIJKLMNOPQRSTUVWXYZABC

This forms a simple password table. If I want to write frzy (that is, plaintext), then I can make a ciphertext by comparing it with the ciphertext table above, which is iucb (that is, ciphertext). The cipher table can be moved by itself, and the number of bits moved is also the key.

3. Binary conversion password.

For example, if I give you a bunch of numbers, you may feel dizzy at first sight. You can observe the law of numbers, convert them into decimal numbers of 10, and then spell the correct letters according to the arrangement order of each number in the alphabet.

For example:110101011.

Solution:

Obviously, these numbers are all composed of 1 and 0, so what will you think of soon? A binary number, isn't it? Well, then try to convert these numbers into decimal, get the number 6 18 26 25, which corresponds to the alphabet, and decode the plaintext into frzy, hehe ~

4. Alphabetic frequency password.

Regarding the password of word frequency, I am here to provide you with the frequency of English letters, in which all the numbers are the percentage of occurrence:

a 8.2 b 1.5 c 2.8 d 4.3

e 12.7 f 2.2 g 2.0 h 6. 1

i 7.0 j 0.2 k 0.8 l 4.0

m 2.4 n 6.7 o 7.5 p 1.9

q 0. 1 r 6.0 s 6.3 t 9. 1

u 2.8 v 1.0 w 2.4 x 0.2

y 2.0 z 0. 1

Word frequency method is actually to calculate the frequency of each letter in the article, then roughly guess the list, and finally verify whether your calculation is correct. This method takes a long time to count the letter frequency, so I won't give examples and ask questions here. If you are interested, you can refer to Dancers and Scarabs.

5 Genard Square.

The frequency analysis mentioned above is easy to crack a long ciphertext, so Wei Gena inherited the previous experience and created this Wei Gena German side, thus overcoming the shortcoming that word frequency analysis is easy to crack passwords and becoming a more powerful form of cryptography.

a b c d e f g h i j k l m n o p q r s t u v w x y z

1 B C D E F G H I J K L M N O P Q R S T U V W X Y Z A

2 C D E F G H I J K L M N O P Q R S T U V W X Y Z A B

3 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

4 E F G H I J K L M N O P Q R S T U V W X Y Z A B C D

5 F G H I J K L M N O P Q R S T U V W X Y Z A B C D E

6 G H I J K L M N O P Q R S T U V W X Y Z A B C D E F

7 H I J K L M N O P Q R S T U V W X Y Z A B C D E F G

8 I J K L M N O P Q R S T U V W X Y Z A B C D E F G H

9 J K L M N O P Q R S T U V W X Y Z A B C D E F G H I

10K L M N O P Q R S T U V W X Y Z A B C D E F G H I J

1 1 L M N O P Q R S T U V W X Y Z A B C D E F G H I J K

12M N O P Q R S T U V W X Y Z A B C D E F G H I J K L

13N O P Q R S T U V W X Y Z A B C D E F G H I J K L M

14 O P Q R S T U V W X Y Z A B C D E F G H I J K L M N

15 P Q R S T U V W X Y Z A B C D E F G H I J K L M N O

16 Q R S T U V W X Y Z A B C D E F G H I J K L M N O P

17 R S T U V W X Y Z A B C D E F G H I J K L M N O P Q

18S T U V W X Y Z A B C D E F G H I J K L M N O P Q R

19T U V W X Y Z A B C D E F G H I J K L M N O P Q R S

20 U V W X Y Z A B C D E F G H I J K L M N O P Q R S T

2 1V W X Y Z A B C D E F G H I J K L M N O P Q R S T U

22 W X Y Z A B C D E F G H I J K L M N O P Q R S T U V

23 X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

24 Y Z A B C D E F G H I J K L M N O P Q R S T U V W X

25 Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

26 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Above is the Genard square, which consists of the plain code table (the first line of letters), the cipher table (the next 26 lines) and the key. Let me give you an example to illustrate.

For example:

Key: frzy

Password: qfuc

Solution: the first letter, look at the fifth line starting with F, the letter marked with the letter Q in the corresponding plain code table is L, and so on to find the following letters. Plain text is love.

Some emerging password forms:

1, use the keyboard

Whether it is a computer keyboard or a mobile phone keyboard, it is a good tool to generate passwords, which can be misplaced or arranged in a shape. Using the mobile phone keyboard is the same as this. In addition, the mobile phone keyboard can also make a fuss about the letters of the keyboard. For example, the letter j can be represented by 5 1 and the letter r by 73.

For example:

r4a6

The cipher uses the computer keyboard to move the plaintext letters up one place respectively to get the ciphertext. The result of the crack is frzy.

852 74 123 74 123698 74269 78974 123456 74 12369

Is this row of numbers dizzy? It's actually quite simple. As long as you input these letters in turn on the keyboard, you can see the shape of the composition. The answer is I love you.

2. Letter shape

I once received such a password message, but it was cracked, which caused the sender to be ridiculed by me seriously! I don't remember the front, only hep poo6 is behind. You can type this out of your mobile phone, and then read it backwards to form a password in plain text. Good day ~ ~ ~:)