Domov technika Cipher machine

Cipher machine



Specialequipmentforencrypting(decrypting)informationandauthenticatingwithapassword.Themainbodyofconfidentialequipment.Thebasicprincipleofthecryptographicmachineis:thesenderusesapasswordtoperformcryptographicoperationsontheplaintextundertheactionofthekeytoobtaintheciphertext;theciphertextistransmittedontheopenchannel;thereceiverperformstheinversecryptographictransformationonthereceivedciphertext,andTheciphertextisrestoredtoplaintextundertheactionofthekey.Thesecuritystrengthofthecryptographicmachinemainlydependsonthestrengthofthecryptographicalgorithmusedandthestrengthofthekey.Thehistoryofmankind'suseofcipherscanbetracedbacktoclaytabletswrittenduringtheBabylonianKingdom.AncientEgypt,Rome,ArabiaandChinaallhaverecordsoftheuseofpasswords.Almostallmilitaryanddiplomaticrelatedaffairsinthehistoryoftheworldarerelatedtopasswords.Peopleusepaperandpentoencryptcharactersanddigitalinformation,andrealizetheencryptedtransformationofinformationwiththehelpofcertainitems.Themodernindustrialrevolutionandthetwoworldwarspromotedthebirthanddevelopmentofmechanicalcryptographicmachines.Atthebeginningofthe20thcentury,mechanicalcryptographicmachinesbegantobeusedinthemilitary.EspeciallyintheSecondWorldWar,thecryptographicstrugglebetweenthetwowarringpartieswasextremelyfierce,whichpromotedtheupgradingofcryptographicmachines.Amongthem,themostfamousarethebarciphermachinesM-138-T4andM-209usedbytheUSArmyandNavy;the"Enigma"ciphermachineinGermany;theBritishTYPEXtypeciphermachineandtheTUNNYonlineinventedin1943Passwordtelexmachine.AtthebeginningofWorldWarII,theGermanmilitarylaunchedthe"Enigma"cryptographicmachine.Intheprocessofdecipheringthe"Enigma"code,Britaindevelopedtheworld'sfirstcomputer"Korosas".OnJanuary10,1944,the"Korosas"computerbegantooperate,andthenthe"Enigma"cryptographicmachinewascompromised.AftertheSecondWorldWar,thetypesofcryptographicmachinesbegantoincreasegreatly,andthestyleswereconstantlyrenovated.Fromtheinitialelectrontubesandtransistorstointegratedcircuits,miniaturizationandmultiplestyleswerethemaincharacteristicsofthisperiod.Withtheadventofmicrocomputers,high-speedandcomplexmathematicaloperationshavebecomepossible.Theencryptionprinciplehasalsoevolvedfromsimplereplacementandtablelook-upintheelectromechanicaleratoalgorithmicoperationsbasedoncomputationalcomplexityandmathematicalproblems.Drivenbycryptographictheoryandcomputertechnology,cryptographicmachineshaveundergonefundamentalchanges.Themicroelectronicciphermachinenotonlyexpandsfunctionsandimprovesperformance,butmoreimportantly,itexpandstheapplicationfield,extendingfromasinglecommunicationsecurityapplicationtopasswordprotectionandinformationsecurity.Thebasicfunctionoftheciphermachineisinformationencryptionprotection.Earlycryptographicmachinesweremainlyusedforcommunicationsecurity,thatis,toimplementcryptographictransformationsoninformationtransmittedbyvariouscommunicationmeans,communicationfacilities,andcommunicationmethods.Afterenteringthecomputerage,inadditiontobeingusedforcommunicationconfidentiality,cryptographicmachineshavegraduallybeenappliedtoinformationintegrityverification,identityverificationanddigitalsignatures,andarecloselyintegratedwithvariousinformationmediaandmilitaryapplicationstoprovideinformationconfidentialityandintegrity.Servicesplayanimportantroleinthefieldofinformationsecurity.Themainclassificationofciphermachines:①Accordingtothetechnicalstructure,therearemechanicalciphermachines,electromechanicalciphermachines,photoelectricciphermachines,electronicciphermachinesandmicroelectronicciphermachines.②Accordingtotheobjectsofuse,thereareciphermachinesforgeneralandmilitaryservices,aswellasciphermachinesusedbyspecialforces.③Accordingtotheequipmentcarrier,therearespecialciphermachinessuchason-boardciphermachines,shipborneciphermachines,airborneciphermachines,andspaceborneciphermachines.④Accordingtotheequipmentenvironment,therearelow-radiationciphers,hardenedciphersagainstharshenvironments,andportableciphersusedinmobileoperations.⑤Accordingtothephysicallocationinthecommunicationnetwork,thereareterminalciphers,serverciphers,gatewayciphers,nodeciphers,etc.⑥Accordingtothelevelofthecomputernetworkprotocolwheretheprotecteddataislocated,therearephysicallayerciphermachines,linklayerciphermachines,IPlayerciphermachines,transportlayerciphermachines,andapplicationlayerciphermachines.

Publisher:ChinaMilitaryEncyclopediaEditingOffice

Tento článek je ze sítě, nereprezentuje pozici této stanice. Uveďte prosím původ dotisku
HORNÍ