The secret codes of the Morse code tutorial are as follows:
The digital codes are A4, V2, 4T, E, O3, 2K, L1, 3H, 2P, and P4.
Morse code is a signal code that is on and off. It expresses different English letters, numbers and punctuation marks in different arrangements. This type of code can be found directly by splicing the characters. There are code words, they are jump codes.
This kind of "letter" is basically an ancient Egyptian hieroglyphic symbol. The Wikipedia page lists ten Egyptian symbols along with the original Sinaitic alphabet, the Phoenician alphabet, the ancient Hebrew alphabet, and the Aramaic alphabet.
The English alphabet borrows from the Latin alphabet invented by the ancient Romans. The Latin alphabet originated from the Greek alphabet, and the Greek alphabet evolved from the Phoenician alphabet. The Phoenician alphabet was deeply loved by the ancient Egyptians. Influence of calligraphy. During the New Kingdom of ancient Egypt, the Phoenician region was under Egyptian rule for most of its time.
1. Substitution method
Replace each letter or symbol in the plaintext with another letter or symbol, such as Caesar cipher, Vigeniya cipher, etc.
2. Transformation method
Rearrange the letters or symbols in the plaintext according to certain rules, such as fence cipher, Bacon cipher, etc.
3. Coding method
Convert letters or symbols in plain text into a set of numbers or other symbols, such as Morse code, binary code, etc.
4. One-time pad
Use a randomly generated password table to encrypt and decrypt information, and destroy it after each use, such as Wiener cipher, OTP, etc.
5. Public key cryptography
Use a pair of asymmetric keys to encrypt and decrypt information, one of which is public and the other is private, such as RSA, ECC, etc.
6. Hash function
An algorithm that maps data of any length to a fixed-length output. It is one-way and collision-resistant and is often used to verify the integrity of the data. and authenticity, such as SHA-2, MD5, etc.
7. Digital signature
A method that uses public key cryptography and hash functions to authenticate and authorize data, which can prove the source and non-repudiation of the data, such as DSA , ECDSA, etc.
The hash function is an algorithm that maps arbitrary length data to a fixed-length output
1. Protect the security and privacy of data
By using encryption Hash functions, such as SHA-2, MD5, etc., generate unique fingerprints of data to prevent data from being tampered with or leaked.
2. Quickly search for data
By using a hash table, the keywords of the data are mapped to the index of an array to achieve constant-time query operations.
3. Ensure the transmission of authentic information
By using digital signatures to send data and hash values ??together, the recipient can check whether the data is complete and authentic by verifying the hash value .
4. The history of secret codes
People have been using various methods to protect the security of their communications. In the modern era, secret code technology has been widely used, such as in the Internet, e-commerce, and financial transactions. There will also be hackers who use similar technologies to carry out illegal activities. Protecting information security has become an indispensable part of modern society.