共查询到20条相似文献,搜索用时 15 毫秒
1.
Philip C. Marks 《Cryptologia》2013,37(4):296-310
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. This article discusses the history of the device and the various techniques and machines developed by the British and American signals intelligence agencies to deal with it. 相似文献
2.
Philip Marks 《Cryptologia》2013,37(2):101-141
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. The three parts of this article discuss the history of the device and the various techniques and machines developed by the wartime British and American signals intelligence agencies to deal with it. 相似文献
3.
Olaf Ostwald 《Cryptologia》2016,40(1):70-91
The development history of Umkehrwalze Dora, Enigma's pluggable reflector, is presented from the first ideas in the mid-1920s to the last development plans and its actual usage in 1945. An Enigma message in three parts, enciphered with Umkehrwalze Dora and intercepted by the British on 11 March 1945, is shown. The successful recovery of the key of this message is described. Modern computer-based cryptanalysis is used to recover the wiring of the unknown “Uncle Dick,” which the British called this field-rewirable reflector. The attack is based on the known ciphertext and plaintext pair from the first part of the intercept. After recovery of the unknown reflector wiring and the daily key, the plaintext of the second part of the message is revealed. 相似文献
4.
Umkehrwalze A was the original reflector used in the version of the Enigma machine employed by the German armed services. Its wiring was originally deduced by the Polish cryptanalyst Marian Rejewski in December 1932 or January 1933, but details of the wiring have not previously been published. Sufficient information to recover the wiring analytically is provided in a wartime document by Alan Turing, and other sources have been found to confirm the solution. This paper presents the wiring, along with alternative methods of recovering it from Turing's data. 相似文献
5.
A list of important events in the making and breaking of the German Enigma cipher machine of World War II is given in the order of their occurrences. 相似文献
6.
John Lawrence 《Cryptologia》2013,37(4):343-366
We prove a generalization of a theorem of Rejewski. This theorem shows how one can solve an equation of the form XY=α in a symmetric group, where α is a given permutation and X and Y are each of order two with a specified number of disjoint transpositions. The number of solutions is also part of the theorem. Using this theorem we outline what we believe was the Polish solution (or very close to it) to the Enigma assuming that one had no data from daily keys. With some assumptions on independence of events, we show that the Polish Cipher Bureau would probably have broken the Enigma in just over four years. 相似文献
7.
为满足机器人学学习过程中的实验需求,描述了一个基于Qt和Ogre3D机器人学坐标变换虚拟实验室的设计和使用。本虚拟实验室重点描述机器人学的坐标变换,在虚拟实验中通过实验来表明欧拉角,RPY角,转轴/角度,单位四元数和齐次变换矩阵的关系,并且使用虚拟手段阐述了DH矩阵的空间意义,通过数值计算和虚拟显示详细地解释这些概念的意义。本文描述了这些虚拟实验的使用方法。为了判断此虚拟实验室的有效性,设计了一个教学实验,实验的结果表明虚拟实验可使教学过程更加合理,且表明虚拟实验室在未来机器人学教学中将会扮演重要的角色。 相似文献
8.
吴博 《电脑编程技巧与维护》2014,(18):87-89
介绍了Ogre的三维管线的绘制方法。介绍了Ogre的特点,重点介绍了管线的三维建模的过程和原理坐标变换和纹理贴图等技术,并对该方法的应用进行了展望。 相似文献
9.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages. 相似文献
10.
Mike Koss 《Cryptologia》2013,37(3):204-210
The Enigma Machine is a complex electromechanical device used by the Germans in World War II to achieve what they thought was complete communications security. While the original machine weighed over 20?lbs, the central mechanics of the machine can be simulated manually by manipulating strips of paper. A Paper Enigma is presented that can be cut out of a single sheet of paper. The resulting simulator is compatible with the electromechanical original in that messages can be encoded on one, and decoded on the other. Copies of The Paper Enigma can be downloaded from http://mckoss.com/crypto/enigma.htm. 相似文献
11.
David Kahn 《Cryptologia》2013,37(2):121-126
The city of Bydgoszcz, Poland, held a conference on Enigma in honor of Marian Rejewski, one of the 1932 solvers of that cipher machine who was born and brought up in that industrial city. I then visited several sites in Poland connected with cryptology. 相似文献
12.
Karl de Leeuw 《Cryptologia》2013,37(1):73-94
The rotor machine was invented in 1915 by two Dutch navy officers, R. P. C. Spengler and Th. van Hengel, who were working at the Navy Department in the Dutch East Indies. A prototype was built by W. K. Maurits, a mechanical engineer, and tested during the summer of that year on board the flagship of the Dutch Navy in the East Indies on order of the fleet commander Rear Admiral F. Bauduin. Though the Dutch Navy decided not to adopt the device for it prevented the invention from being patented by the original inventors. The Navy could not prevent the rotor machine from being patented, however, by Hugo Alexander Koch—an engineer and businessman working in close collaboration with Arthur Scherbius in Germany—who probably became familiar with the idea through his brother-in-law, Huybrecht Verhagen, a patent attorney working at the firm that had supported the abortive patent application by the original inventors. 相似文献
13.
In this paper, we demonstrate how a new interactive 3 D desktop metaphor based on two-handed 3 D direct manipulation registered with head-tracked stereo viewing can be applied to the task of constructing animated characters. In our configuration, a six degree-of-freedom head-tracker and CrystalEyes shutter glasses are used to produce stereo images that dynamically follow the user head motion. 3 D virtual objects can be made to appear at a fixed location in physical space which the user may view from different angles by moving his head. To construct 3 D animated characters, the user interacts with the simulated environment using both hands simultaneously: the left hand, controlling a Spaceball, is used for 3 D navigation and object movement, while the right hand, holding a 3 D mouse, is used to manipulate through a virtual tool metaphor the objects appearing in front of the screen. In this way, both incremental and absolute interactive input techniques are provided by the system. Hand-eye coordination is made possible by registering virtual space exactly to physical space, allowing a variety of complex 3 D tasks necessary for constructing 3 D animated characters to be performed more easily and more rapidly than is possible using traditional interactive techniques. The system has been tested using both Polhemus Fastrak and Logitech ultrasonic input devices for tracking the head and 3 D mouse. 相似文献
14.
15.
Haibo Yu 《Computer Physics Communications》2005,172(2):69-85
Polarization plays an important role in the energetics of molecular systems, not the least in biomolecular systems. Most computer simulation studies of such systems do not treat electronic polarizability explicitly, but only implicitly using effective charges, dielectric permittivities or continuum electrostatics methods. Yet, the introduction of explicit polarizability into biomolecular models and force fields is unavoidable when more accurate simulation results are to be obtained. Various ways to account for polarizability in (bio)molecular simulation are reviewed with an eye to striking a balance between accuracy on the one hand and simplicity and computational efficiency on the other. The various choices to be made are listed and discussed. The most promising approach, the so-called Charge-On-Spring type of models, is treated in more detail and applied to liquid water as an example. Its implementation in the GROMOS biomolecular simulation software is sketched. 相似文献
16.
17.
18.
19.
20.
实现3D离散点优化三角划分的三维算法 总被引:20,自引:0,他引:20
本文系统研究了3D离散数据的直接三角划分,并解决了与多值曲面相对应离散数据的分片三角划分问题。实现这一算法的关键是将这些与多值曲面相对应的离散数据按有关的特征线分解,慢之转化成较简单的问题分别进行处理。目前,这种分片三角划分算法已在Bezier三角曲面插值中取得了良好的效果。 相似文献