找回密码
 新注册用户
搜索
查看: 6973|回复: 6

[已完成翻译] 开始翻译 M4 项目官方站点

[复制链接]
发表于 2006-3-13 18:22:24 | 显示全部楼层 |阅读模式
关于 M4 计划 的详情,请看这里:http://www.equn.com/forum/viewthread.php?tid=12190

M4 计划官方站点:http://www.bytereef.org/m4_project.html

准备翻译以下页面:
M4 Project       <——感谢 碧城仙 翻译!
enigma-suite       <——感谢 碧城仙 翻译!
Unix Client Install
Win98 Client Install
Win2000 Client Install      <——感谢 碧城仙 翻译!
WinXP Home Client Install      <——感谢 碧城仙 翻译!
WinXP Pro Client Install       <——感谢 第三类接触 翻译!
Windows: How to change enigma-client's password in a running installation    <——感谢 碧城仙 翻译!
M4 Project Mailing List       <——感谢 碧城仙 翻译!
M4 Project Blog
回复

使用道具 举报

 楼主| 发表于 2006-3-13 18:27:50 | 显示全部楼层
翻译 M4 Project 页面:http://www.equn.com/m4/m4_project.html

M4 Message Breaking Project
M4 加密信息破解项目

Status:
状态:

The first message has been broken on February 20th, 2006. The signal in question is the second of the intercepts in Erskine's letter. You can read the raw server logs as well as an interpretation and translation.

第一条加密信息于2006年2月20日被成功破解。该信息是 Erskine 的信件中提到的截获信息中的第二条。您可以阅读原始的服务器日志来了解该信息被破解和破译的详细情况。

The second break has occurred on March 7th, 2006. The signal in question is the third of the intercepts in Erskine's letter. You can read the raw server logs as well as an interpretation and translation.

第二条加密信息于2006年3月7日被成功破解。该信息是 Erskine 的信件中提到的截获信息中的第三条。您可以阅读原始的服务器日志来了解该信息被破解和破译的详细情况。

About:
关于:

The M4 Project is an effort to break 3 original Enigma messages with the help of distributed computing. The signals were intercepted in the North Atlantic in 1942 and are believed to be unbroken. Ralph Erskine has presented the intercepts in a letter to the journal Cryptologia. The signals were presumably enciphered with the four rotor Enigma M4 - hence the name of the project.

M4 项目希望能够借助分布式计算的力量来破解三条加密信息。这三条信息是盟军于 1942 年在北大西洋截获的,这些信息曾被认为是无法破解的信息。Ralph Erskine 将这三条信息密文致函给《Cryptologia》杂志(美国杂志《密码术》)。这些信息是用四转子的 Enigma 机来加密的——项目的名称“M4”即来源于此——四转子之迷。

This project has officially started as of January 9th, 2006. You can help out by donating idle time of your computer to the project. If you want to participate, please follow the client install instructions for your operating system:

本项目正式开始于2006年1月9日。您可以通过捐献您的计算机的闲置处理时间来帮助本项目。如果您想参加本项目,您可以浏览下面给出的安装指南:

Unix Client Install
Win98 Client Install
Win2000 Client Install
WinXP Home Client Install
WinXP Pro Client Install

Software:
软件:

The software used in this project is Open Source, so that you can see what is going on on your computer. The client is a Python script that tries to connect to the server to get a workunit (range of keys). When successful, it launches the message breaking program (written in C) to work on the range. The most promising result of that effort is submitted back to the server, after which the client gets a new workunit.

本项目使用的软件是开放源代码的,因此您能方便的知道我们的软件在您的电脑里到底在做哪些事情。客户端程序使用 Python 脚本来与服务器进行连接,继而获得计算单元(一段加密信息)。当客户端成功下载计算单元后,将自动调用密文破解程序(用 C 语言编写)来对这段加密信息进行猜解。最为可能的猜解结果将被提交返回给服务器,然后客户端将自动获得一个新的计算单元,如此往复。

I have been running the client in the background on two Linux machines for almost two months, and I haven't experienced any stability problems whatsoever. The client runs at the lowest priority, which means that other programs you run on your machine will not be disturbed by it.

我们已经在两台 Linux 机器上将客户端设为后台运行程序连续运行了近两个月,客户端没有使这两台机器出现任何不稳定问题。客户端在最低优先级上运行,这意味着当您需要运行其他程序时,客户端将自动让出资源而丝毫不会影响您日常的工作。

The client-server setup has been tested on some challenge messages presented by Geoff Sullivan and Frode Weierud. Messages 1, 3, 5 and 6 have been broken. Here are the raw server logs of break 5.

客户端-服务端安装程序在针对多条加密信息的破解挑战中测试成功,测试人是 Geoff Sullivan 和 Frode Weierud。加密信息 1、3、5 和 6 已经被破解,这里是加密信息 5 破解返回的结果。

You can see that the server has been restarted due to a kernel upgrade. You can also see that the partial break has a lower score than the highest nonsense results. Here is a cleaned up version of break 5 with all parts of the key corrected.

您可以发现服务器在处理核心程序升级的过程中会出现重启现象。您也可能会发现局部破解结果的得分低于某些毫无意义的破解结果。这里是加密信息 5 的所有可能正确的部分密文。

Method:
方法:

The method in question is a ciphertext-only attack. This means that we don't need bits of guessed/known plaintext for a successful decryption.
解决问题的方法是对纯密码信息进行攻击。这意味着我们不需要猜解或在已知明码文本的某些比特位信息的情况下来对密文进行完美解密。

The most simple ciphertext-only attack would use brute force. You would take every possible key, decrypt the message, and determine the likelihood of the resulting candidate plaintext. The enigma key space is too large for this approach.

大多数简单的纯密文攻击方式都使用暴力破解。您可以尝试几乎所有可能的密钥来猜解密文信息,并且可以确定所有返回给服务器的结果中可能性最大的明文信息。Enigma 的密钥空间在这种情况下显得巨大无比。

The method used here is a mixture of brute force and a hill climbing algorithm:

这里使用的方法是一种结合了强力攻击(brute force,暴力破解)和梯度算法(hill climbing algorithm,爬山法)的混合方法:

The program iterates through all possible machine settings except the plugboard settings. This is a major shortcut since the plugboard settings form a huge portion of the key space. For each of these machine settings the program uses a hill climbing algorithm to find the optimal plugboard settings.

程序重复通过所有可能的机器装置,当然配线板装置除外。这是一条重要的捷径,通过设置线路连接板的步线来生成大量的密钥空间。对这些机器中的每一台都设置程序使用梯度算法(hill climbing algorithm,爬山法)来寻找最佳的线路连接板步线方式。

Hill climbing algorithms try to optimize an object, in this case the plugboard settings, by changing the object step by step. After each change the "goodness" or "fitness" of the new object has to be determined by a scoring function. Changes that lead to a "better" object are retained.

梯度算法逐步对对象(在此情况下为线路连接板设置)进行改变,以此来优化对象。每次做出改变后,新对象的“良好度”与“适切度”须由一个得分函数来决定。对它进行改变就可获得一个“更好的”对象。

Here the changes lie in constantly trying out new wirings of the Enigma plugboard. After each change the scoring function tests a new wiring by deciphering the message and trying to determine how closely the resulting plaintext matches the statistics of the natural language. The scoring function uses Sinkov Statistics.

这里要做的改变在于不断地实验 Enigma 线路连接板的接线方式。每做出一次改变,得分函数就通过译解信息来验证新的接线方式,并试图决定所得到的纯文本与自然语言的匹配程度。得分函数使用 Sinkov 统计数据。

Shortcuts:
捷径:

The messages date from 25th November 1942, which rules out UKW C-Thin and Greek wheel Gamma. See Heinz Ulbricht's PhD Thesis, p9 (in German). The search space can be reduced further by only testing keys where the middle ring is in the 'A' position. Another shortcut is described in the software's documentation.

这些加密信息是1942年11月25日被截获的,其加密手段遵从 UKW C-Thin 和 Greek wheel Gamma 规则。请阅读 Heinz Ulbricht's PhD Thesis 第 9 页(德语)。搜索空间(查找空间)可以更进一步的缩小到仅仅只需要在含有“A”的中间环节进行密钥测试就可以了。另外一条捷径在软件文档中有详细描述。

Runtime Estimates:
运行时间估计:

The key server hands out workunits of the size of 26^4 keys. With a ciphertext length of 180 letters, processing time is around 80min on a Celeron 1.2GHz.
密钥服务器发放给客户端的任务包含有 26^4 个待测密钥,其复杂程度等同于一段含有 180 个字母的加密电文,如果在 Celeron 1.2GHz 处理器上运行,大约需要 80 分钟。

The total search space consists of 7434 workunits. Based on the Celeron, 100 participants running the software 24/7 could walk through the search space in 4 days.

搜索空间(查找空间)总共包括 7434 个任务包。如果在 Celeron 处理器上运行,100 个参与者每天 24 小时不停的运行,大概只需要 4 天就可以完成。

Easy messages break on the first walk through the search space. Tougher ones require more. Based on my experience with messages of this length, there should be a good chance that 1-10 walks will yield a break.

简单的加密信息在一个小的搜索空间里也能很容易得到破解。高强度的加密信息则需要更大的搜索空间。基于我们对加密信息长度的认知经验,好的运气要胜过 1-10 次破解过程。

Mailing List:
邮件列表:

I have set up a mailing list for anything related to the project.
我们设立了一个邮件列表,希望能够方便大家交流一切与本项目有关的问题。

Acknowledgements:
致谢:

I was introduced to hill climbing algorithms by numerous usenet articles by Jim Gillogly. His Cryptologia paper "Ciphertext-Only Cryptanalysis of Enigma" is a great reference for anyone trying to solve classical ciphers using hill climbing or the Index of Coincidence.

我在文中对梯度算法的介绍文字来自 Jim Gillogly 发表在一些新闻组中的文章。他发表的密码术论文“Ciphertext-Only Cryptanalysis of Enigma”为那些试图破解一些经典密码的人们详细介绍了梯度算法(hill climbing,爬山法)和符合系数(Index of Coincidence,并发指数)算法的具体使用方法。

In their Cryptologia paper "Breaking German Army Ciphers" Geoff Sullivan and Frode Weierud show a very efficient way of rewiring the plugboard during the hill climb. My program received a considerable speed-up after incorporating their method. Several shortcuts that reduce the search space can be found in the paper.

在由 Geoff Sullivan 和 Frode Weierud 合作完成的密码术论文“Breaking German Army Ciphers”中给出了一种非常有效的方式在进行梯度算法处理过程中对线路连接板重新步线的方法。我们的程序在合并了他们的方法之后,处理速度的提升相当可观。此外,论文还介绍了几种可用于缩小搜索空间(查找空间)的捷径。

A special thanks goes to Geoff Sullivan for answering questions in sci.crypt, always revealing _exactly_ the right amount of information.

特别要感谢 Geoff Sullivan 在 sci.crypt 新闻组里无私地给我们答疑,Geoff Sullivan 对问题的解答富于启迪、严密而准确,给了我们很大的帮助。

Online References:
在线参考资料:

Enigma overview: http://en.wikipedia.org/wiki/Enigma_machine

Mathematics of Enigma: http://www.nsa.gov/publications/publi00004.cfm

PhD thesis by Heinz Ulbricht (in German): Die Chiffriermaschine Enigma - Trügerische Sicherheit

Paper by Jim Gillogly: Ciphertext-Only Cryptanalysis of Enigma

Paper by Ravi Ganesan and Alan T. Sherman: Statistical Techniques for Language Recognition

Paper by Geoff Sullivan: Cryptanalysis of Hagelin machine pin wheels

Paper by Geoff Sullivan and Frode Weierud: Breaking German Army Ciphers (Now online!)

Contact:
联系我们:

Stefan Krah <website @ bytereef.org>

评分

参与人数 1维基拼图 +50 收起 理由
霊烏路 空 + 50

查看全部评分

回复

使用道具 举报

发表于 2006-3-16 14:18:19 | 显示全部楼层
页面地址:
http://www.equn.com/m4/howto/m4- ... XP-Pro-install.html


WinXP Pro: How to run enigma-client automatically in the background:
WinXP Pro:如何在后台自动运行enigma-client客户端
This page contains step by step install instructions for the Win XP distributed computing client for the M4 Project.
本页面为有关Win XP上安装M4计划客户端的具体步骤。
Download:
下载:
&#8226;        Get enigma-suite-winXPexe-0.73.3.zip from the Download page (please use a listed mirror)
从下载页面获得enigma-suite-winXPexe-0.73.3.zip(请使用所列镜像下载)
&#8226;        Download size: 2.1 MB
大小:2.1MB

Dial-up connections:  
拨号连接:
If you have a dial up internet connection, make sure that dial-on-demand is disabled.
如果你用的是Internet网络拨号连接,请将其设为禁用。
This link might help (go to Solution 3):
下面的链接可能会给你提供些帮助(解决方法3):
http://www.humboldt1.com/services/dialonown/
Install and run enigma-client:客户端的安装和运行
It has been reported that users of any localized version of WinXP Pro have to edit eclient-XP-Pro-install.bat and replace "onstart".
有报告说所有WinXP Pro的本地化版本都必须编辑eclient-XP-Pro-install.bat ,并移除"onstart"。

German: "beimstart"
Polish: "przy_logowaniu"
If you don't feel comfortable editing a .bat file, follow the WinXP Home Client Install  instructions instead.
如果你觉得编辑.bat文件不方便,可以参考WinXP Home Client Install中的介绍。


Unzip enigma-suite-winXPexe-0.73.3.zip
解压enigma-suite-winXPexe-0.73.3.zip文件
Change into the unzipped folder
打开解压文件夹

# Edit .bat to change password
# 编辑.bat文件来更改密码
Right click eclient-XP-Pro-install.bat
右击eclient-XP-Pro-install.bat
Click on "Edit"
选择“编辑”
In the second line, replace "nominal" with a strong random password
In the first line starting with "schtasks", replace "nominal" with the same password
在第二行,将"nominal"更改为一个足够强的密码。
在以"schtasks"开头的第一行,也将"nominal"改为相同的密码。

Save changes and exit
保存并关闭
# End editing
# 编辑结束

Then run (double click) eclient-XP-Pro-install.bat
然后运行eclient-XP-Pro-install.bat(双击)
eclient-XP-Pro-install.bat performs these actions:
eclient-XP-Pro-install.bat主要有以下功能:
&#8226;        creates user enigma-client with the password you supplied.
&#8226;        creates the run folder C:\EnigmaClient.
&#8226;        creates a task in the Task Scheduler to run enigma-client automatically at boot time.
&#8226;        starts enigma-client.
&#8226;        创建属于用户的客户端并采用用户输入的密码
&#8226;        创建运行文件夹C:\EnigmaClient
&#8226;        在计划任务中创建一个任务以便在启动时自动运行enigma-client
&#8226;        运行enigma-client

Check if enigma-client is running:
检查enigma-client是否在运行:

Fire up the Task Manager:  Ctrl-Alt-Del
Select the "Processes" tab
运行任务管理器:Ctrl-Alt-Del
选择“进程”选项

You should see enigma-client.exe among the running processes. If you are connected to the Internet, and enigma-client.exe has managed to get a workunit, you should also see enigma.exe among them.
你可以看到进程中的enigma-client.exe 。如果你已连接上Internet,enigma-client.exe 将会获得一个WU,这样你也能看见enigma.exe 这个进程。
Run the client on additional cores:
在其它内核运行客户端:
Check out the multicore hint.
检查multicore hint
You're done now. If you don't want to take part anymore, follow the uninstall instructions.
好了,这就完成了。如果你不想继续参与的话,请按以下步骤卸载。

Uninstall enigma-client:
卸载enigma-client:
If the client is running, stop it first:
如果客户端在运行,请先停止它:

Fire up the Task Manager:  Ctrl-Alt-Del
Select the "Processes" tab
Select the process "enigma-client.exe"
Click "End Process"
Confirm the action with "Yes"
Select the process "enigma.exe"
Click "End Process"
Confirm the action with "Yes"
打开任务管理器:Ctrl-Alt-Del
选择“进程”选项
选择进程"enigma-client.exe"
选择“结束进程”
按“是”确认结束
选择进程"enigma.exe"
选择“结束进程”
按“是”确认结束

If you still see processes owned by user enigma-client, end them.
如果你还看到有的进程用户名为enigma-client,也将其结束。
Remove all files created for the client:
移除所有创建的文件:

Delete the folder C:\EnigmaClient
删除文件夹C:\EnigmaClient
Remove the task from the task scheduler:
移除计划任务中的任务:

Goto: start -> All Programs -> Accessories -> System Tools
Click on "Scheduled Tasks"
Right click "ecrunXP.bat"
Click on "delete"
Confirm the action with "Yes"
步骤:开始->所有程序->附件->系统工具
选择“计划任务”
右键单击"ecrunXP.bat"
选择“删除”
按“是”确认删除

Complete removal of user enigma-client only works after reboot:
在重启后完全移除enigma-client:
Reboot
Goto start -> Control Panel
Click on "User Accounts"
Click on the account of "enigma-client"
Click "Delete the account"
Click "Delete Files"
Click "Delete Account"
重启
开始->控制面板
选择“用户帐户”
选择帐户“enigma-client”
选择“删除帐户”
选择“删除文件”
选择“删除”

That's it, there are no registry entries that have to be removed.
完成。这里没有要移除的注册表信息。
Contact:
联系我:
Stefan Krah <website @ bytereef.org>

评分

参与人数 2基本分 +90 维基拼图 +60 收起 理由
BiscuiT + 90 + 30
霊烏路 空 + 30

查看全部评分

回复

使用道具 举报

 楼主| 发表于 2006-3-16 22:22:01 | 显示全部楼层
翻译页面地址:http://www.equn.com/m4/howto/m4-project/changepasswd-bgtask.html

Windows: How to change enigma-client's password in a running installation

Windows 用户:如何修改 enigma-client 的默认安装运行密码

Goto Start -> Control Panel
Click on "User Accounts"
Click on "enigma-client"
Click "Change the password"
Enter a new secure random password
Remember or write down the password
Click "Change password"

请按照下面的步骤操作:
打开“开始 -> 控制面板”
点击“用户帐户”
点击“enigma-client”
点击“Change the password”(更改当前密码)
输入一个新的尽可能随机的密码
重复输入密码
记住或者记录该密码
点击“Change password”(确认更改密码)

Goto Start -> All Programs -> Accessories -> System Tools
Click on "Scheduled Tasks"
Right click "ecrunXP"
Click on "Properties"
Click on "Set password"
Enter the new password
Click "OK"
Click "Apply"
Click "OK"

打开“开始 -> 所有程序 -> 附件 -> 系统工具”
点击“Scheduled Tasks”(计划任务)
右击“ecrunXP”
点击“Properties”(属性)
点击“Set password”(设置密码)
输入新的密码
点击“OK”(确定)
点击“Apply”(应用)
点击“OK”(确定)

If you have more than one run directory (multicore), change the password for all ecrunXP[N] tasks.

如果您在同一台计算机内安装了多个客户端(即存在多个客户端安装文件夹),请将所有的 ecrunXP[N] 形式的客户端任务属性逐一修改。

Contact:
Stefan Krah <website @ bytereef.org>

联系我们:
Stefan Krah <website @ bytereef.org>

评分

参与人数 1维基拼图 +12 收起 理由
霊烏路 空 + 12

查看全部评分

回复

使用道具 举报

 楼主| 发表于 2006-3-17 14:21:11 | 显示全部楼层
翻译 enigma-suite 页面:http://www.bytereef.org/enigma-suite.html

enigma-suite
(套装 enigma 加密软件包)

enigma-suite contains these programs:
enigma-suite 包含以下程序:

enigma
A command line Enigma simulator and message breaking program. Message breaking is done using hill climbing or the Index of Coincidence. Supported Enigma models are Heer, M3 and M4.
一个命令行版本的 Enigma 加密模拟和信息破解程序。加密信息破解使用梯度算法(hill climbing,爬山法)和符合系数(Index of Coincidence,并发指数)算法。支持的加密模型包括 Heer、M3 和 M4。

enigma-client
Client for a distributed attack on an enigma message. See M4 Project.
破解 Enigma 加密代码的分布式计算客户端。请查看 M4 计划详情。

mkdict
Creates log-ngram dictionary from sample texts.
通过样本文件生成 log-ngram 攻击字典。

Please use one of the site mirrors for download:
请通过下面的镜像站点下载:

评分

参与人数 1维基拼图 +8 收起 理由
霊烏路 空 + 8

查看全部评分

回复

使用道具 举报

 楼主| 发表于 2006-3-17 14:49:29 | 显示全部楼层
翻译 M4 Project Mailing List 页面:http://www.equn.com/m4/mailinglists.html

Note to Yahoo! users
Yahoo! 用户请注意

Yahoo! defers mail from my domain. When the mail finally arrives it seems to end up in bulk folder of Yahoo! customers. This means a) that mail arrives late and b) you might not see it if you just clear the bulk folder. Yahoo! has not reacted to complaints for more than 2 weeks now.

Yahoo! 会拖延处理从本站域名发出的邮件。当邮件最终到达时,它也可能出现在 Yahoo! 信箱的垃圾箱中。这意味着:a) 邮件到达延迟 或者 b) 您如果清空了垃圾箱就会无法看到这封邮件了。Yahoo! 对我们的投诉置之不理,已经有两个多星期了。

Mail delivery to all other domains works perfectly.

除了 Yahoo! 外,我们的邮件可以完美的发送到其他所有的邮件服务器上。

M4 Project Mailing List: m4-breakers
M4 计划邮件列表:m4-breakers

Anything related to the M4 Project: General discussion, problems with the software or with the installation, announcements.

任何与 M4 计划有关的问题:常规讨论、客户端安装/使用过程中碰到的问题、项目公告等等。

This list is handled by the ezmlm/idx list manager.

该列表使用 ezmlm/idx 管理程序进行处理。

Subscribe:
订阅:

If you post from your account joe@example.com and you want to subscribe joe@example.com, just send an (empty) message to:

    m4-breakers-subscribe@bytereef.org

如果您参加本项目使用的注册邮箱是 joe@example.com,而且您希望把邮箱 joe@example.com 提交到列表中,请发邮件(正文为空)到:m4-breakers-subscribe@bytereef.org

If you post from your account joe@example.com but you want to subscribe your second account joe.smith@example.com, send an (empty) message to:

    m4-breakers-subscribe-joe.smith=example.com@bytereef.org

如果您参加本项目使用的注册邮箱是 joe@example.com,而且您希望把您的另外一个邮箱 joe.smith@example.com 提交到列表中,请发邮件(正文为空)到: m4-breakers-subscribe-joe.smith=example.com@bytereef.org

Note that you have to replace the "@" in your address with "=".

请注意,您需要将您提交的邮箱地址中的“@”修改为“=”。

Unsubscribe:
取消订阅:

If you post from your account joe@example.com and you want to unsubscribe joe@example.com, just send an (empty) message to:

    m4-breakers-unsubscribe@bytereef.org

如果您参加本项目使用的注册邮箱是 joe@example.com,而且您希望把邮箱 joe@example.com 从列表中注销,请发邮件(正文为空)到:m4-breakers-unsubscribe@bytereef.org

If you post from your account joe@example.com but you want to unsubscribe your second account joe.smith@example.com, send an (empty) message to:

    m4-breakers-unsubscribe-joe.smith=example.com@bytereef.org

如果您参加本项目使用的注册邮箱是 joe@example.com,而且您希望把您的另外一个邮箱 joe.smith@example.com 从列表中注销,请发邮件(正文为空)到: m4-breakers-unsubscribe-joe.smith=example.com@bytereef.org

Note that you have to replace the "@" in your address with "=".

请注意,您需要将您提交的邮箱地址中的“@”修改为“=”。

Confirm:
确认:

Ezmlm will send you a confirmation request once you have issued a subscribe/unsubscribe command. You have to reply to that message for the command to take effect.

一旦您发送了“订阅”或者“取消订阅”的邮件给服务器,ezmlm 邮件列表管理程序就将发送一封确认信给您。您需要将回复这封信来使您的请求生效。

Less frequently used commands:
其他不常用的命令:

To get a full view of the user commands, read the ezmlm/idx user's manual.
要获取用户命令的完整说明,请阅读 ezmlm/idx 用户手册。

Contact:
联系我们:

Stefan Krah <website @ bytereef.org>

评分

参与人数 1维基拼图 +20 收起 理由
霊烏路 空 + 20

查看全部评分

回复

使用道具 举报

 楼主| 发表于 2006-3-21 18:28:05 | 显示全部楼层
翻译 M4 Project Blog 页面:http://www.equn.com/m4/m4-project-blog.html

March 7th 2006
2006年3月7日

Today the second break has occurred. The signal in question is the third of the intercepts in Erskine's letter. You can read the raw server logs as well as an interpretation and translation.
今天第二条加密信息被成功破解。该信息是 Erskine 的信件中提到的截获信息中的第三条。您可以阅读原始的服务器日志来了解该信息被破解和破译的详细情况。

We are now dealing with first message again.
我们目前正在重新处理第一条加密信息。

March 3rd 2006
2006年3月3日

We are now going for the third message. The first message has not yielded.
我们正准备对第三条加密信息进行破解。第一条加密信息仍然没有破解出来。

Amount of work spent on the first message:
对第一条加密信息,我们进行了下面的尝试:

1、Army model: all rings, 5 walks through the search space.
军队模型:所有的环,5 重跳板,针对查找空间。
2、M3: all rings, 5 walks through the search space.
M3 方式:所有的环,5 重跳板,针对查找空间。
3、M4: middle ring at A, 10 walks through the search space.
M4 方式:在搜索空间(查找空间)中从含有“A”的中间环节开始进行密钥测试。

This does not mean that this particular message can't be broken with this method. Some messages require many more walks through the search space before a break occurs. Also, we did not try all ring settings for M4 yet.
这并不意味着这些细节信息无法利用这些方法破解。一些信息需要在破解之前进行若干多次搜索空间的寻的过程。而且,我们无法尝试所有的 M4 环。

March 1st 2006
2006年3月1日

Kirk Pearson has created the M4 Project Wiki, FAQ. You can use it for reference or add experiences that might interest others.
Kirk Pearson 创建了一个关于 M4 计划的维基百科和常见问题解答。您可以参考它或者添加一些其他人可能感兴趣的东东。

For support questions that are not in the FAQ, please consider using the M4 Project Mailing List.
FAQ 不可能包罗所有的问题,如果您需要更好的技术支持,请考虑使用 M4 计划邮件列表。

February 28th 2006
2006年2月28日

After the Slashdot article participation levels have risen dramatically. In the last 12h about 2500 unique IPs have connected to the server. In the last two hours 2310 workunits have been submitted.

There are now two external stats pages, both of which use the primary stats source M4 Project Statistics:

·Stuart Whelan has set up http://www.somepointinthefuture.com/m4_stats.html.
·Alexander Haneng came up with http://www.hanengcharts.com/enigma/.

We have walked through the M4 search space 5.5 times now, no break yet.

I'll soon switch to check if the message was encrypted with M3/Army model compatible settings after all. For more information on how the server subdivides the complete M4 search space have a look at the entry on January 9th.



未完..........................................

评分

参与人数 2基本分 +250 维基拼图 +170 收起 理由
BiscuiT + 250 + 150
霊烏路 空 + 20

查看全部评分

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 新注册用户

本版积分规则

论坛官方淘宝店开业啦~

Archiver|手机版|小黑屋|中国分布式计算总站 ( 沪ICP备05042587号 )

GMT+8, 2024-4-18 13:05

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表