{"id":2971,"date":"2015-05-14T09:56:48","date_gmt":"2015-05-14T09:56:48","guid":{"rendered":"http:\/\/www.kaspersky.com.cn\/blog\/?p=2971"},"modified":"2020-02-27T00:17:33","modified_gmt":"2020-02-26T16:17:33","slug":"world-war-ii-information-security-richard-sorge-and-book-cipher","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/world-war-ii-information-security-richard-sorge-and-book-cipher\/2971\/","title":{"rendered":"\u4e8c\u6b21\u4e16\u754c\u5927\u6218\u60c5\u62a5\u5b89\u5168\uff1a\u7406\u67e5\u5fb7\u00b7 \u4f50\u5c14\u683c\u4e0e\u4e66\u672c\u52a0\u5bc6"},"content":{"rendered":"<p>\u6240\u8c13\u7684\u201d<a href=\"http:\/\/en.wikipedia.org\/wiki\/Book_cipher\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u4e66\u672c\u5bc6\u7801<\/a>\u201c\u5386\u6765\u53d7\u5230\u8c0d\u6218\u5c0f\u8bf4\u548c\u4fa6\u63a2\u5c0f\u8bf4\u4f5c\u5bb6\u7684\u9752\u772f\uff0c\u4ed6\u4eec\u901a\u5e38\u4f1a\u5728\u81ea\u5df1\u7684\u4e66\u4e2d\u5c3d\u91cf\u6a21\u4eff\u73b0\u5b9e\u4e2d\u7684\u60c5\u5f62\uff0c\u4f46\u5374\u5e38\u5e38\u5ffd\u89c6\u4e86\u771f\u6b63\u7684\u6838\u5fc3\u6280\u672f\u6982\u5ff5\u3002\u4e4b\u6240\u4ee5\u8fd9\u4e9b\u5c0f\u8bf4\u4e2d\u65f6\u5e38\u4f1a\u51fa\u73b0\u6709\u5173\u4e66\u672c\u5bc6\u7801\u7684\u60c5\u8282\uff0c\u539f\u56e0\u5728\u4e8e\u8fd9\u662f\u8bfb\u8005\u6240\u80fd\u7406\u89e3\u7684\u6700\u7b80\u5355\u7684\u4e00\u79cd\u52a0\u5bc6\u65b9\u6cd5\u3002\u5c31\u5176\u672c\u8eab\u800c\u8a00\uff0c\u4e66\u672c\u52a0\u5bc6\u4f3c\u4e4e\u5e76\u975e\u662f\u4e00\u79cd\u865a\u6784\u51fa\u6765\u7684\u52a0\u5bc6\u7cfb\u7edf\uff0c\u4e14\u4e0e\u5c06\u5bf9\u5e94\u5e8f\u5217\u53f7\u4ee3\u66ff\u5b57\u6bcd\u7684\u52a0\u5bc6\u65b9\u5f88\u76f8\u4f3c\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/05\/06152105\/WWII_3-1.png\" alt=\"\" width=\"1067\" height=\"800\"><\/p>\n<p>\u8fd0\u7528\u4e66\u672c\u52a0\u5bc6\u7684\u524d\u63d0\u6761\u4ef6\u662f\u4e24\u8fb9\u901a\u8baf\u5458\u90fd\u4f7f\u7528\u540c\u4e00\u672c\u4e66\u3002\u5176\u52a0\u5bc6\u673a\u5236\u57fa\u4e8e\u4e00\u4e2a\u7b80\u5355\u7684\u539f\u7406-\u7528\u9875\u6570\/\u884c\u6570\/\u884c\u5185\u5b57\u7b26\u4ee3\u66ff\u4e00\u4e2a\u5b57\u6bcd\u3002\u66f4\u590d\u6742\u7684\u4e66\u672c\u52a0\u5bc6\u65b9\u6cd5\u5219\u9700\u5c06\u6587\u672c\u6bb5\u7528\u4f5c\u2019\u51fd\u6570\u2019\uff0c\u6216\u7528\u4e00\u8fde\u4e32\u5b57\u7b26\u5bf9\u7535\u6587\u8fdb\u884c\u7f16\u7801\u3002<\/p>\n<p>\u5c31\u7b97\u622a\u53d6\u4e86\u7ecf\u8fc7\u4e66\u672c\u52a0\u5bc6\u7684\u6587\u672c\uff0c\u4e5f\u96be\u4ee5\u8fdb\u884c\u7834\u89e3\u3002\u4f46\u66f4\u91cd\u8981\u7684\u662f\uff0c\u8fd9\u4e2a\u65b9\u6cd5\u89e3\u51b3\u4e86\u5c06\u5173\u952e\u4fe1\u606f\u76f4\u63a5\u4f20\u9001\u7ed9\u5bf9\u65b9\u7684\u95ee\u9898\u2013\u4f46\u53cc\u65b9\u53ef\u80fd\u9700\u4e8b\u5148\u534f\u5546\u597d\u4f7f\u7528\u54ea\u4e00\u672c\u4e66\u3002<\/p>\n<p>\u4f7f\u7528\u4e66\u672c\u5bc6\u7801\u6700\u77e5\u540d\u7684\u60c5\u62a5\u4eba\u5458\u83ab\u8fc7\u4e8e<a href=\"http:\/\/zh.wikipedia.org\/wiki\/%E7%90%86%E6%9F%A5%C2%B7%E4%BD%90%E7%88%BE%E6%A0%BC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u7406\u67e5\u5fb7\u2022 \u4f50\u5c14\u683c<\/a>\uff0c\u4ed6\u662f\u4e00\u540d\u5177\u6709\u4f20\u5947\u8272\u5f69\u7684\u524d\u82cf\u8054\u95f4\u8c0d\uff0c\u5f53\u65f6\u4e3b\u8981\u5728\u65e5\u672c\u4ece\u4e8b\u8c0d\u62a5\u5de5\u4f5c\u3002\u4ed6\u56e0\u4e24\u9879\u4f1f\u5927\u529f\u7ee9\u800c\u95fb\u540d\uff1a\u4f20\u9001\u5fb7\u56fd\u4eba\u5165\u4fb5\u82cf\u8054\u7684\u7cbe\u786e\u65e5\u671f\uff0c\u4ee5\u53ca\u544a\u77e5\u6700\u9ad8\u6307\u6325\u90e8\u65e5\u672c\u65e0\u610f\u4ece\u8fdc\u4e1c\u5730\u533a\u8fdb\u653b\u82cf\u8054\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">During WW2 modern cryptography principles were often coupled with \u2018amateur\u2019 but equally reliable ciphering methods <a href=\"https:\/\/t.co\/4282BWOXyx\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/4282BWOXyx<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/595990643094196227?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u5c3d\u7ba1\u7b2c\u4e00\u6761\u7535\u6587\u53ef\u4ee5\u5ffd\u7565\u4e0d\u8ba1\uff08\u6211\u4eec\u5fc5\u987b\u6ce8\u610f\u5230\u5fb7\u56fd\u53cd\u95f4\u8c0d\u90e8\u95e8\u653e\u51fa\u4e86\u5927\u91cf\u7684\u5047\u60c5\u62a5\uff0c\u4e0d\u65ad\u8f6c\u53d1\u5927\u91cf\u5fb7\u56fd\u5165\u4fb5\u7684\u7535\u6587\uff0c\u4e14\u5165\u4fb5\u65e5\u671f\u548c\u7ec6\u8282\u5185\u5bb9\u90fd\u5b8c\u5168\u4e0d\u540c\uff0c\u65e8\u5728\u8ff7\u60d1\u654c\u65b9\uff09\uff0c\u4f46\u7b2c\u4e8c\u6761\u7535\u6587\u5374\u662f\u975e\u5e38\u6709\u7528\u7684\u60c5\u62a5\u3002\u8fd9\u6b63\u662f\u7531\u4e8e\u4f50\u5c14\u683c\u7684\u4e0d\u61c8\u52aa\u529b\uff0c\u624d\u4f7f\u5f97\u82cf\u8054\u6307\u6325\u90e8\u6700\u7ec8\u51b3\u5b9a\u9648\u5175\u897f\u90e8\u8fb9\u5883\uff0c\u800c\u4e1d\u6beb\u4e0d\u8003\u8651\u6218\u4e89\u5728\u592a\u5e73\u6d0b\u7206\u53d1\u7684\u53ef\u80fd\u6027\u3002<\/p>\n<p>\u4f50\u5c14\u683c\u4f7f\u7528\u4e86\u5b8c\u7f8e\u5339\u914d\u5176\u76ee\u7684\u7684\u5fb7\u56fd\u7edf\u8ba1\u5e74\u9274\uff1a\u8868\u683c\u680f\u4e2d\u7684\u4e0d\u540c\u6570\u5b57\u88ab\u5408\u5e76\u8fdb\u4e86\u5404\u6761\u4fe1\u606f\u94fe\u4e2d\uff0c\u4f9d\u6b21\u4f7f\u7528\u5230\u51fd\u6570\u4e2d\u7528\u4e8e\u7834\u8bd1\u7535\u6587\u3002\u4f50\u5c14\u683c\u6240\u53d1\u7535\u6587\u7684\u968f\u673a\u6027\u8db3\u4ee5\u8eb2\u907f\u65e5\u672c\u53cd\u95f4\u8c0d\u90e8\u95e8\u7684\u62e6\u622a\uff0c\u76f4\u5230\u4ed6\u4eec\u5bf9\u4f50\u5c14\u683c\u7684\u65e0\u7ebf\u7535\u901a\u8baf\u5458Max Clausen\u4ea7\u751f\u4e86\u6000\u7591\u3002<\/p>\n<blockquote class=\"twitter-pullquote\"><p>\u7406\u67e5\u5fb7\u2022 \u4f50\u5c14\u683c\u548c\u4e66\u672c#\u52a0\u5bc6\u2013\u4e8c\u6b21\u4e16\u754c\u5927\u6218\u60c5\u62a5#\u5b89\u5168<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FB43o&amp;text=%E7%90%86%E6%9F%A5%E5%BE%B7%E2%80%A2+%E4%BD%90%E5%B0%94%E6%A0%BC%E5%92%8C%E4%B9%A6%E6%9C%AC%23%E5%8A%A0%E5%AF%86%E2%80%93%E4%BA%8C%E6%AC%A1%E4%B8%96%E7%95%8C%E5%A4%A7%E6%88%98%E6%83%85%E6%8A%A5%23%E5%AE%89%E5%85%A8\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u5c3d\u7ba1\u9700\u8981\u4f20\u9001\u5927\u91cf\u7684\u6570\u636e\uff0c\u4f46\u7531\u4e8e\u4f50\u5c14\u683c\u7684\u88ab\u8feb\u6027\u9519\u8bef-\u5728\u65e5\u672c\u96be\u4ee5\u8ba9\u66f4\u591a\u4eba\u5458\u53c2\u4e0e\u5230\u60c5\u62a5\u5de5\u4f5c\u4e2d\uff0c\u56e0\u6b64\u4ed6\u4e0d\u5f97\u4e0d\u53ea\u80fd\u6709\u4e00\u540d\u4eba\u5458\u517c\u4efb\u65e0\u7ebf\u7535\u901a\u8baf\u5458\u548c\u7f16\u7801\u5458\u3002<\/p>\n<p>\u5bc6\u7801\u5b66\u5386\u53f2\u5b66\u5bb6\u6ce8\u610f\u5230\uff0c\u82cf\u8054\u60c5\u62a5\u90e8\u95e8\u5728\u53d1\u660e\u548c\u4f7f\u7528\u6240\u8c13\u7684\u2019\u4eba\u5de5\u52a0\u5bc6\u2019\u975e\u5e38\u6709\u529e\u6cd5\uff0c\u4e14\u4e0d\u9700\u8981\u4efb\u4f55\u673a\u68b0\u8f85\u52a9\u3002<\/p>\n<p>\u5728\u4e8c\u6b21\u5927\u6218\u4ee5\u53ca\u6218\u4e89\u7ed3\u675f\u540e\u7684\u4e00\u6bb5\u65f6\u95f4\u91cc\uff0c\u53c2\u4e0e\u6b27\u6d32\u201dRed Capella\u201d\u884c\u52a8\u7684\u82cf\u8054\u60c5\u62a5\u4eba\u5458\u548c\u5176\u4ed6\u4eba\u5458\u5747\u91c7\u7528\u4e86\u76f8\u4f3c\u7684\u52a0\u5bc6\u65b9\u6cd5\u3002\u5982\u679c\u8bf4<a href=\"https:\/\/www.kaspersky.com.cn\/blog\/world-war-ii-information-security-hacking-the-enigma\/2964\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u590d\u6742\u7684Enigma\u5bc6\u7801\u673a<\/a>\u7684\u5bc6\u7801\u4e4b\u6240\u4ee5\u88ab\u540c\u76df\u56fd\u7834\u8bd1\u662f\u56e0\u4e3a\u4ed6\u4eec\u91c7\u7528\u4e86\u5206\u6790\u6cd5\u548c\u53d1\u660e\u65b0\u7834\u8bd1\u673a\u5668\u7684\u8bdd\uff0c\u800c\u4f50\u5c14\u683c\u7531\u7b14\u548c\u7eb8\u7f16\u7801\u7684\u7535\u6587\u4e4b\u6240\u4ee5\u80fd\u88ab\u89e3\u8bfb\uff0c\u5b8c\u5168\u56e0\u4e3a\u73b0\u573a\u8c03\u67e5\u548c\u4eba\u4e3a\u56e0\u7d20\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Five lessons from the story of the Enigma cryptographic: <a href=\"https:\/\/t.co\/Xl6w43qpOS\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Xl6w43qpOS<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/596383248218980353?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u6ca1\u9519\uff0c\u8fd9\u4e2a\u6545\u4e8b\u8bc1\u660e\u4e86\u5bc6\u7801\u5728\u6218\u4e89\u4e2d\u6240\u8d77\u5230\u7684\u91cd\u8981\u4f5c\u7528\uff0c\u5e76\u663e\u793a\u51fa\u540c\u76df\u56fd\u548c\u65e5\u672c\u6307\u6325\u90e8\u4e3a\u4e86\u5b9e\u73b0\u65e2\u5b9a\u7684\u76ee\u6807\uff0c\u5728\u60c5\u62a5\u6750\u6599\u5de5\u4f5c\u65b9\u9762\u6295\u5165\u4e86\u5927\u91cf\u7684\u8d44\u6e90\u3002<\/p>\n<p>\u4ece\u8fd9\u4e2a\u6545\u4e8b\u4e2d\u6211\u4eec\u6240\u5b66\u5230\u7684\u91cd\u8981\u4e00\u8bfe\u662f\uff1a\u4eba\u4e3a\u56e0\u7d20\u5728\u4fe1\u606f\u5b89\u5168\u9886\u57df\u6c38\u8fdc\u4e0d\u80fd\u88ab\u4f4e\u4f30\u3002\u6211\u4eec\u53ef\u4ee5\u8fd9\u6837\u8bf4\uff0c\u76ee\u524d\u5728APT\u653b\u51fb\u4e2d\u6240\u7528\u5230\u7684\u6700\u5bcc\u6210\u6548\u7684\u7f51\u7edc\u95f4\u8c0d\u65b9\u6cd5\u662f\u201dspear fishing\u201d-<a href=\"https:\/\/www.kaspersky.com.cn\/blog\/no-monkeys-for-cozyduke\/2921\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u5c06\u53d7\u7f51\u7edc\u653b\u51fb\u7ec4\u7ec7\u7684\u7279\u5b9a\u5458\u5de5\u4f5c\u4e3a\u653b\u51fb\u76ee\u6807<\/a>\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6240\u8c13\u7684\u201d\u4e66\u672c\u5bc6\u7801\u201c\u5386\u6765\u53d7\u5230\u8c0d\u6218\u5c0f\u8bf4\u548c\u4fa6\u63a2\u5c0f\u8bf4\u4f5c\u5bb6\u7684\u9752\u772f\uff0c\u4ed6\u4eec\u901a\u5e38\u4f1a\u5728\u81ea\u5df1\u7684\u4e66\u4e2d\u5c3d\u91cf\u6a21\u4eff\u73b0\u5b9e\u4e2d\u7684\u60c5\u5f62\uff0c\u4f46\u5374\u5e38\u5e38\u5ffd\u89c6\u4e86\u771f\u6b63\u7684\u6838\u5fc3\u6280\u672f\u6982\u5ff5\u3002\u4e4b\u6240\u4ee5\u8fd9\u4e9b\u5c0f\u8bf4\u4e2d\u65f6\u5e38\u4f1a\u51fa\u73b0\u6709\u5173\u4e66\u672c\u5bc6\u7801\u7684\u60c5\u8282\uff0c\u539f\u56e0\u5728\u4e8e\u8fd9\u662f\u8bfb\u8005\u6240\u80fd\u7406\u89e3\u7684\u6700\u7b80\u5355\u7684\u4e00\u79cd\u52a0\u5bc6\u65b9\u6cd5\u3002\u5c31\u5176\u672c\u8eab\u800c\u8a00\uff0c\u4e66\u672c\u52a0\u5bc6\u4f3c\u4e4e\u5e76\u975e\u662f\u4e00\u79cd\u865a\u6784\u51fa\u6765\u7684\u52a0\u5bc6\u7cfb\u7edf\uff0c\u4e14\u4e0e\u5c06\u5bf9\u5e94\u5e8f\u5217\u53f7\u4ee3\u66ff\u5b57\u6bcd\u7684\u52a0\u5bc6\u65b9\u5f88\u76f8\u4f3c\u3002<\/p>\n","protected":false},"author":40,"featured_media":2975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1450,1308],"tags":[678,677,102,86,860,675],"class_list":{"0":"post-2971","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"tag-ww2","10":"tag-677","11":"tag-102","12":"tag-86","13":"tag-860","14":"tag-675"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/world-war-ii-information-security-richard-sorge-and-book-cipher\/2971\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/world-war-ii-information-security-richard-sorge-and-book-cipher\/4864\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/ww2\/","name":"ww2"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/2971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=2971"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/2971\/revisions"}],"predecessor-version":[{"id":11033,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/2971\/revisions\/11033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/2975"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=2971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=2971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=2971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}