1
00:00:10,044 --> 00:00:11,657
Do you want to know a secret?
你想知道一个秘密吗？

2
00:00:12,432 --> 00:00:18,863
Every day around the world, all of us use secret codes,
and we don't even realize it.
世界各地的每一个日子，我们都使用暗号，
，我们甚至不知道它。

3
00:00:19,315 --> 00:00:21,281
There has always been a battle between people
一直有一个人之间的战斗

4
00:00:21,281 --> 00:00:24,385
who want to keep secrets and
people who want to get those secrets.
要保守秘密，并
人谁想要得到这些秘密。

5
00:00:24,768 --> 00:00:30,817
It's a battle that has raged on for centuries as codes
have been cracked and history changed forever.
这是一个战斗已持续了几个世纪作为代码
已破获历史永远改变了。

6
00:00:32,906 --> 00:00:38,497
This queen loses her head when her enemies
intercept and decode her conspiracy messages.
这皇后失去了她的头时，她的敌人
拦截和解码她的阴谋的消息。

7
00:00:40,551 --> 00:00:44,452
Mary, Queen of Scots was convinced
her codes wouldn't be broken.
苏格兰女王玛丽被说服
她的代码不会被打破。

8
00:00:44,382 --> 00:00:46,961
The interception of this coded telegram sent by
截取发送编码电报

9
00:00:46,961 --> 00:00:50,683
Arthur Zimmermann forces the Americans
into the First World War.
亚瑟齐默尔曼势力的美国人
到第一次世界大战。

10
00:00:51,298 --> 00:00:57,476
The solution of the Zimmermann Telegram
changed the entire history of the 20th century.
齐默尔曼电报的解决方案
改变了整个20世纪的历史。

11
00:00:57,768 --> 00:01:02,726
The Zodiac Killer continues stalking the streets
of San Francisco and murders again,
生肖杀手继续缠扰街头
旧金山和谋杀再次，

12
00:01:04,178 --> 00:01:06,203
(gun shooting...)
（枪射击... ...）

13
00:01:06,279 --> 00:01:08,999
because his coded messages can't be cracked.
因为他的编码信息可以不被破解。

14
00:01:09,017 --> 00:01:15,551
If you're trying to solve a message from the killer,
you will guess at what possible words might be in them.
如果你正在试图解决从杀手的消息，
你会在什么可能的话可能会在他们的猜测。

15
00:01:15,741 --> 00:01:19,465
Well, "kill" might be one, "victim" might be another.
那么，“杀”可能是一个“受害者”可能是另一个。

16
00:01:22,498 --> 00:01:27,505
This is the story of the continuing battle
between codemakers and codebreakers,
这是继续战斗的故事
codemakers和密码破译之间，

17
00:01:27,505 --> 00:01:30,048
and how their fight shaped our world.
和他们的斗争如何塑造我们的世界。

18
00:01:45,359 --> 00:01:51,359
Codemakers have always gone to extraordinary lengths
to keep their secretly coded messages secret.
一直Codemakers了非凡的长度
保持他们偷偷编码的消息的秘密。

19
00:01:54,245 --> 00:02:00,736
In 1587, a future queen of England loses her head,
thinking this code unbreakable.
1587年，未来的英格兰王后失去了她的头，
思考这个代码牢不可破。

20
00:02:03,978 --> 00:02:12,752
The key players in this Elizabethan tragedy are Mary,
Queen of Scots, her cousin, Queen Elizabeth I of England,
在这个伊丽莎白悲剧的主要角色是玛丽，
苏格兰的女王，她的表姐，英格兰女王伊丽莎白一世，

21
00:02:14,133 --> 00:02:20,343
Catholic English nobleman Anthony Babington,
spymaster Sir Francis Walsingham,
天主教英国贵族安东尼巴宾顿，
王牌间谍爵士弗朗西斯沃尔辛厄姆

22
00:02:20,414 --> 00:02:23,421
and a mysterious genius called Thomas Phelippes.
一个神秘的天才，所谓的托马斯Phelippes。

23
00:02:23,479 --> 00:02:27,244
Mary, Queen of Scots, being Queen of Scotland, but
had to flee the country,
苏格兰的玛丽女王，苏格兰女王，但
不得不逃离该国，

24
00:02:27,244 --> 00:02:32,054
and come to England where she was theoretically
a guest of Queen Elizabeth I of England.
来到英国，她在理论上
做客英格兰女王伊丽莎白一世。

25
00:02:32,054 --> 00:02:36,361
But the English government had real problems with this
because England was a Protestant nation
但英国政府有这个实际问题
由于英国是新教国家

26
00:02:36,361 --> 00:02:38,117
and the Queen was Protestant.
和王后是新教徒。

27
00:02:38,117 --> 00:02:41,921
Mary, Queen of Scots was a Catholic,
and she was next in the line to the throne
苏格兰的玛丽女王是天主教徒，
和她行旁边的宝座

28
00:02:41,921 --> 00:02:43,529
if Elizabeth didn't have any children.
如果伊丽莎白没有任何子女。

29
00:02:43,529 --> 00:02:48,886
So she was naturally the center of any conspiracy
to get rid of Elizabeth, and replace the
于是，她自然中心的任何阴谋
伊丽莎白摆脱，并取代

30
00:02:48,886 --> 00:02:51,400
Protestant queen with a new Catholic queen.
新教皇后，一个新的天主教女王。

31
00:02:57,254 --> 00:03:01,273
Under lock and key, with her every move carefully watched.
根据锁和钥匙，与她的一举一动仔细观看。

32
00:03:01,474 --> 00:03:05,144
Mary must think of even more secret in
devious ways of communicating with
玛丽必须想更秘密
迂回沟通方式

33
00:03:05,144 --> 00:03:09,446
her Catholic allies in London, France and Spain.
她在伦敦，法国和西班牙的天主教盟友。

34
00:03:10,577 --> 00:03:16,505
She decides to use a series of ciphers to
communicate secretly with people, which even if
她决定使用一系列的密码
沟通暗中与人交往，这即使

35
00:03:16,505 --> 00:03:19,746
they are intercepted, then she assumes
nobody will be able to read them
他们被截获，然后她假设
无人能阅读

36
00:03:19,746 --> 00:03:21,821
because they are all in code.
因为他们都是在代码中。

37
00:03:23,025 --> 00:03:29,547
In June 1586, Mary begins corresponding
with Catholic conspirator Anthony Babington.
在1586年6月，玛丽开始相应的
天主教阴谋家安东尼巴宾顿。

38
00:03:31,544 --> 00:03:35,815
The methods that Babington and Mary,
Queen of Scots decided upon to
的方法，巴宾顿和玛丽，
苏格兰女王决定点名

39
00:03:35,815 --> 00:03:39,861
get the letters between each other is
to use the services of the brewer
对方是字母
使用布鲁尔服务

40
00:03:39,861 --> 00:03:43,102
who delivers beer to Mary's household once a week.
提供啤酒玛丽的家庭每周一次。

41
00:03:43,102 --> 00:03:48,001
So she would write a letter, which
her secretaries would then encode,
于是，她写了一封信，这
她的秘书，然后编码，

42
00:03:48,001 --> 00:03:52,638
and once she had coded the letter,
it was rolled up. Very small.
一旦她编码的信，
它卷起。非常小。

43
00:03:53,649 --> 00:03:59,115
And then what they'd done was hollow out
the bung inside the beer barrels so the
然后他们想要做的是镂空
所以啤酒桶内塞

44
00:03:59,115 --> 00:04:01,778
letter could be placed inside the bung.
信可以放在里面塞。

45
00:04:02,376 --> 00:04:07,216
The bung put back in the barrel, and then the
brewer would drive out with the barrels,
“塞放回桶，然后
布鲁尔将驱动器与万桶，

46
00:04:07,216 --> 00:04:10,573
and take the letter out and have it
delivered to Babington in London.
信有
交付给巴丙顿在伦敦。

47
00:04:12,584 --> 00:04:18,422
Mary writes her secret letters using
what's known as a nomenclator.
玛丽写道她使用的秘密信件
什么是已知的作为nomenclator。

48
00:04:18,664 --> 00:04:24,147
This cipher uses individual symbols to
correspond to individual letters.
此cipher使用单独的符号
对应的单个字母。

49
00:04:25,352 --> 00:04:29,394
To hasten the writing of a long letter,
commonly used words and phrases,
要赶紧写了一封长信，
常用词和短语，

50
00:04:29,394 --> 00:04:34,213
such as "how", "why", and "when"
are given their own symbol.
如“如何”，“为什么”和“时”
有自己的符号。

51
00:04:44,437 --> 00:04:48,153
Codes can be as simple or as
complex as you want them to be.
代码可以简单或
你想让他们复杂。

52
00:04:48,606 --> 00:04:51,502
It's just a matter of choosing the right
tool for the job.
这只是一个选择的权利问题
作业的工具。

53
00:04:51,807 --> 00:04:54,386
So how do you know which type of code to use?
所以，你怎么知道使用哪种类型的代码？

54
00:04:56,055 --> 00:05:01,089
One man who knows the answer is David Kahn,
an expert on keeping secrets.
一个人谁知道答案是大卫卡恩
保密专家。

55
00:05:01,341 --> 00:05:05,680
He's the author of the best-selling book,
The Codebreakers, and widely regarded as
他的畅销书的作者，
密码破译，被广泛视为

56
00:05:05,680 --> 00:05:10,063
the world's leading expert on the
history of codes and cryptology.
世界领先的专家
代码和密码学的历史。

57
00:05:11,447 --> 00:05:19,010
For centuries, when you used a cipher,
you had to have a key to encipher the message.
数百年来，当您使用密码，
你必须有一个密钥来加密消息。

58
00:05:19,104 --> 00:05:24,490
The person who wanted to unlock that
message had to have the exact same key
想解开的人
消息有相同的密钥

59
00:05:24,490 --> 00:05:27,627
so that he was able to unlock the message.
让他能解开的消息。

60
00:05:29,033 --> 00:05:33,915
Over two thousand years ago, Roman emperor
Julius Caesar realizes that keeping the key to
两千年前，罗马皇帝
凯撒大帝意识到保持的关键

61
00:05:33,915 --> 00:05:37,554
his ciphers a secrect is of great military importance,
他的密码secrect是伟大的军事重要性，

62
00:05:38,325 --> 00:05:44,254
so he creates one of the first-ever recorded
ciphers to pass secret information on to his generals.
所以他创造了有史以来第一个记录
密码传递给他的将军们的秘密信息。

63
00:05:44,969 --> 00:05:53,352
* actually three places
When Julius Caesar wanted to put a letter into
cipher, he slid each letter four places* to the left
*实际上是三个地方
当凯撒大帝希望把一个字母
密码，他下滑的每个字母左四个地方*

64
00:05:53,352 --> 00:05:58,159
so that "A" became "D", "B" became "E", and so forth.
一个让“”成为“D”，“B”变成“E”的，等等。

65
00:05:59,115 --> 00:06:02,359
But Caesar's shift cipher is easily broken,
但是，凯撒的转变密码是容易破碎，

66
00:06:02,542 --> 00:06:08,215
once you determine that the key is a shift of
four letters, you crack the entire message.
一旦确定，关键是一个转变
四个字母，你需要破解的整个消息。

67
00:06:11,978 --> 00:06:16,374
To solve Mary, Queen of Scots's cipher
requires far more ingenuity.
为了解决玛丽女王的苏格兰的密码
需要多得多的匠心。

68
00:06:16,545 --> 00:06:19,777
Mary was very convinced that
her codes wouldn't be broken. 
玛丽是很不服气
她的代码不会被打破。

69
00:06:19,777 --> 00:06:23,820
She was very careful to regularly change
them to create new alphabets.
她非常小心，定期更改
他们创造新的字母。

70
00:06:23,820 --> 00:06:28,235
She inserted nulls, which are symbols that don't
mean anything, throughout her codes
她插入空值，这是没有的符号
整个她的代码意味着什么，

71
00:06:28,235 --> 00:06:30,172
to try to prevent them being broken.
设法防止他们被打破。

72
00:06:30,721 --> 00:06:35,349
But she's unaware at the time that the
English state, particularly Francis Walsingham,
但她不知道当时
英语国家，特别是弗朗西斯沃尔辛厄姆

73
00:06:35,349 --> 00:06:41,276
Secretary of State, has employed a man called
Thomas Phelippes who's a brilliant cryptographer,
国务卿，聘请了一个叫
托马斯Phelippes是一个辉煌的密码学，

74
00:06:41,489 --> 00:06:46,801
who has worked for the English as new
method of actually cracking these codes.
谁曾作为新英语
实际上破解这些代码的方法。

75
00:06:47,478 --> 00:06:54,313
It's known as frequency analysis, and works by studying
how commonly used letters appear when enciphered.
它被称为频率分析，并通过研究工作
如何常用的字母出现时加密。

76
00:06:54,519 --> 00:07:00,415
So when Babington's name is encrypted using
Mary's cipher, it's easy to spot the repeated letters.
因此，当巴宾顿的名字是加密
玛丽的密码，很容易发现重复的字母。

77
00:07:02,652 --> 00:07:08,947
Spymaster Sir Francis Walsingham and his
mysterious cryptographer, Thomas Phelippes,
王牌间谍爵士弗朗西斯沃尔辛厄姆和他的
神秘的密码专家，托马斯Phelippes

78
00:07:08,947 --> 00:07:13,818
whose portrait doesn't exist, immediately
begin cracking all of Mary's codes.
其肖像不存在，立即
开始开裂玛丽的所有代码。

79
00:07:15,281 --> 00:07:19,987
They're looking for a single piece of treasonous
evidence to prove Mary is plotting with the
他们正在寻找一个单件的叛逆
证据证明玛丽是与策划

80
00:07:19,987 --> 00:07:22,761
Catholics to overthrow Queen Elizabeth.
推翻伊丽莎白女王的天主教徒。

81
00:07:22,928 --> 00:07:27,139
Mary, Queen of Scots, received a letter
from Babington, in which he explains that
苏格兰女王玛丽，收到了一封信
从巴宾顿，他解释说，

82
00:07:27,139 --> 00:07:29,575
he intends to assassinate Queen Elizabeth I.
他打算暗杀英国女王伊丽莎白一世

83
00:07:29,575 --> 00:07:33,641
Her secretaries warned her not to reply to it
because she might incriminate herself
她的秘书警告她不答复
因为她可能会连累自己

84
00:07:33,641 --> 00:07:35,555
if the letter's ever intercepted.
如果信的过截获。

85
00:07:35,555 --> 00:07:39,534
But she does anyway, and she suggests
ways in which she might be broken out
但她无论如何，她建议
她可能被打破的方式

86
00:07:39,534 --> 00:07:43,197
of her prison and what would then happen
to make her Queen of England.
她的监狱和将发生什么
使她的英国女王。

87
00:07:44,029 --> 00:07:50,054
Mary's reply to Babington's assassination letter
is immediately intercepted by Thomas Phelippes
玛丽巴宾顿的暗杀信的答复
立即上前托马斯Phelippes

88
00:07:50,054 --> 00:07:52,444
before it can be smuggled out of the prison.
才可以偷运出监狱。

89
00:07:53,290 --> 00:07:58,810
He decodes it and realizes that in this letter
he has exactly the evidence of treason
他解码，并认识到，在这封信中
他正好有叛国罪的证据

90
00:07:58,810 --> 00:08:02,160
that they need to finally execute Mary,
他们需要到最后执行玛丽，

91
00:08:02,160 --> 00:08:04,424
and he does two extraordinary things.
和他两个不平凡的事。

92
00:08:04,728 --> 00:08:09,276
He writes a postscript on the letter,
he forges some extra lines on the bottom
他写的信后记
他伪造一些多余的线条，在底部

93
00:08:09,276 --> 00:08:14,646
of the letter, pretending that Mary is asking
for the names of the people who are actually
信，假装玛丽要求
谁是真正的人的名字

94
00:08:14,646 --> 00:08:17,110
going to assassinate Queen Elizabeth I.
要暗杀英国女王伊丽莎白一世

95
00:08:17,544 --> 00:08:22,319
He then folds the letter up, and on the outside
he draws a gallows because he knows
然后，他的信折叠起来，在外面
他绘制了绞刑架，因为他知道

96
00:08:22,319 --> 00:08:26,379
this is the letter that will finally
incriminate her and bring her to her death.
这是信将最终
连累她，带她到她的死亡。

97
00:08:27,493 --> 00:08:30,639
Queen Elizabeth can't ignore
her cousin's Catholic plotting.
伊丽莎白女王不能忽视
她的表妹的天主教阴谋。

98
00:08:31,130 --> 00:08:37,988
Mary, Queen of Scots is beheaded at
Fotheringhay Castle in February 1587,
苏格兰的玛丽女王是被斩首
Fotheringhay城堡1587年二月，

99
00:08:38,133 --> 00:08:40,097
in front of 300 witnesses.
在300名证人面前。

100
00:08:46,278 --> 00:08:52,073
The symbols Mary uses in her cipher bear an uncanny
resemblance to those written by a serial killer,
玛丽的符号使用承担离奇的，在她的密码
由一个连环杀手的书面的相似之处，

101
00:08:52,073 --> 00:08:55,774
stalking San Francisco almost 400 years later.
缠扰旧金山近400年后。

102
00:08:59,023 --> 00:09:05,484
But this cipher has an added complexity.
Each symbol has many different meanings.
但是，这个密码已经增加了复杂性。
每个符号都有很多不同的含义。

103
00:09:05,983 --> 00:09:12,077
Can the code be cracked (gun shooting...)
before the killer strikes again?
代码被破解（枪射击... ...）
前再次杀手罢工？

104
00:09:17,024 --> 00:09:24,907
Between 1968 and 1973, a lone killer preys
on young people in the San Francisco Bay Area.
1968年至19??73年，一个孤独的杀手的猎物
在旧金山湾区的年轻人。

105
00:09:25,919 --> 00:09:30,271
Twenty-two-year old Darlene Ferrin
and nineteen-year old Mike Mageau
第二十二条岁的达琳铁蛋白
十九岁的麦克Mageau

106
00:09:30,271 --> 00:09:32,827
sit parked near a golf course.
坐在停泊在附近的高尔夫球场。

107
00:09:33,865 --> 00:09:37,997
It's almost midnight on Friday,
the 4th of July, 1969.
这几乎是上周五的午夜，
7月4日，1969年。

108
00:09:40,243 --> 00:09:43,910
A car approaches, and flashes its lights.
一辆车的方法，并闪烁灯光。

109
00:09:47,318 --> 00:09:51,190
The couple get their ID's ready, thinking it's the police.
夫妇得到他们的ID的准备，思考它的警察。

110
00:09:53,159 --> 00:09:59,299
What...? (gun shooting...)
什么... ...？ （枪射击... ...）

111
00:09:59,321 --> 00:10:06,282
He fires nine shots. The young
man survives, but the girl dies.
他火灾9杆。年轻的
男子幸存，但女孩死亡。

112
00:10:07,245 --> 00:10:09,849
A reign of terror begins.
恐怖统治开始。

113
00:10:14,535 --> 00:10:19,388
Over the next six years, the killer
commits at least five known murders,
在未来六年中，杀手
提交至少五个著名的谋杀，

114
00:10:19,388 --> 00:10:24,673
though he himself claims seven. Some
experts put the figure as high as 37.
尽管他本人声称七个。有些
专家们把这一数字高达37。

115
00:10:25,979 --> 00:10:27,651
He is never caught.
他没有抓到。

116
00:10:29,495 --> 00:10:35,344
Nearly a month after the murder, he sends
three coded messages to three local newspapers,
杀人后将近一个月，他发送
三个地方报纸的三个编码的消息，

117
00:10:35,344 --> 00:10:37,175
demanding they be published.
要求他们公布。

118
00:10:38,559 --> 00:10:42,977
He threatens that if the codes aren't
printed, he'll go on a kill rampage.
他威胁说，如果代码不
印，他将在杀死横冲直撞。

119
00:10:43,129 --> 00:10:47,549
But if the codes are cracked,
they'll reveal his identity.
但是，如果代码被破解，
他们会透露他的身份。

120
00:10:48,828 --> 00:10:53,200
Within days of his sending the coded
messages, he writes again,
他发送的编码内的天
消息，他写道再次，

121
00:10:53,200 --> 00:10:56,263
this time calling himself "Zodiac".
这个时候，自称“十二生肖”。

122
00:10:57,730 --> 00:11:01,472
The Zodiac Killer used what's
called a homophonic cipher.
生肖杀手使用什么
所谓谐音的密码。

123
00:11:01,472 --> 00:11:06,189
This means that each letter of the
original message could be replaced
这意味着，每个信
可以替换原始邮件

124
00:11:06,189 --> 00:11:09,463
by one or two or three different symbols.
由一个或两个或三个不同的符号。

125
00:11:09,463 --> 00:11:13,623
So if the most frequent letter in the
English language "E" is replaced not
因此，如果在最频繁的信
更换英文“E”是不仅

126
00:11:13,623 --> 00:11:19,383
by just "X" but by "X", "Q", and "R",
that will make it more difficult to solve.
只是“X”，但“X”，“Q”和“R”的，
这将使其更难以解决。

127
00:11:19,973 --> 00:11:24,859
Using a homophonic cipher means the
killer is aware of letter frequency analysis,
使用谐音加密手段
杀手是知道的字母频率分析，

128
00:11:24,859 --> 00:11:28,131
and seeks to disguise any repeated
letters in his messages.
并设法掩饰任何反复
消息在他的信件。

129
00:11:29,832 --> 00:11:35,105
He chooses a group of symbols he likes,
allocates them to represent letters of the alphabet,
他选择了他喜欢的一组符号，
它们分配给代表的字母，

130
00:11:35,105 --> 00:11:38,888
and cycles them so that the
same symbol doesn't repeat.
和他们，使循环
不会重复相同的符号。

131
00:11:40,786 --> 00:11:44,767
It was a race against time to
crack the Zodiac's code.
这是一个对时间的竞赛
破解十二生肖的代码。

132
00:11:45,415 --> 00:11:51,910
The FBI, CIA, NSA, and Naval Intelligence
all begin work on the cipher.
联邦调查局，中央情报局，国家安全局，海军情报
开始工作的密码。

133
00:11:53,669 --> 00:11:58,367
But it's a school teacher and his wife
in Salinas, California, armed only with
但它是一个学校的老师和他的妻子
萨利纳斯，加利福尼亚州，武装只与

134
00:11:58,367 --> 00:12:01,302
pen and paper, that cracked the killer's code.
笔和纸，破获杀手的代码。

135
00:12:02,576 --> 00:12:07,692
Donald Harden calculates the killer's ego with
demand that message would include the letter "I".
拉姆斯哈登计算杀手的自我
消息要求将包括字母“I”。

136
00:12:08,691 --> 00:12:13,706
He also knows that one of the most
commonly used double letters is "L".
他也知道，最
常用的双字母为“L”。

137
00:12:14,399 --> 00:12:23,171
If you're trying to solve the message from the killer,
you will guess at what possible words might be in them.
如果你试图解决从杀手的消息，
你会在什么可能的话可能会在他们的猜测。

138
00:12:23,171 --> 00:12:27,864
Well, "kill" might be one, "police" might be
another, "escape" might be another,
那么，“杀”可能是一个“警察”可能
，“逃离”可能是另一个，

139
00:12:27,864 --> 00:12:29,742
"victim" might be another.
“受害者”可能是另一种。

140
00:12:30,817 --> 00:12:35,742
Using a homophonic cipher relies on the writer
to correctly cycle the symbols to avoid
使用谐音加密依赖于作家
正确周期的符号，以避免

141
00:12:35,742 --> 00:12:40,042
repeating the same combination
of symbols for double letters.
重复相同的组合
双字母的符号。

142
00:12:41,861 --> 00:12:48,483
This is where Harden and his wife get lucky -
the killer gets bored or sloppy writing his message.
这是硬化和他的妻子很幸运 - 
杀手变得无聊或马虎，写他的消息。

143
00:12:48,483 --> 00:12:53,552
And as Harden predicts, the first word
they crack contains the double letter "L" -
哈登预测，第一个字
他们破解包含双字母“L” - 

144
00:12:53,962 --> 00:12:55,287
"KILL".
“杀”。

145
00:12:58,581 --> 00:13:02,501
It takes the Hardens six days
to decipher the entire message,
它采用变硬6天
解密整个消息，

146
00:13:02,501 --> 00:13:05,247
beating all the other government agencies.
击败所有其他政府机构。

147
00:13:05,361 --> 00:13:10,339
But California's jubilation is short-lived,
the message just taunts the police,
但加州的喜庆是短命的，
消息刚嘲弄警察，

148
00:13:10,339 --> 00:13:12,675
and doesn't reveal the killer's identity.
并没有透露凶手的身份。

149
00:13:15,836 --> 00:13:22,508
To make matters worse, the killer sends another coded
message that can't be cracked using the Hardens' key.
更糟的是，凶手发送另一个编码
消息不能被破解使用变硬“的关键。

150
00:13:23,589 --> 00:13:27,448
The so-called "340 cipher",
named after the amount of characters
所谓“340密码”，
命名后的字符数量

151
00:13:27,448 --> 00:13:30,096
it contains, has never been solved.
它包含了，一直没有得到解决。

152
00:13:33,907 --> 00:13:39,767
Forty years later, this symbolic processing
class at the University of North Texas, is
40年后，这个象征性的处理
在北德州大学类，

153
00:13:39,767 --> 00:13:42,686
attempting to decode the 340-character cipher.
试图解码340个字符的密码。

154
00:13:45,967 --> 00:13:52,558
Professor Ryan Garlick is determined to crack the
Zodiac code, but the numbers are stacked against him.
瑞安Garlick教授决心破解
生肖代码，但数字是对他的堆放。

155
00:13:52,558 --> 00:13:59,352
The Zodiac 340 cipher contains 63
unique symbols, and so if we say that
包含63生肖340密码
独特的符号，所以如果我们说

156
00:13:59,352 --> 00:14:03,747
there can be 26 letters represented
by each symbol, then that gets 26
可以是26个字母代表
每一个符号，然后得到26

157
00:14:03,747 --> 00:14:11,441
to the 63rd possible keys to decipher,
and that's a 90-digit number, which means
第63可能的密钥破译，
这是一个90位数字，这意味着

158
00:14:11,441 --> 00:14:16,462
that even if we put a powerful computer,
a group of computers to work on the problem,
即使我们把功能强大的计算机，
一组计算机上的问题，

159
00:14:16,462 --> 00:14:20,101
then we still can't run through
all the possible combinations.
然后，我们仍然不能运行通过
所有可能的组合。

160
00:14:20,597 --> 00:14:24,900
He thinks one way to try and solve it
is to create computer shortcuts.
他认为，尝试和解决问题的方法之一
是创建计算机的快捷方式。

161
00:14:25,340 --> 00:14:30,024
The software that we developed at the University
of North Texas uses a genetic algorithm,
我们在大学所开发的软件
北德克萨斯州使用了遗传算法，

162
00:14:30,024 --> 00:14:38,635
which takes sort of candidate keys, and has a mapping
of the symbol in the cipher to an English letter,
候选键，并已映射
在一个英文字母的密码的象征，

163
00:14:38,635 --> 00:14:43,253
and we will generate those keys randomly.
我们将随机生成这些密钥。

164
00:14:44,264 --> 00:14:49,440
The computer program runs in three parts -
first, it converts each symbol of the original
计算机程序运行三个部分 - 
首先，它可以将每个原始符号

165
00:14:49,440 --> 00:14:52,689
Zodiac message into a text that
the computer can read;
十二生肖消息成文本
计算机可以读取;

166
00:14:54,109 --> 00:14:58,553
then the software guesses the English
letter each symbol might correspond to;
然后猜测英语软件
每个字母符号可能对应;

167
00:14:59,707 --> 00:15:04,283
finally, based on that guess, it tries to
make English words out of the letters

168
00:15:04,283 --> 00:15:06,325
that the program produces.

169
00:15:07,175 --> 00:15:12,087
And we come in and score each key,
and say well this key produces a

170
00:15:12,087 --> 00:15:15,377
solution that looks English-like.
看起来类似英语的解决方案。

171
00:15:15,377 --> 00:15:21,231
So, we then take the top portion of
our potential solutions, and say let's
因此，我们采取的顶端部分
我们潜在的解决方案，并说让我们

172
00:15:21,231 --> 00:15:25,368
take half of this good solution, and
combine it with the other half of
很好的解决方案的一半，
它结合的另一半

173
00:15:25,368 --> 00:15:30,701
another good solution and see if the child
of those two potential solutions is any better.
另一个很好的解决方案，看看如果孩子
这两个潜在的解决方案是更好的。

174
00:15:31,970 --> 00:15:37,294
The constant combining of the keys from the
good solutions often create more English words,
不断从结合的关键
良好的解决方案往往创造更多的英语单词，

175
00:15:37,540 --> 00:15:42,932
but as of now, none had provided a complete
solution with meaningful sentences.
但截至目前，没有人提供了一个完整的
解决方案与有意义的句子。

176
00:15:45,556 --> 00:15:50,687
After many thousands of hours of calculation,
the code still hasn't been cracked.
经过成千上万小时计算，
代码还没有被破解。

177
00:15:51,774 --> 00:15:54,804
The identity of the Zodiac Killer remains a mystery.
十二生肖杀手的身份仍是一个谜。

178
00:15:55,101 --> 00:16:01,568
But how did one man back in the 1960's
come up with an unbreakable code in the first place?
但是，如何做一个人早在1960年的
拿出摆在首位的牢不可破的代码？

179
00:16:01,568 --> 00:16:04,585
He may have used some books that
were available at that time.
他有可能使用一些图书
当时提供的。

180
00:16:04,585 --> 00:16:08,648
So, you know if Chapter One of that book
is a homophonic substitution cipher that we
所以，你知道，如果这本书的第一章
是同音替代密码，我们

181
00:16:08,648 --> 00:16:13,126
know that's how the first of all ciphers was coded.
Then, we definitely want to look at
知道这是如何被编码的所有密码。
然后，我们一定要看看

182
00:16:13,126 --> 00:16:17,059
Chapter Two of that book to see
how this one might be decoded.
看到这本书的第二章
这其中可能是如何解码。

183
00:16:17,933 --> 00:16:22,543
On of the few books publicly available
about codes back in the 1960's was
关于公开可用的几本书
早在1960年的守则，

184
00:16:22,543 --> 00:16:25,424
written by none other than David Kahn.
书面莫过于大卫卡恩。

185
00:16:25,548 --> 00:16:29,318
I'd like to think it's a viable theory
that he may have learned about
我想认为这是一个可行的理论
他可能已经了解了

186
00:16:29,318 --> 00:16:30,784
codes from "The Codebreakers".
代码从“密码破译”。

187
00:16:30,784 --> 00:16:35,579
I'm not happy that it was used to help a killer.
我不开心，这是用来帮助一个杀手。

188
00:16:36,481 --> 00:16:40,781
Books are the keys to creating and cracking many codes,
出版的书籍有许多守则，以创建和打击的关键，

189
00:16:40,781 --> 00:16:45,116
a piece of text that both the sender
and the receiver each have access to.
某一段文字的发送者
和接收器，每个人都有访问。

190
00:16:45,733 --> 00:16:51,379
One of the most well-known and mysterious
codes is based on one of the most famous documents.
其中最知名的和神秘
代码是基于最有名的文件之一。

191
00:16:52,740 --> 00:16:58,062
If you can crack the Beale ciphers, they'll
lead you to the location of buried treasure -
如果你能破解比尔密码，他们会
带领你的宝藏的位置 - 

192
00:16:58,062 --> 00:17:03,710
gold, silver, and jewels with
an estimated 36 million dollars.
金，银，和与珠宝
估计有36亿美元。

193
00:17:04,196 --> 00:17:10,073
The location of the treasure is encrypted somewhere
in the words of "The Declaration of Independence".
宝藏的位置是加密的地方
在“独立宣言”的话。

194
00:17:16,025 --> 00:17:21,492
These are the Beale ciphers, potentially the
most valuably coded messages in the world.
这些都是比尔密码，潜在的
编码在世界上最有价值的消息。

195
00:17:22,563 --> 00:17:31,450
The Beale ciphers are a series of encrypted messages,
which seem to indicate the location of a buried treasure.
比尔密码了一系列加密消息，
这似乎表明一个宝藏的位置。

196
00:17:34,654 --> 00:17:38,128
The origin of the Beale ciphers are shrouded in mystery.
比尔密码的起源扑朔迷离。

197
00:17:38,704 --> 00:17:42,257
The story begins in the Blue Ridge Mountains of Virginia.
故事开始在弗吉尼亚州的蓝岭山脉。

198
00:17:42,257 --> 00:17:49,565
Between 1819 and 1821, Mr. Thomas Jefferson
Beale and a group of friends allegedly buried
在1819年和1821年，托马斯杰斐逊先生
比尔和一组据称埋的朋友

199
00:17:49,565 --> 00:17:54,552
two loads of treasure, somewhere within a
four-mile radius of the town Buford's Tavern.
珍惜，某处在两个负载
四英里的半径镇布福德的小酒馆。

200
00:17:57,196 --> 00:18:03,601
The quantity of treasure is enormous - 29
hundred pounds of gold, 51 hundred pounds of silver,
宝藏的数量是巨大的 - 29
100磅重的金，51银一百英镑，

201
00:18:04,176 --> 00:18:07,037
and 13,000 dollars worth of jewels.
和13000美元的珠宝价值。

202
00:18:10,768 --> 00:18:15,693
Beale carefully notes the secret location, and
sets about making sure that no one can find it.
比尔仔细注意到秘密地点，并
确保没有人可以找到它的套左右。

203
00:18:17,086 --> 00:18:22,292
He enciphers his secret in three separate parts,
and gives it to the owner of a local hotel.
他enciphers他在三个独立的部分的秘密，
并赋予它以当地一家酒店的所有者。

204
00:18:23,149 --> 00:18:26,572
Mr. Beale then completely disappears forever.
比尔先生，然后完全消失，永远。

205
00:18:29,377 --> 00:18:34,483
The first coded message tells the location
of the buried gold, silver, and jewels;
第一个编码的消息告诉了位置
埋的金，银和珠宝;

206
00:18:35,844 --> 00:18:38,389
the second, the quantity of the treasure;
第二，宝藏的数量;

207
00:18:39,300 --> 00:18:43,716
and the third, a list of names to
whom the treasure rightfully belongs.
第三，到名称列表
人珍惜理所当然属于的。

208
00:18:44,991 --> 00:18:49,537
By the 1860's, the ciphers are in the
possession of a mysterious, unnamed author
到1860年，在密码
藏有一个神秘的，无名的作者

209
00:18:49,537 --> 00:18:51,656
who sets about cracking them.
他集打击他们。

210
00:18:53,030 --> 00:18:58,239
He guesses the code's based on a
printed text, but which text?
他猜测代码的基础上，
打印的文本，但文本？

211
00:19:00,123 --> 00:19:04,357
He claims he tries every book he can lay his
hands on before "The Declaration of Independece"
他声称，他尝试每本书他可以奠定他
双手之前，“独立宣言”

212
00:19:04,748 --> 00:19:06,786
gives him the clue he is looking for.
给他，他正在寻找的线索。

213
00:19:08,292 --> 00:19:12,909
He starts by numbering the words in the
Declaration so that "when" becomes 1,
他开始编号的话，
“宣言”，使“当”变为1，

214
00:19:13,257 --> 00:19:21,248
"in" becomes 2, "the" - 3, "course" - 4,
"of" - 5, "human" - 6, and so on.
“中的”变为2，“” - 3，“课程” - 4，
“” - 5，“人” - 6，等等。

215
00:19:22,108 --> 00:19:26,059
Then he painstakingly finds the words in
the Declaration that match the numbers
然后，他千辛万苦找到的话，
“宣言”，相匹配的数字

216
00:19:26,059 --> 00:19:29,135
of the Beale ciphers, and finally cracks the code.
比尔密码，终于出现裂缝的代码。

217
00:19:29,688 --> 00:19:34,433
Unfortunately, this method only
deciphers one of the three messages -
不幸的是，这种方法只
解密的三条消息之一 - 

218
00:19:34,433 --> 00:19:36,872
the cipher telling the quantity of treasure.
密码告诉宝藏的数量。

219
00:19:39,112 --> 00:19:44,637
The other two, naming the shareholders and
the treasure's location, remain unbroken
另外两个，命名的股东和
宝藏的位置，保持完整

220
00:19:45,049 --> 00:19:48,062
almost 150 years later.
近150年后。

221
00:19:50,551 --> 00:19:53,435
My own conclusion is that it's some kind of hoax.
我自己的结论是，它的一些骗局。

222
00:19:53,435 --> 00:20:01,088
Somebody has made up a phony, secret message
to drive a million amateur codebreakers crazy
有人作出了一个假冒的，秘密的信息
驱动一百万的业余密码破译疯狂

223
00:20:01,088 --> 00:20:06,038
in the hope of finding this treasure
somewhere down near Roanoke, Virginia.
希望能找到这个宝藏
某处，弗吉尼亚州罗阿诺克附近。

224
00:20:06,803 --> 00:20:10,842
Codes based on a printed text
eventually fall out of fashion.
基于印刷文本的代码
最终掉下来的时尚。

225
00:20:11,083 --> 00:20:16,181
But home-made, hand-written code books,
the stuff of spy movies are essential
但自制的，手工编写的代码的书籍，
间谍电影的东西是必不可少的

226
00:20:16,181 --> 00:20:18,815
in the time before computers, especially
在电脑，尤其是前

227
00:20:18,815 --> 00:20:24,633
in times of war, when capturing an enemy's
codes meant the difference between life or death.
在战争时期，捕获敌人的时
代码意味着生命或死亡之间的差异。

228
00:20:27,478 --> 00:20:32,748
For the first three years of World War I,
British and German armies slaughter each other
对于第3年第一次世界大战中，
英国和德国军队屠杀对方

229
00:20:32,748 --> 00:20:34,666
in the mud of northern France.
在法国北部的泥。

230
00:20:36,237 --> 00:20:40,457
By 1917, Britain is desperate for
help from the United States.
到1917年，英国是求贤若渴
来自美国的帮助。

231
00:20:40,962 --> 00:20:45,555
Germany is equally desperate that America doesn't join the war.
德国同样是绝望的，美国不加入战争。

232
00:20:49,600 --> 00:20:54,523
The interception and decoding of this single
encrypted message is a major factor in forcing
这种单一的截取和解码
加密的消息是在强迫的一个主要因素

233
00:20:54,523 --> 00:20:58,242
President Woodrow Wilson to declare war on Germany.
伍德罗威尔逊总统宣布对德国宣战。

234
00:21:00,869 --> 00:21:04,802
In the days before computers and the
World Wide Web, communicating with
在电脑前的天，
万维网，沟通

235
00:21:04,802 --> 00:21:08,887
the world is a much slower and
potentially dangerous business.
世界是一个慢得多，
有潜在危险的业务。

236
00:21:10,261 --> 00:21:16,533
At the beginning of the 20th century,
the world is connected together by telegraph.
在20世纪初，
通过电报，世界连接在一起。

237
00:21:16,951 --> 00:21:21,226
Cables have been physcially laid between
countries, right across the Atlantic,
电缆已physcially奠定之间
右横跨大西洋的国家，

238
00:21:21,226 --> 00:21:24,404
across the Mediterranean to North Africa.
整个北非的地中海。

239
00:21:24,682 --> 00:21:28,822
And those are the lines of communication.
There is a web across the world of these
而这些通信线路。
有一个跨越这些世界网络

240
00:21:28,822 --> 00:21:34,250
physical cables across land and under the sea,
which enable countries to communicate with each other.
在陆地和海面下的物理电缆，
这使各国能够互相沟通。

241
00:21:35,365 --> 00:21:40,080
Well, just like its modern counterpart, this
telegraph network is open to hackers.
好了，就像其现代，这
电报网络黑客的攻击是开放的。

242
00:21:40,943 --> 00:21:44,970
In this case, the British government has been
listening at all German messages crossing the
在这种情况下，英国政府已
听过路的所有德国消息

243
00:21:44,970 --> 00:21:47,185
Atlantic since 1914.
大西洋自1914年以来。

244
00:21:50,640 --> 00:21:54,717
And this is where the messages end up -
Whitehall in London.
这是消息 - 
伦敦白厅中。

245
00:21:55,702 --> 00:21:59,833
In 1917, this is the most secret place in Britain.
1917年，这是英国最秘密的地方。

246
00:22:00,039 --> 00:22:05,073
A nerve center of military espionage and
codebreaking, known as Room 40.
一个军事间谍活动的神经中枢，
codebreaking，被称为室40。

247
00:22:10,163 --> 00:22:14,596
Even though the British captured several German
code books earlier in the war, the Germans are
尽管英国捕获几个德国
前面的代码书在战争中，德国人

248
00:22:14,596 --> 00:22:16,266
constantly changing them.
不断变化的。

249
00:22:19,771 --> 00:22:24,466
They are were a series of very large code
books containing 10,000 words and phrases
他们是一个非常大的代码的
书包含10,000个单词和短语

250
00:22:24,466 --> 00:22:28,088
numbered from 0 to 9,999.
编号从0到9999。

251
00:22:29,248 --> 00:22:35,833
Then they encrypt them again by adding extra digits,
the so-called double-decker super encipherment.
然后，他们再通过添加额外的数字加密，
所谓的双层超级保密。

252
00:22:41,497 --> 00:22:45,335
Many of the German messages are routine
communications between trenches and the
许多德国的消息更是家常便饭
战壕和通信

253
00:22:45,335 --> 00:22:48,149
front line concerning troop movements and supplies.
前线调兵和补给。

254
00:22:48,785 --> 00:22:53,778
But occasionally, there are diplomatic messages
between German embassies around Europe.
但偶尔，也有外交消息
欧洲各地的德国大使馆。

255
00:22:54,703 --> 00:23:00,748
These are encrypted using the diplomatic code,
0075, which the British have only recently
这些加密使用的外交代码，
0075，英国最近才

256
00:23:00,748 --> 00:23:03,546
discovered, and not yet fully cracked.
发现的，尚未完全破解。

257
00:23:05,565 --> 00:23:10,206
So when a coded telegram sent from Berlin
to the German Minister in Mexico is intercepted
因此，当来自柏林的一个编码电报发送
德国部长在墨西哥被截获

258
00:23:10,206 --> 00:23:14,344
in January 1917, it's a race to decode it.
在1917年1月，它是一个种族解码。

259
00:23:16,183 --> 00:23:21,261
It's often essential when you're solving
a code to try to guess the words.
当你解决，这往往至关重要
代码试图猜测的话。

260
00:23:21,261 --> 00:23:24,769
You're faced with a blank bunch
of numbers, what do they mean?
你面对一个空白的一堆
数字，什么意思？

261
00:23:24,769 --> 00:23:27,074
However, they don't exist in the vacuum.
然而，他们不存在真空。

262
00:23:27,197 --> 00:23:32,174
People have sent diplomatic telegrams
for a long time, and diplomatic telegrams
人们已将外交电报
很长一段时间，和外交电报

263
00:23:32,174 --> 00:23:35,627
often begin with "The honoured"
to "inform Your Excellency".
往往开始与“贵人”
“通知阁下”。

264
00:23:35,627 --> 00:23:42,848
So if you have seen this in plaintext, you can guess
that may be the beginning formula in code text.
所以，如果你有看到明文，可以推测
这可能是在代码文本的开始公式。

265
00:23:43,218 --> 00:23:48,441
The first thing that codebreakers of Room 40 do
is start looking for numbers that make up the words stop,
密码破译室40做的第一件事
是开始寻找弥补的话停止的数字，

266
00:23:48,441 --> 00:23:51,316
the telegraphic method of ending sentences.
结束句子电汇的方法。

267
00:23:55,683 --> 00:23:59,338
They then decrypt the very high number
at the end of the message, the signature of
然后，他们非常高的数字解密
在邮件的末尾，签名

268
00:23:59,338 --> 00:24:02,476
Arthur Zimmermann, the German Foreign Secretary.
亚瑟齐默尔曼，德国的外交大臣。

269
00:24:06,093 --> 00:24:09,426
They then spot strange combinations of
numbers that decode into letters,
然后，他们发现的奇怪组合
数字解码为字母，

270
00:24:09,426 --> 00:24:11,680
which don't make sense by themselves.
不以自己的感觉。

271
00:24:11,680 --> 00:24:12,509
"AR",
“AR”

272
00:24:12,509 --> 00:24:13,316
"IZ",
“工业区”，

273
00:24:13,316 --> 00:24:14,451
"ON",
“ON”

274
00:24:14,451 --> 00:24:15,465
"A",
“A”

275
00:24:15,465 --> 00:24:16,276
or,
或

276
00:24:16,276 --> 00:24:17,603
"ARIZONA",
“亚利桑那”

277
00:24:17,610 --> 00:24:21,342
a word not listed in the 10,000-word German code book,
德国在10000字码书没有列出一个字，

278
00:24:21,342 --> 00:24:23,511
so it's been made up phonetically.
所以它的发音作了。

279
00:24:24,503 --> 00:24:28,388
When they decrypt a number of high code
groups and message, they conclude that these
当他们解密高代码
组和消息，他们得出结论，这些

280
00:24:28,388 --> 00:24:31,952
make up the words "Texas", and "New Mexico".
弥补“德州”，和“新墨西哥”。

281
00:24:33,422 --> 00:24:37,242
As they crack the code, the significance
of the message becomes clear -
由于他们破解的代码，意义
消息变得清晰 - 

282
00:24:38,127 --> 00:24:41,832
Germany is proposing to support
Mexico if they invade the US.
德国建议，以支持
墨西哥，如果他们入侵美国。

283
00:24:42,204 --> 00:24:47,617
As a reward, Mexico will regain control of
Texas, New Mexico, and Arizona.
作为回报，墨西哥将重新获得控制
得克萨斯州，新墨西哥州和亚利桑那州。

284
00:24:50,824 --> 00:24:55,914
This is not only a deliberate act of aggression
on Germany's part, it's also a diversionary tactic.
这不仅是蓄意的侵略行为
对德国的一部分，它也是一个声东击西的战术。

285
00:24:56,052 --> 00:25:00,799
If the US is busy fighting his neighbour,
it won't get involved in the war in Europe.
如果美国忙于他的邻居，
它不会参与在欧洲的战争。

286
00:25:06,672 --> 00:25:12,421
When faced with the evidence of the Zimmermann
Telegram, President Woodrow Wilson has no option.
当面临着齐默尔曼的证据
电报，伍德罗威尔逊总统别无选择。

287
00:25:13,592 --> 00:25:18,516
On April 6th, 1917, the US declares war on Germany.
1917年4月6日，美国宣布对德国宣战。

288
00:25:23,144 --> 00:25:28,565
Nineteen months later, World War I is won,
due in no small part of the interception
19个月后，我是赢得了第二次世界大战，
由于没有截取的一小部分

289
00:25:28,565 --> 00:25:30,995
and decoding of the Zimmermann Telegram.
齐默尔曼电报解码。

290
00:25:38,315 --> 00:25:44,217
The solution of the Zimmermann Telegram, probably
the most important cryptogram solution of all time,
齐默尔曼的电报，可能的解决方案
所有时间的最重要的cryptogram解决方案，

291
00:25:44,217 --> 00:25:49,635
brought the United States into the war,
brought the United States onto the world stage,
美国带入战争，
带来了美国在世界舞台上，

292
00:25:49,635 --> 00:25:54,182
and in effect, changed the entire history of the 20th century.
和效果，改变了整个20世纪的历史。

293
00:25:54,725 --> 00:25:59,532
The Germans don't discover the Allies had cracked
their codes until near the end of the war,
德国没有发现盟军已破获
他们的代码，直到战争结束后，附近的，

294
00:25:59,532 --> 00:26:03,848
and that their plans for Mexico were
doomed to failure from the start.
和他们的计划是为墨西哥
从一开始就注定要失败的。

295
00:26:04,284 --> 00:26:07,763
The Zimmermann Telegram was a ludicrous idea, really.
齐默尔曼电报是一个可笑的想法，真的。

296
00:26:07,763 --> 00:26:12,757
Mexico was never going to declare war on the
United States, all the armament factories in the
墨西哥是永远不会申报的战争
美国在军备工厂

297
00:26:12,757 --> 00:26:17,105
Americas were in the United States,
and Germany could never supply Mexico
美洲在美国，
德国不可能供应墨西哥

298
00:26:17,105 --> 00:26:20,278
because the Atlantic was controlled
by the British Royal Navy.
因为大西洋控制
由英国皇家海军。

299
00:26:20,278 --> 00:26:23,725
So they'll never get any arms or men
over there in the first place.
所以，他们永远不会得到任何武器或男性
那边摆在首位。

300
00:26:24,090 --> 00:26:29,288
And Mexico finally didn't want back the three
states it had lost, they were now at large
和墨西哥终于不想回三个
国家失去了，他们现在在大

301
00:26:29,288 --> 00:26:32,023
English-speaking, Mexico was Spanish-speaking.
讲英语，墨西哥是讲西班牙语。

302
00:26:32,023 --> 00:26:35,341
They didn't believe they'd be able to
hold onto them even if they got them.
他们不相信他们会能够
举行转嫁到他们，即使他们得到了他们。

303
00:26:35,341 --> 00:26:36,595
So they refused.
于是，他们拒绝了。

304
00:26:37,316 --> 00:26:41,248
But the Zimmermann Telegram might not
have been cracked if the Germans have been using
但是，齐默曼电报可能不会
如果德国人一直在使用已被破解

305
00:26:41,248 --> 00:26:45,944
a 500-year old device, known as the Alberti code disk.
500年的旧设备，被称为阿尔贝蒂码盘。

306
00:26:46,459 --> 00:26:53,226
It's secret wheels within wheels that can scramble
alphabets so completely, they are virtually unreadable.
它的内轮子，可以争夺的秘密车轮
字母如此彻底，他们几乎不可读。

307
00:26:57,938 --> 00:27:04,202
Around 1470, it's the invention made by
this man, Leon Battista Alberti, that changes
1470年前后，它作出的发明
这名男子，莱昂巴蒂斯塔阿尔贝蒂，改变

308
00:27:04,202 --> 00:27:05,636
cryptology forever.
密码学的永远。

309
00:27:07,175 --> 00:27:10,880
Alberti is one of the great
forgotten men of the Renaissance.
阿尔贝蒂是一个伟大的
文艺复兴时期的被遗忘的男人。

310
00:27:11,466 --> 00:27:17,236
He was a great scientist, particularly he
was interested in codes and ciphers,
他是一个伟大的科学家，尤其是他
兴趣代码和密码，

311
00:27:17,236 --> 00:27:19,609
and the center of this world is the Papacy.
和这个世界的中心是罗马教皇。

312
00:27:20,053 --> 00:27:26,171
Alberti had a friend who was one of the Pope
secretaries, and he set him the challenge of
阿尔贝蒂有一个朋友谁是教皇
书记，他为他的挑战

313
00:27:26,171 --> 00:27:29,831
creating a method of coding documents.
创建一个文件的编码方法。

314
00:27:29,831 --> 00:27:34,716
And what Alberti came up with is perhaps
the first ciphering device in history,
阿尔贝蒂来到了也许是
在历史上的第一个加密设备，

315
00:27:34,716 --> 00:27:36,585
which is the cipher wheel.
这是加密轮。

316
00:27:38,508 --> 00:27:45,137
It was a cipher disk, which produced the
first form of polyalphabetic substitution.
这是一个加密的磁盘，这就产生了
第一种形式的字母替代。

317
00:27:45,137 --> 00:27:52,211
Called polyalphabetic, because as this turned,
it produced different cipher alphabets.
多字母，因为作为结果，
它产生不同的密码字母。

318
00:27:52,838 --> 00:27:57,652
Each of the two rotating disks contained
24 letters of the Latin alphabet.
每个包含两个旋转磁盘
24字母的拉丁字母。

319
00:27:57,652 --> 00:28:00,592
The inner disk's letters are in random order.
内盘的字母，以随机顺序。

320
00:28:01,473 --> 00:28:06,449
Alberti's encryption process relies on both
sender and receiver possessing identical disks,
阿尔贝蒂的加密过程，同时依赖
发送器和接收器具有相同的磁盘，

321
00:28:06,449 --> 00:28:11,011
and having previously agreed on an index,
or key letter on the inner disk.
先前商定的索引，
内盘或关键信。

322
00:28:12,691 --> 00:28:16,506
The sender begins the message by randomly
placing the index letter against any other
发送者开始通过随机消息
针对任何其他指数的信

323
00:28:16,506 --> 00:28:18,142
letter on the outer wheel.
信上外轮。

324
00:28:18,656 --> 00:28:22,241
This becomes the first capital letter
of the enciphered message.
这将成为第一个大写字母
加密的消息。

325
00:28:22,590 --> 00:28:27,132
He continues sending his message by
reading from the inner disk to the outer.
他继续他的消息发送
从内盘阅读外。

326
00:28:27,740 --> 00:28:33,066
After writing three or four words, the sender
moves the inner disk a random number of places.
写作三或四个字后，发件人
移动内部磁盘的随机数的地方。

327
00:28:33,814 --> 00:28:37,515
He signifies this move to the
receiver by a capital letter.
他表示这一举动的
接收器由一个大写字母。

328
00:28:38,321 --> 00:28:42,227
This ensures each segment of the
message is separately encrypted.
这将确保每个段
消息是单独加密。

329
00:28:42,852 --> 00:28:47,534
Though the code is virtually unbreakable,
the disk itself is slow to operate,
虽然几乎是牢不可破的代码，
磁盘本身是缓慢的操作，

330
00:28:47,867 --> 00:28:50,850
Alberti's device doesn't become widely used.
阿尔贝蒂的设备不被广泛使用。

331
00:28:54,020 --> 00:28:59,150
It's a future President, Thomas Jefferson,
who in the 1790's develops the disk
这是一个未来的总统，托马斯杰斐逊，
在1790年开发的磁盘

332
00:28:59,150 --> 00:29:00,930
into a prototype machine.
成样机。

333
00:29:02,326 --> 00:29:08,025
Thomas Jefferson was the man who invented
one of the most brilliant and clever cipher systems.
托马斯杰斐逊是该名男子是谁发明的
最辉煌，最聪明的加密系统之一。

334
00:29:08,036 --> 00:29:14,321
A sort of... kind of locks, which were like the
attaché case locks, in which you line up three
排序... ...样的锁，这就好比
手提箱锁，其中最多的三线

335
00:29:14,321 --> 00:29:18,247
numbers together, and are able
to open the attaché case.
数字加在一起，并能
打开手提箱。

336
00:29:18,247 --> 00:29:23,989
And he realized that if you replace the numbers
with letters, you would have a kind of cipher system,
他意识到，如果更换号码
用字母，你会有一种加密系统，

337
00:29:23,989 --> 00:29:26,551
and the way it worked was as follows.
和它的工作方式如下。

338
00:29:26,551 --> 00:29:35,557
You created 24 disks, on the circumference of
each, you had a mixed alphabet, jumbled alphabet,
你创建了24个磁盘，圆周
，你有一个混合英文字母，乱蓬蓬的字母，

339
00:29:35,762 --> 00:29:38,146
each of the disks was numbered.
每个磁盘的编号。

340
00:29:39,095 --> 00:29:48,927
You and your correspondent assembled the disks in
the same order, both of you, on this spindle.
您和您的记者组装磁盘
顺序相同的，你们俩在这个主轴。

341
00:29:49,379 --> 00:29:55,690
Then, to encipher a message, you put all the
letters of your message on the single line -
然后，来加密消息，你把所有的
您的留言信件上的单行 - 

342
00:29:56,294 --> 00:29:57,752
"attack
“攻击

343
00:29:57,968 --> 00:29:58,874
at dawn
在黎明

344
00:29:59,255 --> 00:30:00,333
tomorrow".
明天“。

345
00:30:00,333 --> 00:30:07,293
Locked the disks together so they couldn't move,
turned the entire contraption and picked out
锁定的磁盘在一起，使他们不能动弹，
把整个的玩意儿，并挑选出

346
00:30:07,293 --> 00:30:10,631
any other line as your ciphertext.
您的密文的任何其他线路。

347
00:30:10,631 --> 00:30:12,882
You sent that to the other person.
您发送给其他人。

348
00:30:12,882 --> 00:30:18,854
The other person with the disks assembled
in the same order as you, line up all the letters
其他人与组装磁盘
和您一样的秩序，排队的所有字母

349
00:30:18,854 --> 00:30:24,990
of your cipher message on the single line,
and then turn the entire contraption around
单行的密码消息，
然后打开整个玩意儿左右

350
00:30:24,990 --> 00:30:30,306
until he sees the single line,
which makes sense in English.
直到他看到单行，
这使得在英语语感。

351
00:30:30,515 --> 00:30:32,779
That will be the plaintext message.
这将是明文消息。

352
00:30:36,179 --> 00:30:40,978
By the 20th century, Jefferson's machine
was still in use by the US military.
到了20世纪，杰弗逊的机
仍然由美国军方使用。

353
00:30:43,385 --> 00:30:48,506
But the Germans are developing a machine
that's about to overshadow Jefferson's wheel.
但是，德国正在开发一种机器
即将掩盖杰斐逊的车轮。

354
00:30:51,858 --> 00:30:56,996
In post-World War I Europe, secrecy between
paranoid nations becomes paramount.
在战后我欧洲，保密之间
偏执的国家变得极为重要。

355
00:30:58,481 --> 00:31:01,804
The growth of the international commerce
creates a need for companies to keep
国际贸易的增长
创建一个需要企业保持

356
00:31:01,804 --> 00:31:04,383
their information secret from competitors.
他们从竞争对手的信息保密。

357
00:31:07,106 --> 00:31:11,207
Germany's Arthur Scherbius develops the
Enigma machine as a means of keeping
德国的阿瑟谢尔比斯发展
谜机保持的一种手段

358
00:31:11,207 --> 00:31:13,703
those business transactions secure.
这些业务交易的安全。

359
00:31:14,328 --> 00:31:18,147
It works by generating an electrical current
when a letter key is pressed.
它的工作原理产生电流
当字母键被按下。

360
00:31:18,962 --> 00:31:22,731
A number of moving mechanical parts then
scramble the path of the current,
一些移动机械部件，然后
争夺当前的路径，

361
00:31:23,062 --> 00:31:26,409
producing a different letter
each time the key is pressed.
产生不同的信
每次按下该键。

362
00:31:29,594 --> 00:31:33,919
The Enigma machine is about to become the
German army's most powerful codemaking
即将成为谜机
德国军队的最强大的codemaking

363
00:31:33,919 --> 00:31:35,523
weapon in World War II,
第二次世界大战的武器，

364
00:31:36,973 --> 00:31:41,842
a weapon they're confident can keep
their secret military codes secret.
一个武器，他们有信心可以保持
他们的秘密军事法规的秘密。

365
00:31:43,716 --> 00:31:50,094
Arthur Scherbius had invented a machine,
which if you gave the machine to the enemy,
亚瑟谢尔比斯发明了一台机器，
如果你给了敌人的机器，

366
00:31:50,930 --> 00:31:54,733
even if you gave the machine to the enemy,
there would be so many complications,
即使你给机器的敌人，
会有这么多的并发症，

367
00:31:54,733 --> 00:32:00,958
so many possibilities that you could not
in reasonable time decipher the message.
这么多的可能性，你不能
在合理时间内破译的消息。

368
00:32:03,081 --> 00:32:08,992
Just like the Alberti's code wheel, the Enigma machine
creates multiple polyalphabetical substitution ciphers.
阿尔贝蒂的编码轮，就像谜机
创建多个polyalphabetical替代密码。

369
00:32:09,379 --> 00:32:14,524
It's fast, it's mechanized, and produces
codes that seem unbreakable.
它速度快，它的机械化，并产生
似乎牢不可破的代码。

370
00:32:17,013 --> 00:32:21,657
It's a device for turning readable messages
into unreadable messages.
这是一个把可读的消息的设备
成不可读的消息。

371
00:32:22,209 --> 00:32:30,236
Given an Enigma machine with an unknown
set of wheels, the enemy has to consider that
由于未知的一个谜机
车轮，敌人认为

372
00:32:30,236 --> 00:32:34,285
that machine can be set up in 186
这台机器可以设定在186

373
00:32:34,285 --> 00:32:34,848
million
万美元

374
00:32:35,386 --> 00:32:36,062
million
万美元

375
00:32:36,063 --> 00:32:37,588
million ways.
万美元的方式。

376
00:32:38,416 --> 00:32:43,201
The millions of permutations are acheived by the
number of variables involved when setting up the machine.
数以百万计的排列实现了由
设定本机时，所涉及的变量数目。

377
00:32:44,750 --> 00:32:48,628
At the height of the war, German operators
change these settings every day.
在战后，德国运营商的高度
每天更改这些设置。

378
00:32:51,855 --> 00:32:54,962
They placed the rotors in the specified
order from the left to right.
他们将在指定的转子
为了从左边到右。

379
00:32:56,999 --> 00:33:00,230
The rings that allow the rotors to
turn are repositioned daily,
环，使转子
打开每天重新定位，

380
00:33:00,811 --> 00:33:04,656
as is the patch panel of cables are
electrically linking one letter to another.
如电缆配线架
电气连接一个字母到另一个地方。

381
00:33:07,307 --> 00:33:11,847
These variables make the Enigma encryption
virtually immune to frequency analysis.
这些变量使之谜加密
几乎不受频率分析。

382
00:33:13,687 --> 00:33:16,949
The Germans think their Enigma code uncrackable.
德国认为无法破解的谜代码。

383
00:33:17,826 --> 00:33:20,940
They believe no one has enough time
or the mathematical ability to
他们相信没有人有足够的时间
或数学能力

384
00:33:20,940 --> 00:33:23,289
work through the millions of combinations.
通过组合数以百万计的工作。

385
00:33:25,158 --> 00:33:29,277
A coded message is created by typing
the German plaintext into the machine,
创建一个编码的消息是通过键入
德国明文进入机，

386
00:33:29,277 --> 00:33:33,100
and then having the encrypted message
transmitted via Morse code.
然后加密的消息
通过莫尔斯电码传送。

387
00:33:33,861 --> 00:33:40,093
With the outbreak of war, in September 1939,
Nazi coded messages flood the radio airwaves.
随着战争的爆发，在1939年9月，，
纳粹编码的消息洪水无线电电波。

388
00:33:41,978 --> 00:33:46,833
At the same time, British military intelligence
is in a process of setting up the most secret
与此同时，英国军事情报
在设立最秘密的过程

389
00:33:46,833 --> 00:33:48,558
place in wartime Britain,
在战时英国的地方，

390
00:33:49,117 --> 00:33:52,312
a place it hopes can crack the Enigma code.
一个地方，希望能破解谜代码。

391
00:33:55,219 --> 00:34:00,622
Bletchley Park, fifty miles north of London,
becomes known as Station X.
布莱切利公园，伦敦以北50英里，
成为被称为站十。

392
00:34:04,036 --> 00:34:07,994
It's staffed by a hand-picked team of
mathematicians and graduate scholars,
它配备一个钦点的团队
数学家和研究生学者，

393
00:34:08,357 --> 00:34:12,391
including Alan Turing, one of the founding
fathers of modern computing.
包括阿兰图灵，建国
父亲的现代计算。

394
00:34:14,822 --> 00:34:18,301
Turing and his team are under extreme
pressure to come up with some way,
图灵和他的团队在极端
用某种方式来的压力，

395
00:34:18,301 --> 00:34:22,027
either mathematical or mechanical,
to crack the Enigma code.
数学或机械，
破解之谜代码。

396
00:34:26,750 --> 00:34:31,119
By 1940, fleets of German U-boats are
sinking thousands of tons of Ally
到1940年，德国U型潜艇舰队
下沉数千万吨的盟友

397
00:34:31,119 --> 00:34:33,032
supply ships in the north Atlantic.
供应船只在北大西洋。

398
00:34:33,492 --> 00:34:37,590
The U-boats are receiving their orders
by Enigma-coded radio messages.

399
00:34:39,019 --> 00:34:45,483
The U-boats in the north Atlantic were in
constant coded communication with Germany,
在U型潜艇在北大西洋
恒定编码的沟通与德国，

400
00:34:45,483 --> 00:34:49,217
saying where these convoys where,
and arranging for groups of U-boats
说这些车队的地方，
并安排U艇组

401
00:34:49,217 --> 00:34:52,583
to come together to attack them,
and all of those messages were
走到一起攻击他们，
所有这些消息

402
00:34:52,583 --> 00:34:54,789
encoded using Enigma machines.
编码使用之谜机器。

403
00:34:54,789 --> 00:34:59,738
So cracking Enigma was the key to finding
the U-boats and protecting the convoys.
所以开裂之谜寻找的关键
U艇和保护车队。

404
00:34:59,995 --> 00:35:04,637
Turing begins by exploiting the mathematical
and human weaknesses of Enigma.
图灵开始利用数学
人性的弱点谜。

405
00:35:06,179 --> 00:35:10,066
Because the machine can not encrypt
a letter as itself, Turing eliminates
因为机器不能加密
作为自己的信，图灵消除

406
00:35:10,066 --> 00:35:12,185
thousands of letter permutations.
成千上万的字母排列。

407
00:35:13,445 --> 00:35:17,322
Combine this inherent flaw with the fact
that a lazy retired operators sometimes
这种固有的缺陷与事实相结合
一个懒惰的退休运营商有时

408
00:35:17,322 --> 00:35:21,470
forget to change their personal settings
each day, and this lowers the odds further.
忘记改变他们的个人设置
每一天，这几率进一步降低。

409
00:35:25,705 --> 00:35:29,874
But it's daily weather forecast that gives
the British their first major breakthrough.
但它的每日天气预报，让
英国的第一次重大突破。

410
00:35:30,752 --> 00:35:34,088
Everyday the Atlantic weather is
broadcast from the U-boats,
每天大西洋天气
广播从U艇，

411
00:35:34,088 --> 00:35:36,564
and everyday it follows the same format -
和日常生活，它遵循相同的格式 - 

412
00:35:36,564 --> 00:35:39,924
wind speed, atmospheric pressure and temperature.
风速，大气压力和温度。

413
00:35:42,292 --> 00:35:46,831
Seeing the same message lay-out each day gives
Turing the idea of using what he calls "cribs" -
看到了同样的消息停工每天给出
图灵使用他称之为“婴儿床”的想法 - 

414
00:35:47,489 --> 00:35:50,968
educated guesses to what these
part of the messages might say.
什么这些的猜测
消息的一部分可能会说。

415
00:35:53,474 --> 00:35:57,741
This is a crib in German of a weather
forecast from the Bay of Biscay region.
这是一个在德国的天气婴儿床
从比斯开湾地区湾的预测。

416
00:35:58,012 --> 00:36:02,105
The received encrypted message is placed
against the German plaintext.
收到加密的消息是放在
对德国的明文。

417
00:36:02,392 --> 00:36:07,988
If any letter is matched up with themselves,
S's as S's, V's as V's, then the crib is wrong,
如果任何一个字母是与自己相匹配，
S公司为S，V的V的，然后婴儿床是错误的，

418
00:36:07,988 --> 00:36:10,929
as an Enigma can't encrypt any letter as itself.
作为一个谜不能加密任何字母作为本身。

419
00:36:11,165 --> 00:36:14,342
So they slide the message along
until they find no matches.
因此，他们幻灯片消息沿
直到他们发现没有匹配。

420
00:36:19,792 --> 00:36:22,958
The British now have clues as to
what might be in the messages,
英国现在有线索
的消息可能是什么，

421
00:36:22,958 --> 00:36:26,615
but it's still too many man-hours to
work through all the permutations,
但它仍然是太多工时
工作通过所有的排列，

422
00:36:26,615 --> 00:36:29,526
and decipher the many thousands of daily intercepts.
每天拦截和破译成千上万。

423
00:36:32,721 --> 00:36:35,712
So they develop a machine of
their own to rival the Enigma,
因此，他们开发出机
自己的对手谜，

424
00:36:36,187 --> 00:36:39,828
a device that attempts to reverse the
encryption process of an Enigma machine,
一种装置，试图扭转
加密过程是一个谜机，

425
00:36:41,938 --> 00:36:43,409
known as the "Bombe".
被称为“Bombe”。

426
00:36:49,844 --> 00:36:55,555
It operates like a search engine - number crunching
possible solutions to fragments of encrypted text.
它像一个搜索引擎 - 数字运算
加密的文本片段可能的解决方案。

427
00:37:00,251 --> 00:37:03,913
But can the Bletchley bombe crack the
Enigma code before the German Navy
但是，布莱切利bombe破解
前德国海军的谜代码

428
00:37:03,913 --> 00:37:05,917
wins the War of the Atlantic?
赢得大西洋战争吗？

429
00:37:16,818 --> 00:37:21,722
The British codebreakers of Bletchley Park now
have a weapon to defeat the Nazi Enigma machine -
现在英国布莱切利公园的密码破译
有武器战胜纳粹之谜机 - 

430
00:37:22,376 --> 00:37:23,613
the Bombe.
Bombe。

431
00:37:23,910 --> 00:37:27,650
It's not designed to break coded messages,
but to crunch through the millions of letter
这不是旨在打破编码的消息，
但紧缩通过数以百万计的信

432
00:37:27,650 --> 00:37:32,008
permutations contained in the so-called
cribs, the clues obtained by the
在所谓的载排列
婴儿床，所获得的线索

433
00:37:32,008 --> 00:37:37,477
repeated use of weather reports, greetings,
and testing notes sent by the Nazis.
反复使用的天气报告，问候，
测试纳粹发送的票据。

434
00:37:39,250 --> 00:37:43,985
The operator sets each drum into position according
to the encipher crypt text through testing.
操作员设置到每个鼓的位置
通过测试encipher隐窝文本。

435
00:37:45,316 --> 00:37:49,084
As the machine operates, it generates
intermediate electrical circuits that run
由于机器运行，它会产生
中间运行的电气线路

436
00:37:49,084 --> 00:37:51,256
through every possible Enigma setting.
通过一切可能的谜设置。

437
00:37:53,774 --> 00:37:57,707
The goal is to find an open circuit, which
means the bombe has found a setting that
我们的目标是找到一个开路，
这意味着bombe已发现一个设置

438
00:37:57,707 --> 00:38:01,988
converts all of the cipher characters
into plaintext without any errors.
转换所有的密码字符
成明文没有任何错误。

439
00:38:05,353 --> 00:38:11,702
It's a hugely complicated device with nearly 12
miles of wiring, and 97,000 carefully machined parts.
这是一个巨大的复杂的设备近12
英里的布线，和97,000名仔细加工零件。

440
00:38:17,076 --> 00:38:21,645
This bombe has been reconstructed from
plans and rawings over the past 16 years.
这bombe已重建
在过去16年的计划和rawings。

441
00:38:25,507 --> 00:38:30,502
Back in 1943, Jean Valentine was one of the
bombe operators at the Bletchley Park,
早在1943年，让情人节是一个
在布莱切利公园的bombe运营商，

442
00:38:30,502 --> 00:38:32,792
working under the strictest security.
根据严格的安全工作。

443
00:38:35,060 --> 00:38:39,637
Here in Bletchley, we had five bombs,
and there were two people to each bomb,
布莱切利在这里，我们有五枚炸弹，
有两个人，每个炸弹，

444
00:38:39,637 --> 00:38:41,617
so there were ten of us on a watch.
所以，我们的手表10。

445
00:38:42,137 --> 00:38:47,854
And, apart from them, you did not
talk to anybody about your job.
而且，除了他们之外，你没有
对你的工作，任何人谈话。

446
00:38:51,353 --> 00:38:54,988
The minute you walked out of the bombe
room, got in there and they were told
你走出分钟bombe
室，得到了在那里，他们被告知

447
00:38:54,988 --> 00:38:59,929
to go back to wherever they lived,
you didn't think or talk about it at all.
回到他们住的地方，
你没有想到，或谈论它在所有。

448
00:39:01,285 --> 00:39:04,958
Bletchley Park is one of the best examples
of complete security in history,
布莱切利公园是最好的例子之一
在历史上的完整的安全，

449
00:39:05,528 --> 00:39:08,726
and Nazis had no idea that British
were decoding their messages.
和纳粹没有想到，英国
他们的邮件被解码。

450
00:39:13,668 --> 00:39:16,847
They also had no idea that their code
books and Enigma machines were being
他们也没想到，他们的代码
书籍和谜机

451
00:39:16,847 --> 00:39:18,747
retrieved from captured U-boats.
检索从捕获的U型艇。

452
00:39:21,803 --> 00:39:25,405
Turing and his team were working around-
the-clock, cracking Enigma messages from
图灵和他的团队工作
时钟，破解之谜的消息

453
00:39:25,405 --> 00:39:30,739
U-boat positions to the location of reinforcements,
and feeding this information the the Allies.
U型艇的位置，以增援的位置，
和喂养此信息同盟国。

454
00:39:32,224 --> 00:39:37,421
By 1945, there are over 300 bombes in
operation on both sides of the Atlantic,
到1945年，有超过300 bombes
大西洋两岸的运作，

455
00:39:37,817 --> 00:39:40,419
the days of the Nazi Enigma are numbered.
纳粹之谜的日子已经屈指可数。

456
00:39:43,009 --> 00:39:47,666
The cracking of Enigma and the intercepting
and decoding of Nazi messages shapes the outcome
谜开裂和拦截
纳粹消息解码形状的结果

457
00:39:47,666 --> 00:39:50,362
of many campaigns and battles of World War II,
许多运动和第二次世界大战的战斗，

458
00:39:50,989 --> 00:39:54,586
including D-Day, Alamein, and Anzio.
包括D -日，阿拉曼，和安齐奥。

459
00:39:59,968 --> 00:40:03,930
But it's perhaps the vital role of decoding
the U-boat messages in the north Atlantic
但是，这也许是解码至关重要的作用
在北大西洋的U型艇的消息

460
00:40:03,930 --> 00:40:05,852
that saves the most lives.
节省的大部分生活。

461
00:40:07,138 --> 00:40:12,018
Prime Minister Winston Churchill famously
states that the Bletchley Park codebreakers
首相温斯顿丘吉尔的名言
指出布莱切利公园的密码破译

462
00:40:12,018 --> 00:40:15,861
were the "geese that laid the
golden eggs, and never cackled".
“鹅，奠定了
金蛋，从来没有cackled“。

463
00:40:17,307 --> 00:40:22,476
The war wasn't won by the codebreakers,
the war was won by boots on the ground.
没有赢得这场战争的密码破译，
赢得这场战争是由地面上的靴子。

464
00:40:22,476 --> 00:40:28,572
Without it, the war would not have been lost,
but on the other hand, with it, it was certainly
没有它，战争将不会丢失，
但另一方面，有了它，这是肯定

465
00:40:28,572 --> 00:40:30,599
shortened by a significant amount.
缩短了一个重要的量。

466
00:40:33,212 --> 00:40:37,952
After the Second World War, mathematicians
like Alan Turing go on to become pioneers
第二次世界大战后，数学家
像艾伦图灵成为先驱

467
00:40:37,952 --> 00:40:39,068
of early computing.
早期的计算。

468
00:40:41,158 --> 00:40:44,941
They don't know it, but their inventions are
about to help move the secret science of
他们不知道，但他们的发明
约，以帮助移动的秘密科学

469
00:40:44,941 --> 00:40:50,137
cryptology out of the shadowy world of espionage, and into everyday life.
隐语出间??谍的阴暗世界，融入日常生活。

470
00:40:51,834 --> 00:40:56,770
Our lives leave so many electronic traces on
everything that we do; every purchase you make with
我们的生活留下这么多的电子痕迹
我们做的一切，您每购买

471
00:40:56,770 --> 00:41:01,873
the credit card is stored in a database, every visit
to a doctor, every telephone call, every e-mail,
信用卡是存储在数据库中，每次访问
医生，每个电话，每个e - mail，

472
00:41:01,873 --> 00:41:09,249
everything you send, or communicating to
the outside world, is recorded or will be in the near future.
一切您发送或沟通，
外面的世界，记录或将在不久的将来。

473
00:41:10,925 --> 00:41:15,484
Twenty-first century cryptology is based on
the advanced mathematics, and the ability of
二十一世纪的隐语是基于
先进的数学和能力

474
00:41:15,484 --> 00:41:19,618
modern computers to perform calculations,
and process information quickly.
现代计算机执行计算，
和处理信息的快速。

475
00:41:24,286 --> 00:41:28,485
I think the computers have the dramatic
impact on codebreaking, in fact, it was
我认为电脑已经戏剧性
上codebreaking的影响，实际上，它是

476
00:41:28,485 --> 00:41:36,243
the necessity of trying to decipher World War II
messages that really brought the computer
试图破译二战的必要性
真正使计算机的消息

477
00:41:36,243 --> 00:41:41,324
industry to bear, and was very much
responsible for its development.
行业来承担，是非常
负责其发展。

478
00:41:41,526 --> 00:41:45,626
It also changed the nature of, I think,
codemaking and breaking, in the sense that
它的性质也发生了变化，我认为，
codemaking和突破，在某种意义上说，

479
00:41:45,626 --> 00:41:50,867
with the add of computers, it's more of mathematical
issue now of "this is a hard math problem to solve",
随着计算机的添加，它的数学
现在的问题，“这是一个很难的数学问题解决”，

480
00:41:50,867 --> 00:41:56,680
and therefore you need to solve this
problem in order to break the code.
因此，你需要解决这个
为了打破代码的问题。

481
00:41:57,193 --> 00:42:02,523
Yet the language used by a computer to process
information is one of the most basic codes ever devised -
然而，由计算机使用过程中的语言
信息是有史以来设计的最基本的守则之一 - 

482
00:42:03,401 --> 00:42:04,418
binary.
二进制。

483
00:42:05,739 --> 00:42:10,537
A computer is a group of transistors that have only
two states when the electricity passes through them -
一台计算机是一组晶体管，只有
两个国家的电力通过它们 - 

484
00:42:11,314 --> 00:42:15,822
on or off, which equals digital terms 1 or 0.
开启或关闭，这等于0或1的数字条款。

485
00:42:17,728 --> 00:42:22,189
It not just a computer's ability to process
data quickly, but how it encrypts the data.
它不只是一个计算机的处理能力
数据传输速度，但它是如何对数据进行加密。

486
00:42:24,516 --> 00:42:30,273
In the past, codemakers have always needed a code-
cracking key, shared between the sender and receiver.
在过去，codemakers一直需要一个代码
开裂的关键，发送者和接收者之间共享。

487
00:42:30,975 --> 00:42:34,319
And as we've seen, this key is vulnerable to interception.
正如我们所看到的，关键是容易被截取。

488
00:42:36,045 --> 00:42:39,976
But modern computer encryption has
removed the need for a shared key.
但现代计算机加密
取消需要一个共享密钥。

489
00:42:40,418 --> 00:42:44,966
Instead, everyone uses a computer to send
secure information has two keys -
相反，每个人都使用一台计算机发送
安全的信息有两个键 - 

490
00:42:44,966 --> 00:42:47,524
a private key and a public key.
一个私钥和一个公钥。

491
00:42:49,044 --> 00:42:54,774
Essentially you have a private key that only
you know and a public key that you can put on
从本质上讲，你有一个私钥，只有
你知道，你可以把一个公钥

492
00:42:54,774 --> 00:43:00,477
your web page, if you like, and people can
then use your public key to encode a message
您的网页，如果你喜欢，人们可以
然后使用你的公共密钥来编码消息

493
00:43:00,477 --> 00:43:03,596
that only you can read with your
private key, because your private key
只有您可以读取您的
私钥，因为你的私钥

494
00:43:03,596 --> 00:43:05,901
and public key are mathematically related.
和公钥与数学相关。

495
00:43:06,225 --> 00:43:08,613
The mathematics involved are staggering.
所涉及的数学是惊人的。

496
00:43:09,578 --> 00:43:14,795
The Enigma machine had over 180 million
million million permutations of combinations,
谜机已超过180万
万美元的排列组合，

497
00:43:16,967 --> 00:43:20,866
but public-key cryptography deals with
much bigger numbers than that.
但公钥加密处理
更大的数字比。

498
00:43:22,277 --> 00:43:25,556
Their encryption system is based on
prime numbers - numbers that are
加密系统是基于
素数 - 数字

499
00:43:25,556 --> 00:43:28,371
only divisible by themselves and 1.
只有自己和1整除。

500
00:43:28,863 --> 00:43:32,907
Your private key is two randomly
selected large prime numbers,
您的私钥是两个随机
选择大素数，

501
00:43:33,422 --> 00:43:37,788
your public key, the product
of those two prime numbers.
你的公共密钥，产品
这两个素数。

502
00:43:38,758 --> 00:43:42,401
So when you send a secure message,
your computer encrypts it using the
所以，当你发送一个安全的消息，
您的计算机加密使用

503
00:43:42,401 --> 00:43:48,473
product prime number, and decrypts an incoming
message with the two prime numbers themselves.
产品质数，并解密传入
两个素数本身的消息。

504
00:43:49,246 --> 00:43:52,932
This works because no mathematical formulas
have been discovered that can quickly factor
这工作，因为没有数学公式
已发现的，可以迅速的因素

505
00:43:52,932 --> 00:43:55,185
two prime numbers from one large one.
从一个大的两个素数。

506
00:43:57,784 --> 00:44:02,316
It's estimated that cracking a modern encrypted
computer message using state of your hardware
据估计，破解了现代加密
计算机信息使用您的硬件状态

507
00:44:02,316 --> 00:44:08,089
will take over 13 billion years,
about the same age as the universe.
将超过13亿年，
关于宇宙年龄。

508
00:44:13,710 --> 00:44:17,359
But public-key encryption isn't just
a way of transmitting data securely,
但是，公钥加密不只是
一个安全的数据传输方式，

509
00:44:18,033 --> 00:44:21,825
you can also use it to verify those
in cyberspace, and to check that
你也可以用它来验证这些
在网络空间，并检查

510
00:44:21,825 --> 00:44:23,834
no one is tampering with your data.
没有人篡改您的数据。

511
00:44:26,108 --> 00:44:30,325
If Mary, Queen of Scots had used public-key
encryption, then she would have known that
如果苏格兰女王玛丽，曾使用公共密钥
加密，那么她就已经知道，

512
00:44:30,325 --> 00:44:32,661
Walsingham had been reading her messages.
沃尔辛厄姆已经阅读她的消息。

513
00:44:33,614 --> 00:44:37,464
And the outcome of both World Wars might
have been different if the Germans had realized
两次世界大战的结果可能
有所不同，如果德国人已经意识到

514
00:44:37,464 --> 00:44:40,501
that their secret messages weren't
as secret as they thought.
他们的秘密消息
秘密，因为他们认为。

515
00:44:46,710 --> 00:44:52,362
For the moment, the long battle of cat
versus mouse, codemakers versus codebreakers,
目前，猫长的争斗
与鼠标，codemakers与密码破译，

516
00:44:52,701 --> 00:44:55,490
appears had been won by the codemakers.
似乎已经取得了胜利的codemakers。

517
00:44:59,771 --> 00:45:03,445
But codes are only as secure as the
people who make and use them.
但代码只作为安全
从事制造和使用它们的人。

518
00:45:03,966 --> 00:45:08,310
Sometime soon, a human computer
programmer will make a typical human error,
有时很快，一个人的电脑
程序员将一个典型的人为错误，

519
00:45:08,886 --> 00:45:14,663
and create the need for someone, or something,
to invent the next generation of codes,
并创建为别人的需要，或一些，
发明下一代的代码，

520
00:45:15,972 --> 00:45:19,379
and the cat will start chasing
the mouse all over again.
和猫会开始追逐
鼠标一遍。

521
00:45:19,379 --> 00:47:00,000
--- The End ---
---完---

