Current location - Training Enrollment Network - Mathematics courses - Sleepy Valley hit a number.
Sleepy Valley hit a number.
How to express a knight with numbers? ——70

Techniques for deciphering passwords First of all, let's talk about the types of passwords, such as English, numbers, Chinese and so on. As for Chinese code words, because they are too complicated, we don't do research, but only study English, numbers and derivatives. Let me introduce the rules of password first: 1. Regularity: Passwords must follow a rule. Unless prompted, it is impossible to have a password that follows both writing forms at the same time. 2. Crackability: There is no password that cannot be cracked. 3. It's not simple: you can understand it without calling a password. The password is always a secret code, and its meaning is incomprehensible except for the author at the first time. 4. Correspondence: Writing form and password belong to one-to-one correspondence type. The common writing form of password is 1. Number/other text switching type. This is the most common password writing type, and the most common correspondence is the English alphabet, with 26 letters corresponding to 26 numbers. There are several ways to write this password (1) in English alphabetical order: for example, A stands for 0 1 or 1, B stands for 02 or 2, and so on, Y stands for 25, and Z stands for 26. For example, A stands for 10, which is the result of 0 1 inversion, so that Y stands for 52, Z stands for 62, and so on. (2) Mobile phone keyboard and English: There are corresponding English on the numeric keyboards 2-9 on the mobile phone, for example, the English on the number 6 is mno. It is common to use the first number to represent a number, and the second number to represent the number of English letters displayed on this number. For example, the number 73 represents the third letter on the number 7, that is, the r (3) telephone/mobile phone digital connection of pqrs is converted from other letters: for example, the connection on the telephone of 126874 is very similar to the letter D, the connection of 159357 is very similar to the letter X, and the connection of 1 3687 is very similar to Japanese. , take the first two decimal places to form the room number, etc. (5) Use keyboard numbers to correspond to English: for example, the number 1 diagonal corresponds to the English letter qaz, the number 7 diagonal corresponds to the English letter ujm, the number 0 diagonal corresponds to the English letter P, and the symbols: and? Wait. (6) Use the correspondence between playing cards and English: for example, in poker, J corresponds to 1 1, Q corresponds to 12, K corresponds to 13, A corresponds to 1 (7) Use the correspondence between clock numbers and English: for example, L corresponds to 3 points and I corresponds to it. Japanese letters へ correspond to 7: 20, and the corresponding English letters are represented by the rotation of the clock hands, such as 12 to 3: 25, the upper-case English letter C is moved by three squares in the hour hand, the lower-case English letter Y is moved by 25 squares in the minute hand, and so on. (8) Correspondence between piano keyboard and English letters: In Conan-Moonlight Murder (Part 2) (. Writing English sentences with staff can mean (9) using computer numbers to represent English letters in reverse: for example, 1 stands for I, 3 stands for E, 4 stands for H, 5 stands for S, 7 stands for L and 9 stands for G (10). For example, a word is represented by keyboard dislocation, assuming it is "I" and "wo" on the keyboard. (1 1) takes advantage of some features of the computer keyboard, such as the number "2" will become "@" when you hold down shift, and the letters will be repeated continuously when you hold down a letter. Another example is "Numlock", which can be expressed by clicking it, and 2, 4, 6, 8 and so on when it is not pressed. Represents up, down, left and right on the keyboard. Wait 2. Digital/digital switching type is not commonly used. Some numbers are used to represent other numbers. Of course, several methods in the first method are used (1). Mobile phone/phone number: use two digits to represent one or two digits, for example, 73 on the mobile phone stands for R. According to the alphabet, it is easy to conclude that R is a letter of 2 1, so 73 stands for it. Use a multi-digit to represent another one-digit or two-digit number, such as 159357 for X, that is, 24 (2) clock number: use the angle expressed by clock rotation or clockwise position to display numbers, such as 9: 00 for 90, 4: 00 for 120, 4: 00 ~ 4:/kloc-. There are also ways to display scores by overlapping hour and minute hands. (3) Use the dice: the numbers on the dice represent from 1 to 6, of which 1 is the most obvious. In Conan Hattori Heiji (files 323 and 324), there is a set of digital passwords written by dice and playing cards. If you are interested, you can go and see 3. Text/text switching. The essence of operation lies in one heart, which can only be understood but not expressed (1). The most common way is to use Chinese-English translation to achieve the effect of switching. For example, Sleepless Valley represents the knight's turn (k), which means the night (2) other switching: for example, Chinese/Japanese switching, English/Japanese switching and so on. See which episodes of the thief boy in Conan, and study the notice in detail. 4. Alphabet conversion is very common in English alphabet. The following are the types of transformation: (1) inverse transformation: the reverse order of abcdefghijklmnopqrstuvwxyz is zyxwvutsrqponmlkjihgfedcba, that is, the original letter A is replaced by z, the original letter B is replaced by y, and the original letter I love you is replaced by Q olev blf (2). Turning transformation: abcdefghijklmnopqrstuvwxyz according to the number 12 (the number is now at the position of 1+ 12= 13, and y is at the position of 25, and now it is at the position of 25+12-26 =/kloc-. The result is opqrstuvwxyzabcdefghijklmn, and the original letter of A is O. Next, I will introduce some unusual password writing methods: 1 Write with digital product, sum, idempotent, etc. This is a form of password writing often used by the National Security Agency. It is very safe to use the product of two large prime numbers as the communication medium and the decomposed prime numbers as the final communication mode. But it is definitely not suitable for writing small passwords. 2. Write the password with customs: For example, Valentine's Day in China is Qixi (July 7th), and 7/7 C can be used to imply Valentine's Day in China, which can be associated with 2 14, which can be used as the room number, etc., but it can only be used if you know the customs. 3. The writing habits above other writing methods can be mixed, and the more mixed methods, the more complicated password cracking. Example: Little R's home has been completely controlled by the police. However, due to the great resistance in the house, the inspector sunspot adopted the strategy of static braking to comprehensively monitor every move in the house in order to reduce unnecessary losses. As long as little r steps out of the house, there will be countless dark guns pointing at his head. That guy knows the danger, too. In the past few days when the police are fully monitoring, nothing has happened. Due to the limited police force, the police had to withdraw some police officers to deal with other matters after a few days of siege. The police know that if little R wants to break through and escape, he must get in touch with one of his right-hand men, code K, and run with him. Now k is also being monitored. So as long as there is no news leaked, little R is determined to escape. Just a few days after the police were laid off, the investigators outside caught a guy trying to escape from the back tunnel of the house. I only found a package from that guy, which contained a peach with leaves wrapped in white paper. The scout thought it was a secret letter from little R to K, but he couldn't understand what it meant, so he had to give the parcel to Inspector Sunspot. The sunspot studied the parcel carefully. That piece of paper is an ordinary white paper, and there is nothing mysterious about the leaves, and there is nothing wrong with the peaches. Detective sunspot even carefully examined the peach pit several times, but found nothing. Looking at the white paper and peaches on the table, the inspector sunspot was lost in thought. So, does anyone know what this code word means? A simple code like this is: paper peach, that is, the water escapes at midnight, that is, the sewer escapes at 0 am.