Military Technology

Chapter 106 New Encryption Technology

After reprimanding the outsiders, Li Weiguo quickly apologized to Wu Hao: "Xiao Wu, I'm so sorry, it's because I didn't do my job well. Don't worry, I promise that what we saw and heard today will not leak out. "

"It doesn't matter." Wu Hao kept a smile and shook his head. Since people are visiting, these are naturally under his consideration. He was not surprised, so he comforted Qian Jianyuan who was still angry: "Old Qian, don't be angry, I believe they are just too curious."

Qian Jianyuan waved his hand, then continued to look at the screen and sighed slightly: "Neural network algorithm, fuzzy neural network algorithm, deep learning technology, this is currently the most cutting-edge research field in the computer field. Such a great achievement, but also applied to the actual product.

It seems that I really came to the right trip this time. It is inappropriate to go out behind closed doors, and my old bones are a little out of sync with the times. "

Hearing Qian Jianyuan's sigh, Wu Hao hurriedly comforted: "Old Qian, our achievements are actually based on the research of our predecessors. If there is no scientific master like you to guide the way in front of the rain, where would we be? There are younger generations like us growing up quickly."

"That's right, Qian Lao, never forget the well diggers. Not only these young people, but every one of us who enjoys the convenience of our current life should thank the researchers behind these technologies, and the motherland will never forget you. To represent the comrades who have dedicated their lives to the modernization drive." Li Weiguo also came to comfort.

Qian Jianyuan shook his head, then looked at Wu Hao with a complex face: "It's a pity, if you can calm down and do research, you will be able to shock the whole world within ten years, no, five years. , it is not impossible to match those famous scientific masters."

Wu Hao said with a smile: "You have won the prize, I am too noisy, I can't calm down and do research day after day.

Now this road is also very good, at least I can do some things I like, and I can give back to the society and our country as much as I can.

Although the way is different, but the same way. When it grows bigger and higher, it is also contributing to the progress of mankind and society. To be honest, this is the development of the state through science and technology.

Of course, I also want to realize the value of my life while realizing these ideals. I don't want to be rich, but I want to live a worry-free life. Do my best to make everyone around you have a better life, this is my little wish. "

Qian Jianyuan looked at him and said with a kind smile: "It's a very sincere and simple ideal. In today's noisy society, it's really not easy to have a young man like you in Chicheng."

Having said this,

Qian Jianyuan continued to look at the screen and said, "How come I heard that you have also used a new language, but I don't look like it."

Wu Hao replied with a smile: "There is a new language, but it is not mature, so it is only used on a few key nodes. The others are still using Python and C++, and of course some of them are also used in Java.

The reason why everyone has this illusion, as long as we use a new encryption method when packaging and packaging, we call it the Kongming lock. "

"Is Kong Mingsuo the kind of building block dismantling toy we played with when we were young?" an expert in his forties asked.

Wu Hao nodded and said, "That's right, it's that one. It's just an image of our encryption method, it doesn't mean we adopted this method."

Hearing what Wu Hao said, Luo Kai became interested and said, "Xiao Wu, can you introduce this new encryption method to us. Some of our military systems and software programs urgently need a new method. to protect against ever-increasing cyber-hacking attacks.”

Luo Kai's question also attracted everyone's attention, and they all turned to stare at him. Seeing this, Wu Hao smiled and tapped on the keyboard again, and a new schematic diagram came out immediately.

"We know that there are two main methods of encryption at present, one is to embed the encryption program in the code, and the other is to pack it when it is packaged.

It's just that no matter what method it is, it is nothing more than a common form of three generals to keep secrets.

The first is the common online real-time monitoring of the encryption status, sending a signal every period of time. The second is long-term offline encryption, which must be activated online if it is to be reused.

The third method is to use the key method for encryption. When decrypting, the virtual key, digital signature or hardware key is used for decryption.

For important system software, these methods and forms are often superimposed. But even so, as long as the corresponding information data can be cracked, it is nothing more than a short period of time.

Our encryption method is a different way. What we need to do is not to prevent hackers from entering and stealing information.

Instead, the original data is encrypted and converted to form some disordered and irregular information content.

So even if someone steals the contents of the kernel, it cannot be restored, let alone read. "

"But if the hacker masters this encryption conversion law, or masters the encryption conversion technology, then the data will be completely restored. And if this conversion is encrypted, will it affect the efficiency of software operation." Experts who have studied in this area express their own objections.

Wu Hao shook his head and said: "No, the encryption conversion is irregular, everything is done randomly. Moreover, the encryption conversion does not directly correspond to the content, but corresponds to a special code. And this code is also an encryption password, which is difficult for others to do. decipher.

The code itself is recorded by a number ranging from sixteen to twenty-four digits, and each string of numbers corresponds to a code content and position.

Without the source code, even the fastest supercomputers would take millions of years to decipher it. "

"Such a complex program must be bloated, but I have checked your system, and it is very small. How did you do it."

"No, it's not complicated at all." Wu Hao shook his head and smiled: "To use an analogy, it's like a drop of poison infiltrating an animal's body. If you want to detoxify, you must first master the ingredients of this poison, and develop a The corresponding antidote.

Poisons are very easy to make, but antidotes are very difficult to develop. "

"I can understand it. You mean that this is like a mathematical formula. It seems very simple, but it is difficult to find the answer." Qian Jianyuan smiled and explained after hearing his words.

Wu Hao nodded when he heard the words and said, "You can also understand it that way."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like