Chapter 106: New Encryption Technology (Eight Watches, Days Are Gone)
After reprimanding the outsiders, Li Weiguo hurriedly apologized to Wu Hao and said, "Xiao Wu, I'm really sorry, it's all my work that I didn't do well." Rest assured, I promise that nothing we see or hear today will leak out. ”
"It's okay." Wu Hao kept a smile and shook his head, since he let people visit, these were naturally in his consideration. He was not surprised, so he comforted Qian Jianyuan, who was still angry: "Old Qian, don't be angry, I believe they are also too curious." ”
Qian Jianyuan waved his hand, then continued to look at the screen and sighed slightly: "Neural network algorithms, fuzzy neural network algorithms, deep learning technology, this is the most cutting-edge research field in the field of computer science at present. I didn't expect you to achieve so much in this area, and use it in the actual product.
It seems that I really came to the right place this time, and it is not appropriate to go out behind closed doors, and my old bones are a little out of step with the times. ”
Hearing Qian Jianyuan's sigh, Wu Hao hurriedly comforted: "Old Qian, our achievements are actually based on the research of our predecessors. If there were no scientific giants like you to guide us in the rain, how could we have grown up rapidly as the younger generations. ”
"That's right, old money, don't forget to dig wells. Not only these young people, but also every one of us who enjoys the convenience of the current life should be grateful to the researchers who have worked silently behind these technologies, and the motherland will not forget the comrades who have dedicated their lives to modernization represented by you. Li Weiguo also came to comfort.
Qian Jianyuan shook his head, then looked at Wu Hao with a complicated face and said: "It's a pity, if you can calm down and do research, you will be able to shock the whole world in less than ten years, no, five years, and it is not impossible to compare with those famous scientific giants." ”
Wu Hao smiled when he heard this: "You have won the award, I am too noisy, I can't calm down and do research day after day."
Now this path is also very good, at least I can do some of the things I love, and I can give back to this society and our country as much as I can.
Although the way is different, they are the same. If it is bigger, it is also contributing to the progress of mankind and society, and to be honest, it is rejuvenating the country through science and technology.
Of course, I also want to realize my own life value while realizing these ideals. Don't ask for richness, but for a worry-free life. I do my best to make life better for everyone around me, that's my little wish. ”
Qian Jianyuan looked at him and said with a kind smile: "Very sincere and simple ideals, in this noisy society, it is really not easy to have a young man like you in Chicheng." ”
After saying this, Qian Jianyuan continued to look at the screen and said, "How did I hear that you also use a new language, but I don't look like it." ”
Wu Hao replied with a smile: "There is a new language, but it is not yet mature, so it is only used at a few key nodes. The rest is in Python and C++, and of course in Java.
The reason why everyone has this illusion is that when we encapsulate and package, we use a new encryption method, which we call it Kong Ming lock. ”
"Kong Ming lock, is it the kind of building block disassembly toy we played with when we were children?" An expert in his forties asked.
Wu Hao nodded and said, "That's right, that's it." It's just that this is a figurative name for our encryption method, and it doesn't mean that we have adopted this method. ”
Hearing Wu Hao say this, Luo Kai became interested and said, "Xiao Wu, can you introduce us to this new encryption method." Some of our military's systems and software programs also urgently need a new way to protect against the growing threat of cyber hacking. ”
Luo Kai's question also attracted everyone's attention, and they all turned their heads to stare at him. Seeing this, Wu Hao smiled and tapped on the keyboard again, and then a new schematic diagram came out.
"We know that there are two main methods of encryption at present, one is to embed the encryption program in the code, and the other is to pack it when it is packaged.
It's just that no matter what kind of method it is, it is nothing more than secrecy in the common form of three totals.
The first is the common online real-time monitoring of the encryption status, sending a signal every time in a while. The second is long-term offline encryption, which must be activated online if it is reused.
The third is to use the key method for encryption, and decryption is carried out through virtual keys, digital signatures or hardware keys.
For important system software, these methods and forms are often used in combination. But even so, as long as the corresponding information and data are mastered, it can be cracked, which is nothing more than a length of time.
Our encryption approach is different, and what we want to do is not prevent hackers from breaking in and stealing information.
Instead, the original data is encrypted and transformed, thus forming some disordered and irregular information content.
So even if someone steals the contents of the kernel, there is no way to restore it, let alone read it. ”
But if the hacker masters this encryption conversion law, or masters the encryption conversion technology, then the data will be completely restored. And this conversion is encrypted, will not affect the efficiency of the software. An expert who specializes in this area raised his own objections.
Wu Hao shook his head and said: "No, there is no law in cryptographic conversion, everything is carried out randomly." Moreover, the encryption conversion does not directly correspond to the content, but to a special encoding. And this encoding is also an encrypted cipher, which is difficult for others to decipher.
The code itself is recorded by a number ranging from 16 to 24 digits, and each string of numbers corresponds to a code content and position.
In the absence of source code, even the fastest supercomputers of the present would take millions of years to decipher. ”
"Such a complicated program must be bloated, but I have checked your system, it is very small, how do you do it."
"No, it's not complicated at all." Wu Hao shook his head and smiled: "To use an analogy, this is like a drop of poison penetrating into the animal's body, if you want to detoxify, you must first master the ingredients of this poison and develop the corresponding antidote."
Poisons are very easy to make, but antidotes are very difficult to develop. ”
"I kind of get it, you mean it's like a mathematical formula, it seems simple, but it's hard to find the answer." Qian Jianyuan smiled when he heard his words.
Wu Hao nodded when he heard this: "You can also understand it this way." ”