Military Technology

Chapter 106: New encryption technology

After reprimanding foreigners, Li Weiguo rushed to apologize to Wu Hao: "Xiao Wu, I'm sorry, it's all my work is not done. Rest assured, I promise that what we hear today will not leak out. "

"It doesn't matter." Wu Hao smiled and shook his head. Since people are visiting, these are naturally under his consideration. He was not surprised, so he comforted Qian Qianyuan, who was still angry, "Qian Lao, don't be angry, I believe they are simply too curious."

Qian Jianyuan waved his hand, and then continued to look at the screen and sighed slightly: "Neural network algorithm, fuzzy neural network algorithm, deep learning technology, this is the most cutting-edge research field in the computer field. I didn't expect that you are actually in this regard. Such a great achievement has been achieved, and it has also been applied to actual products.

It seems that I really came right this time. It is not right to build a car behind closed doors. My old bones are a bit behind the times. "

Hearing Qian Jianyuan's sigh, Wu Hao quickly comforted: "Qian Lao, our results are actually based on the research of previous people. Without a scientific master like you to cover the way in the rain, what? There are our juniors growing up fast. "

"That's right, money is old, people who don't forget to dig wells. It's not just the young people. Everyone who enjoys the convenience of the current life should thank the researchers behind these technologies for their silent efforts. The motherland will not forget to take you Comrades who dedicate their lives to modernization for the representatives. "Li Weiguo also came to comfort.

Qian Jianyuan shook his head, then looked at Wu Hao with a complex face: "It's a shame, if you can do your research calmly and calmly, within ten years, no, you can shock the whole world in five years. It is not impossible to stand by the famous scientific masters. "

Wu Hao said with a smile: "You have won the prize. I am too noisy and can't calm down to do research day after day.

Now this road is also very good, at least I can do something I like, and I can give back to this society as much as I can, and give back to our country.

Although the methods are different, they share the same goal. It is said that it is also contributing to the progress of humanity and society, and it is true that this is the prosperity of science and technology.

Of course, I also want to realize my life value while realizing these ideals. Don't ask for riches, but for a worry-free life. Do my best to make the people around me have a better life. This is my little wish. "

Qian Jianyuan looked at him with a kind smile and said: "Very sincere and simple ideals. In this noisy society, it is really not easy to have young people like you in Chicheng."

After saying this, Qian Jianyuan continued to look at the screen and said, "How did I hear that you also use a new language, but I don't look like it."

Wu Hao answered with a smile: "There is a new language, but it is not yet mature, so it is only used on a few key nodes. The others are still Python and C ++, of course, some of them are also used in Java.

The reason why everyone has this illusion, as long as we use a new encryption method when packaging and packaging, we call it with Kong Mingsuo. "

"Kong Mingsuo, is it the kind of building block dismantling toy we played when we were young?" An expert in his forties asked.

Wu Hao nodded and said, "Yes, that's the one. It's just an image of our encryption method. It doesn't mean we have adopted this method."

Hearing Wu Hao's words, Luo Kai was interested: "Xiao Wu, can you introduce us to this new encryption method. Some of our military's systems and software programs also urgently need a new method. To protect against the increasing severity of cyber hacking. "

Luo Kai's question also caught everyone's attention and turned to stare at him. Wu Hao smiled and tapped on the keyboard again, then came up with a new schematic.

"We know that there are two main methods of encryption at present, one is to embed an encryption program in the code, and the other is to pack the package when it is packaged.

However, no matter which method is used, it is nothing but confidentiality in the common three general forms.

The first is the common online real-time monitoring of the encryption status, sending a signal every time. The second is long-term offline encryption, which must be activated online if it is reused.

The third method is encryption using a key method. When decrypting, the virtual key, digital signature, or hardware key is used for decryption.

For important system software, these methods and forms are often superimposed. But even so, as long as you have the corresponding information and data, you can crack it. It is only a matter of time.

Our encryption method is another way. What we need to do is not to prevent hackers from entering and stealing information.

Instead, the original data is encrypted and transformed to form some disordered and irregular information content.

So even if someone steals the contents of the kernel, they cannot be restored, and they cannot be read. "

"But if a hacker has mastered the encryption conversion law, or mastered the encryption conversion technology, then the data will not be completely restored. And if the conversion is encrypted, it will not affect the efficiency of the software operation." Experts who specialize in this area raise their own objections.

Wu Hao shook his head and said, "No, the encryption conversion is irregular. Everything is done randomly. And the encryption conversion does not directly correspond to the content, but corresponds to a special encoding. This encoding is also an encryption password. UU 看书 www .uukanshu.com is hard to decipher.

The code itself is recorded by a number ranging from 16 to 24 digits, and each string of numbers corresponds to a code content and location.

Without the source code, it would take millions of years for even the fastest supercomputer today to decipher it. "

"Such a complicated program will be very bloated, but I checked your system and it is very small. How did you do it?"

"No, it's not complicated at all." Wu Hao shook his head and smiled. "A metaphor, it's like a drop of poison penetrates into an animal's body. If you want to detoxify, you must first grasp the ingredients of this poison and develop Corresponding antidote.

Poisons are very easy to make, and you can hardly develop antidote. "

"I understand, you mean that this is like a mathematical formula. It seems very simple, but it is difficult to find the answer." Qian Jianyuan interpreted it with a smile.

Wu Haowen nodded and said, "You can understand it this way."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like