Super-brain hacker

Chapter 221 Unexpected Mail

When a person focuses on doing something, the brain will automatically block other signals from the outside world. This is a subconscious action, and the person concerned can't feel the passage of time.

Lin Hong sat quietly in the corner, constantly turning the pages in his hand, and occasionally counting something on the manuscript paper. The people around him came and left.

"Ding..."

With the ringing of the bell, Lin Hong raised his head from the sea of books and found that the surroundings were empty.

"The ringing just now was the bell to close the library?"

Lin Hong was surprised. He took out his calculator and looked at the time and found that it was already 4:30 p.m.

Lin Hong looked at the book in his hand, and there was about half of the content left. This was the last one. He looked at the page number and then closed it.

Put the other books back in place, and then take the last unread RSA Encryption Algorithm to the borrowing place. After completing the formalities, I went home.

The encryption algorithm is really a very fascinating field. Lin Hong was addicted to seeing the afternoon directly from the morning, forgot to eat lunch, and did not go to the afternoon class.

However, he did not regret it. He gained a lot today. Only now did he find that there was such a field closely related to computers in mathematics. It can be said that the emergence of computers has given cryptography an application foundation and a soil for growth.

Many major research results in this field have made breakthroughs only after the emergence of computers.

No modern algorithm can bypass the tool of the computer. In the past, those classical encryption algorithms have completely lost the meaning of encryption with the emergence of computers. It only takes a few minutes for an ordinary configured computer to directly crack the most complex encryption algorithms.

Lin Hong is equivalent to systematically learning cryptography this time. Not only has the context of cryptography been clarified, but the popular encryption algorithms have also been thoroughly studied. In addition to the "RSA algorithm", there are still some contents that have not been read, and the rest have been fully understood and remembered.

Although today is the first time he has come into contact with this content, he can now confidently say that he has mastered all the content.

Actually. Lin Hong was also a little surprised by this.

He realized that he seemed to have an amazing understanding of such algorithmic theory or mathematical problems. He felt this when he studied the encryption algorithm last time.

What is very complicated in the eyes of others, it takes a long time to learn repeatedly to understand, but he can often understand it easily.

Is this also your own special ability?

As he gets older, he finds himself more and more different from others.

This situation should be caused by my brain injury when I was a child.

For this reason, he has also searched the library and the Internet for this information, and there are indeed some reports that some people have suffered brain injuries. Later, the ability of a certain aspect was particularly prominent.

Lin Hong speculated that the reason why his brain became more and more useful was probably due to some strange changes.

In a word, this change is a good thing, not a bad thing. It's better to be smart than to become a fool. Lin Hong is still very happy with this result. Except for his inability to sleep and frequent headaches, there seems to be no other side effects. And the headache gradually eases as you practice the three-set. After finally breaking through the dark stage, it completely disappeared.

On the way back, Lin Hong kept thinking about how to apply the encryption algorithm he had mastered to his new version of communication software.

After dinner, he returned to his room. Lin Hong first finished reading the remaining half of the book.

After reading it, he also has a solution to the encryption of software information in his mind - the RSA algorithm is the encryption algorithm he is looking for.

The RSA algorithm was proposed by Ronald Levister, Adi Samor and Leonard Adman in 1977. At that time, all three of them worked at the Massachusetts Institute of Technology, and the name RSA was composed of the initial letters of their surnames.

In 1983, the Massachusetts Institute of Technology applied for a patent for the RSA algorithm in the United States.

But interestingly, before MIT applied for a patent, the three mathematicians made the algorithm public to the world in advance, so many countries did not recognize MIT's patent.

The reason why these three people did this was not because the Massachusetts Institute of Technology did not give them a bonus, but because they thought. Cryptography should not be monopolized by the government for a long time, but should be open to all ordinary people.

Since ancient times, all encryption methods invented by scientists have been listed as highly confidential by the government. In fact, before the RSA algorithm was published, British mathematicians had proposed similar encryption algorithms in internal documents, but they were listed as highly confidential by the British government.

The inventor of RSA believes that "if it is just because of a technology, it may be used by criminals. It is very stupid to ban it indiscriminately."

For example, gloves are used to protect hands, but gloves can also be used by criminals to rob banks without leaving fingerprints. Similarly, "cryption" is a technology for data protection. This is similar to gloves, and the difference is that cryptography prevents the FBI from eavesdropping. And the gloves used by criminals also make the FBI's fingerprint analysis work.

So, when they invented the RSA algorithm, they were worried that the government would list the encryption algorithm as a secret again, so that ordinary people would not enjoy this result, so they rushed to publish the details of this encryption technology before the government issued relevant orders, just like their peers around the world announced the details of this encryption technology.

When Lin Hong saw their story, he admired their hacking spirit, which is the real hacking spirit, sharing, openness and freedom.

Originally, when Lin Hong wrote the new version of the communication software, he had a big concern in his mind, that is, criminals may also use this software to communicate with each other, so as to avoid the monitoring of government agencies. He was worried that he would indirectly become an accomplice to criminals, so he still had some hesitation and obstacles in his heart.

But when he saw the ideas conveyed by the inventor of RSA, he immediately abandoned the ideological burden and conceived his new software without any psychological burden.

The reason why Lin Hong chose the RSA algorithm as the encryption algorithm of this software is that this algorithm is not only safe enough, but also allows data encryption and decryption transmission between two individuals who have not been connected before. This is exactly what he needs at present.

RSA algorithm is an asymmetric encryption algorithm based on a mathematical theorem, that is, factor decomposition of a maximum integer, that is to say, the more difficult it is to decompose a maximum integer, the more reliable the RSA algorithm will be. As long as this mathematical theorem is not conquered, the RSA algorithm is safe enough.

In cryptography, there are two encryption algorithms, one is symmetric encryption algorithm, and the other is asymmetric encryption algorithm, also known as public key encryption.

In symmetric encryption technology, the same key is used for the encryption and decryption of information, that is to say, one key opens a lock.

This encryption method can simplify the encryption process. It is unlocked with the same key, but it is not safe enough. As long as the key is stolen by someone else, the lock may be opened by it.

In asymmetric encryption algorithms such as RSA, both sides of the information exchange have two keys, one is public for encryption, and the other is privately reserved for decryption.

When A transmits information to B, A's private key can be used to encrypt information, and B can use A's public key to decrypt, which can ensure that the third party cannot impersonate A to send information. At the same time, when A transmits information to B, it encrypts the public key of B and sends it to B, and I can't eavesdrop on the communication between the two.

Lin Hong felt that this encryption algorithm seemed to be tailor-made for his own software. Excited, after reading the book RSA Encryption Algorithm, he immediately turned on the computer.

First of all, I habitually logged in to the CQCQ software and EMAIL client to check the message.

Felice left him a few words, saying that she didn't know why the CQCQ software had been logged in before, but it was later recovered.

Lin Hong left her a message explaining the situation. This is because the server has been relocated, so she can't log in for a while.

This is the defect of this server-side and client-side architecture, which is extremely unstable. I believe that it can be completely solved after it launches a new version.

There was a new email in the mailbox, which was sent to him by LINUS. He felt very strange why the other party did not leave a message directly on CQCQ.

Lin Hong clicked it while drinking water.

"Puff--"

The water in his mouth just spewed out immediately. If he hadn't adjusted the direction in time, the water in his mouth would have been sprayed directly on the monitor.

"No way?"

When Lin Hong saw the content of the email, he immediately couldn't laugh or cry - LINUS's pursuit of his favorite girl failed this time!

The reason why Lin Hong sprayed water was not this, but that LINUS was devastated and decided to temporarily suspend school and go to military service.

Finland is a small country with a universal military service system. All Finnish men, as long as they have reached the prescribed age and are not physically disabled, whether they are stars or civilians, must serve for three months of military service.

LINUS regretted to tell Lin Hong that he would temporarily stop the LINUX project and let Lin Hong continue to develop alone if he had time. He waited until he finished his military service. After sending this email, he had already left the school with his bag on his back.

Lin Hong sighed and returned an email to him, hoping that the other party could recover from the emotional blow as soon as possible.

After replying to the email, he officially began to write the code of the new version of the communication software. ( To be continued) RQ