Super-brain hacker

Chapter 539 Elliptic Curve Algorithm

In Guang Yongyuan's office, it was quiet, and only the occasional sound of fingers tapping on the keyboard could be heard.

Guang Yongyuan stood behind Lin Hong with a surprised and excited face.

Lin Hong's performance shocked him and raised an expectation at the same time.

This expectation is not because if Lin Hong cracks it, his company will not have to suffer losses this time, but because he can witness the sense of honor of a cracking master cracking a game.

If Lin Hong can really crack it, it means that his level is likely to reach the master level.

Guang Yongyuan is like an ashes-level star chaser at this moment, listening to a singer singing with excitement. If Lin Hong can sing this song, it means that he is a world-class emperor superstar!

Imagine the madness of those fans to understand Guang Yongyuan's mood at this moment.

The cracking all the way forward is very smooth, which is understandable. After all, Lin Hong has studied this process before.

Now, he has come to the key point of the whole crack, and the speed has gradually slowed down.

Lin Hong pressed the debugging key step by step, and a window on the display displayed the variable name and corresponding values of the current program in memory, which constantly changed with his actions.

was originally a hexadecimal machine code, which was directly translated into assembly code by decompiled software.

Lin Hong kept pressing dozens of times, and finally found that he had returned to his original place, and his eyebrows frowned.

Guang Yongyuan, who had been silent, asked softly at this time, "What's wrong?"

Lin Hong said, "It's okay. I've encountered a counter-cracking trap."

After all, the decompilation software is dead. It can only be translated according to specific rules, and some experienced programmers will specially carry out anti-crack settings. They will deliberately set some invalid variables to interfere with the line of sight, and even directly let your tracking software die, making the tracking impossible to continue.

The anti-cracking trap encountered now is a very advanced technology. It is very confusing, and it is generally difficult to find, even if it is found. It also takes a lot of time to analyze them one by one.

However, this is not difficult for Lin Hong.

He "copied" the code directly into the superbrain system through his eyes, and then deduced and simulated it. The real entrance was found in a few seconds.

Then, he modified two of the addresses by debugging the software, decompiled them, and the code was completely different.

Guang Yongyuan opened his mouth in surprise, but he didn't ask in the end.

He couldn't understand at all how Lin Hong took this step. In his eyes, there is no problem with this code. If you want to find out the entrance, you must follow it at breakpoints at every step. However, when he saw Lin Hong, he just stared at the monitor for a while, and then found it accurately.

What the hell is going on?

Guang Yongyuan told himself that it must be a coincidence.

However, it can be regarded as a coincidence once, but then this happens one after another.

I have to say. Hero Invincible has indeed invested a lot of energy in this regard, and anti-cracking traps can be seen everywhere.

Guang Yongyuan finally decided that Lin Hong was not lucky before, but really had the ability to accurately find out the entrance of the anti-cracking trap just by mental arithmetic.

"Is this the master?" Guang Yongyuan asked himself.

Before, he couldn't understand. Why do people say that to become a master, in addition to time, perseverance and diligence, he also needs talent? At this moment, he finally has a deep understanding.

At this time, Lin Hong came to an important juncture again.

He looked back at Guang Yongyuan and said, "No wonder it's so difficult to crack. It turned out that the ECC encryption algorithm was used."

ECC encryption algorithm, that is, elliptic curve encryption algorithm.

In fact, encryption algorithms can eventually be attributed to mathematical problems. Many encryption algorithms are invented based on mathematical problems that have not been solved so far. The encryption algorithm is not safe, and it is directly linked to whether this mathematical problem has been solved or not.

The principle of the elliptic encryption algorithm is the same. The problem is: given a prime number P and an elliptic curve E, for Q=kP, find a positive integer k less than p when P, Q is known.

can prove that it is easier to know k and P to calculate Q, while it is difficult to calculate k by Q and P. So far, there is no effective way to solve this problem. This is the principle of elliptic curve encryption algorithm.

The elliptic curve public key system is a strong competitor to replace RSA. Compared with RSA, this algorithm also has the advantages of higher security, small computing capacity and small storage space, so it is very widely used.

As an industry insider, Guang Yongyuan naturally knows a lot about some well-known algorithms. Although he was psychologically prepared, he was shocked after hearing Lin Hong's words. After all, the ECC encryption algorithm is too famous and complicated.

The original hope of Guang Yongyuan was suddenly dashed again.

No wonder so many people can't crack this game. It turns out that the key lies in this ECC algorithm.

He has almost no hope for Lin Hong's crack this time.

I just wanted to say something to comfort Lin Hong, saying that he could understand even if he couldn't crack it, but before he could say it, Lin Hong spoke again.

"What? It's a little interesting! I didn't expect that there was a Rijndael encryption algorithm hidden in it.

Guang Yongyuan was completely stunned this time.

Ri what algorithm?

What kind of algorithm is this? There has never been any information about this algorithm in his mind.

At this time, he realized and couldn't help asking, "You... saw the second algorithm so soon?"

Lin Hong smiled and said, "Although the elliptical encryption algorithm is complex, they have not played its role well."

In Lin Hong's opinion, as long as they give full play to the elliptic encryption algorithm, if others want to crack it, the difficulty can definitely be doubled again. There is no need to add this Rijndael algorithm later, which is simply a bit of a snake.

Guang Yongyuan asked, "What algorithm did you just talk about... Lin Hong spelled the name of the algorithm again, and Guang Yongyuan quickly wrote it down on paper with a pen.

Finally, he confirmed that he had never been in contact with it before, which was very strange.

Lin Hong explained: "This algorithm is an implementation of the AES standard. They use one of the smaller versions, only 52 bits, which is a symmetric algorithm... It was first developed by Belgian computer scientists and later selected by the National Institute of Standards and Technology as the U.S. government's encryption standard. Encryption algorithm replaces the early data encryption standard DES.

Just when Guang Yongyuan marveled in his heart that Lin Hong knew these encryption algorithms, and the allusions came by hand, he heard Lin Hong suddenly say:

"It's done. It actually took 33 minutes. I'm sorry, I accidentally said something big. I thought it could be done in half an hour.

Guang Yongyuan: "..." (to be continued) RQ