Chapter 539: Elliptic Curve Algorithm
readx;
In Guang Yongyuan's office, it was quiet, and only the occasional sound of fingers tapping on the keyboard could be heard. Pen "Fun" Pavilion www.biquge.info
Guang Yongyuan stood behind Lin Hong, his face surprised and excited.
Lin Hong's performance shocked him very much and raised a kind of expectation at the same time.
This expectation is not because if Lin Hong cracks it, their company will not have to suffer losses this time, but because they can witness the sense of honor of a cracking master cracking a game.
If Lin Hong can really crack it, it means that his level is very likely to reach the master level.
Guang Yongyuan is like a hardcore star chaser at the moment, listening to a singer singing with excitement, if Lin Hong can sing this song, it means that he is a world-class emperor superstar!
Imagining the madness of those fans can understand Guang Yongyuan's emotions at the moment.
The cracking all the way ahead was very smooth, which is understandable, after all, Lin Hong had studied this process before.
Now, he has come to the key point of the whole crack, and the speed has gradually slowed down.
Lin Hong pressed the debug button step by step, and a window in the monitor displayed the variable names and corresponding values of the current program in memory, constantly changing with his movements.
The machine code, which was originally in hexadecimal format, was directly translated into assembly code by the decompiler software.
Lin Hong continued to press dozens of times, and finally found that he was back in the same place, and his brows furrowed.
Guang Yongyuan, who had been silent, asked softly at this time, "What's wrong?" ā
Lin Hong said: "It's okay, I've encountered an anti-cracking trap." ā
Decompiling software is dead after all. Translations can only be done according to specific rules, and some experienced programmers will deliberately set up some invalid variables to interfere with the line of sight, or even let your tracking software die so that tracking cannot continue.
Anti-cracking traps like the ones encountered now are very advanced technologies. It's very confusing, and it's usually hard to spot, even if it's found. It also takes a lot of time to analyze them one by one.
However, this is not difficult for Lin Hong.
He "copied" this code directly into the superbrain system through his eyes, and then performed a deduction simulation. In a matter of seconds, the real entrance to it was found.
Then, by debugging the software, he modified two of the addresses, recompiled them, and the code was completely different.
Guang Yongyuan opened his mouth in surprise, but in the end he still didn't ask.
He couldn't understand how Lin Hong did this step at all. In his eyes, this code is completely fine, and in order to find out the entrance, it must be traced at every step. But he saw that Lin Hong was just staring at the monitor for a while, and then he found it accurately.
What's going on here?
Guang Yongyuan told himself that it must be a coincidence.
However, once it could be considered a coincidence, then it happened one after another.
I have to say. "Heroes of Invincible" has indeed put a lot of effort into this, and anti-cracking traps can be seen everywhere.
Guang Yongyuan finally determined that Lin Hong was not luck before, but really had the ability to accurately find out the entrance to the anti-cracking trap just by relying on mental arithmetic.
"This is the master?" Guang Yongyuan asked himself.
Before, he had not been able to understand. Why do you say that to become a master, in addition to time, perseverance and diligence, you also need talent, at this moment, he finally has a deep understanding.
At this time, Lin Hong once again came to an important juncture.
He glanced back at Guang Yongyuan and said, "No wonder it's so difficult to crack, it turns out that the ECC encryption algorithm is used." ā
ECC encryption algorithm, i.e., elliptic curve encryption algorithm.
In fact, encryption algorithms can ultimately be boiled down to mathematical problems, and many encryption algorithms are based on mathematical problems that have not been solved so far. The encryption algorithm is not secure, and it is directly related to whether the mathematical problem is solved or not.
The principle of elliptic encryption algorithm is also like this, the problem is as follows: given the prime number p and the elliptic curve e, for q=kp, the positive integer k less than p is found when p,q is known.
It can be proved that it is easy to calculate q from k and p, but it is more difficult to calculate k from q and p, and there is no effective way to solve this problem, which is the principle of elliptic curve encryption algorithm.
The elliptic curve public key system is a strong competitor to replace RSA, and compared with RSA, this algorithm also has the advantages of higher security, less computational and less storage space, so it has a very wide range of applications.
As an industry insider, Guang Yongyuan is naturally very familiar with some well-known algorithms. Although he had been mentally prepared, after hearing Lin Hong's words, he was still shocked, after all, the ECC encryption algorithm is too famous and too complicated.
Guang Yongyuan's originally rising hope was suddenly shattered again.
No wonder so many people can't solve this game, it turns out that the key lies in this ECC algorithm.
He almost didn't have much hope for Lin Hong's crack.
I just wanted to say something to comfort Lin Hong, saying that even if he couldn't crack it, it would be understandable, but before he could say anything, Lin Hong spoke again.
"Huh? It's kind of interesting! Unexpectedly, there is also a rijndael encryption algorithm hidden in it. ā
This time, Guang Yongyuan was completely stunned.
What algorithm?
What is this algorithm? In his mind, there was never any information about this algorithm.
At this time, he reacted and couldn't help but ask in a daze: "Are you...... Seeing the second algorithm so soon? ā
Lin Hong smiled and said, "Although the elliptical encryption algorithm is complex, they don't play its role well. ā
In Lin Hong's view, as long as they give full play to the elliptical encryption algorithm, if others want to crack it, the difficulty can definitely be doubled again, and there is no need to add this rijndael algorithm to the back, which is a bit of a snake.
Guang Yongyuan asked, "What algorithm did you just say?" ā
ār-iā¦ā¦ā
Lin Hong spelled the name of the algorithm again, and Guang Yongyuan hurriedly wrote it down on paper with a pen.
Eventually, he confirmed that he had never been in contact with him before, and that he was very unfamiliar.
Lin Hong explained: "This algorithm is an implementation of the AES standard, and they use a smaller version of it, only 52 bits, which belongs to the symmetric algorithm ......."
Rijndael was first developed by Belgian computer scientists, and was later selected by the National Institute of Standards and Technology as the encryption algorithm of the U.S. government encryption standard, replacing the earlier data encryption standard DES.
Just as Guang Yongyuan was amazed in his heart that Lin Hong knew these encryption algorithms well, and the allusions came easily, he heard Lin Hong suddenly say:
"That's it. It took thirty-three minutes, I'm sorry, I accidentally said a big thing, I thought it would be done in half an hour. ā
Guang Yongyuan: "......" (to be continued)