Chapter 221: Accidental Mail

readx;

When a person focuses on doing a certain thing, the brain automatically blocks other signals from the outside world, which is an action made subconsciously, and the person does not feel the passage of time. Pen, Fun, Pavilion www.biquge.info (""Net")

Lin Hong sat quietly in the corner alone, constantly turning the pages of the book in his hands, and occasionally calculating something on the manuscript paper without listening. The people around him, came and went.

"Ding......

As a bell rang, Lin Hong raised his head from the sea of books and found that the surroundings were empty.

"That bell just now is the library closing bell?"

Lin Hong was surprised, took out the calculator and looked at the time, and found that it was already half past four in the afternoon.

Lin Hong looked at the book in his hand, there was still about half of the content left, this was already the last one, he looked at the page number, and then closed it.

I put the other books back where I was, then walked to the borrowing desk with the last unfinished copy of RSA Encryption, and after completing the formalities, I went home.

Encryption algorithms are really a very fascinating field, Lin Hong was addicted to seeing the afternoon directly from the morning, and even forgot to eat lunch, and did not go to the afternoon class.

However, he did not regret this, and he had gained a lot of money in the day today, and he did not realize until now that there is such a field in mathematics that is closely related to computers. It can be said that the emergence of computers has given cryptographic cryptography an application foundation and a soil for growth.

Many of the major research results in this field were made after the advent of computers.

Any modern algorithm can not bypass the computer as a tool, the previous classical encryption algorithms, with the emergence of the computer has completely lost the meaning of encryption, an ordinary configuration of the computer only takes a few minutes to directly crack the most complex encryption algorithm.

Lin Hong is equivalent to learning cryptography systematically this time, not only clarifying the ins and outs of cryptography, but also thoroughly studying the popular encryption algorithms, except for the "RSA algorithm", there is still a part of the content that has not been read, and the other content is fully understood and remembered. (ใ€Šใ€‹็ฝ‘)

Although today was his first exposure to the content, he can now confidently say that he has mastered it all.

In fact, Lin Hong was also a little surprised by this.

He noticed that he seemed to have an astonishing understanding of such algorithmic theories or mathematical problems. He felt this last time he was working on encryption algorithms.

What is very complex in the eyes of others requires a long period of repeated study to understand, but he can often understand it easily.

Could it be that this is also my special ability?

As he grew older, he found himself more and more different from others.

This situation is probably caused by an injury to my brain when I was a child.

For this reason, he also went to the Diagram 9 astronomical network to find information content in this regard, and indeed some reports recorded that someone suffered a brain injury, which later led to a certain aspect of the ability to be particularly prominent.

Lin Hong speculated that the reason why his brain is getting better and better is probably because of some strange changes because of that time.

In short, this change is a good thing, not a bad thing, it is better to be smart than to be stupid, Lin Hong is still very happy with this result, except for his inability to sleep and frequent headaches, there seem to be no other side effects. The headache gradually alleviated as I practiced the three-body pose, and finally disappeared completely after breaking through the dark energy stage.

On the way back, Lin Hong kept thinking about how to apply the encryption algorithm he had mastered to his new version of the communication software.

After dinner, when he returned to his room, Lin Hong first took the remaining half of the Nine Astronomy books)

After reading it, he also had a solution to the encryption of software information in his mind - the RSA algorithm was the encryption algorithm he was looking for.

The RSA algorithm was proposed in 1977 by Ronald Leevest, Adi Samor, and Leonard Aardman, all of whom were working at the Massachusetts Institute of Technology (MIT).

In 1983, the Massachusetts Institute of Technology (MIT) patented the RSA algorithm in the United States.

But interestingly, before MIT applied for a patent, the three mathematicians made all the details of the algorithm available to the world in advance, so many countries did not recognize MIT's patent.

The three men did this not because MIT didn't give them a prize, but because they believed that "cryptography" should not be monopolized by the government for a long time, but should be open to all ordinary people.

Since ancient times, all encryption methods invented by scientists have been classified as highly secret by the government, in fact, before the RSA algorithm was published, British mathematicians had proposed similar encryption algorithms in internal documents, but they were classified as highly classified by the British government.

According to the inventors of the RSA, "it would be foolish to ban a technology indiscriminately just because it could be exploited by criminals".

For example, gloves are used to protect hands, but gloves can also be used by criminals to rob banks without leaving fingerprints, similarly, "cryptography" is a kind of data protection technology, which is similar to gloves, the difference is that "cryptography makes the FBI unable to eavesdrop, and the gloves used by criminals also make the FBI's fingerprint analysis useless." โ€

So, when they invented the RSA algorithm, they were worried that the government would keep the encryption algorithm secret so that ordinary people could not enjoy the results, so they preempted the relevant orders from the government, just like their counterparts around the world announced the details of this encryption technology.

When Lin Hong saw their story, he expressed his admiration for their hacker spirit, which is the real hacker spirit, sharing, openness, and freedom.

Originally, when Lin Hong wrote the new version of the communication software, he had a relatively big concern in mind, that is, criminals may also use this software to communicate with each other, so as to evade the surveillance of government agencies on their contacts. He was worried that he would indirectly become an accomplice to the criminals, so he still had some hesitation and obstacles in his heart.

However, when he saw the ideas conveyed by the inventor of RSA, he immediately threw away his mental baggage and conceived his new software without any psychological burden.

Lin Hong chose the RSA algorithm as the encryption algorithm for this software because it is not only secure enough, but also allows data encryption and decryption between two previously unconnected individuals. That's exactly what he needs right now.

The RSA algorithm is an asymmetric encryption algorithm based on a mathematical theorem, that is, the more difficult it is to factorize a very large integer, the more reliable the RSA algorithm is. As long as this mathematical theorem is not overcome, the RSA algorithm is safe enough.

In cryptography, there are two types of encryption algorithms, one is symmetric encryption and the other is asymmetric encryption, also known as public-key encryption.

In symmetric cryptography, the same key is used to encrypt and decrypt information, which means that one key opens one lock.

This encryption method simplifies the encryption process and uses the same key to open the lock, but it is not secure enough that the lock can be opened if someone else steals the key.

In asymmetric encryption algorithms such as RSA, both sides of the information exchange have two keys, one is public and used for encryption, and the other is kept privately for decryption.

When A transmits information to B, A's private key can be used to encrypt the information, and B can use A's public key to decrypt it, so as to ensure that a third party cannot impersonate A to send information; At the same time, when A transmits information to B, it is encrypted with B's public key and sent to B, and B then decrypts it with his own private key, so as to ensure that a third party cannot eavesdrop on the communication between the two people.

Lin Hong felt that this encryption algorithm was simply tailor-made for his own software, and in his excitement, he immediately turned on the computer after reading the book "RSA Encryption Algorithm".

First of all, I habitually logged in to the CQCQ software and the email client to check the messages.

Phyllis left him a message and said a few words, saying that he didn't know why the cqcq software couldn't be logged in before, but then it got better.

Lin Hong left a message for her to explain the situation, this is because the server side has been relocated, so she can't log in for a while.

This is the flaw of this server-side and client-side architecture, which is extremely unstable, and I believe that when he launches a new version, he will be able to solve this problem completely.

There was a new email in the mailbox, which turned out to be sent to him by Linus, and he wondered why the other party didn't leave a message directly on CQCQ.

Lin Hong clicked on it while drinking water.

"Poofโ€”"

The water that he had just drunk in his mouth suddenly squirted out, and if he hadn't adjusted the direction in time, the water in his mouth would have sprayed directly onto the monitor.

"Won't it?"

Lin Hong couldn't laugh or cry when he saw the content of the email-linus's pursuit of the girl he liked this time failed!

The reason for Lin Hong's squirting was not this, but that Linus was disheartened by the blow and decided to temporarily suspend his studies and go to military service instead.

Finland is a small country with universal military service, and all Finnish men, as long as they reach the required age and have no physical disabilities, whether you are a celebrity or a civilian, must serve three months of military service.

Linus regretfully told Lin Hong that he would stop the Linux project for the time being, and let Lin Hong continue to develop it alone if he had time, and wait until he finished his military service.

Lin Hong sighed and sent him an email back, hoping that the other party would recover from the emotional blow as soon as possible.

After replying to the email, he officially started to write the code for the new version of the communication software.