Chapter 237: Invisible Confrontation
Although the branches of the Human Alliance are growing rapidly around the world, the Netherworld is still very strict about these branches.
For example, the second review of new members, the restriction of biological computer permissions, and the quota of new humans in each region are very strict.
In addition, they don't dare to be too blatant in their activities now, and the branch personnel who have the second-level maternal copy authority of the cell chip will generally not exceed three.
Each new member can only be personally reviewed and implanted by the second-level female parent holder, and the guy in question directly manipulates the body with a biological computer.
Usually these guys don't end up very well, and they are either replaced, killed, or missing.
……
The cyber security center city of Nanke Dream World.
This is the front line of the battle between the Netherworld and the G Organization and other forces, and this is one of the institutions that was established in the virtual network world since its birth.
In particular, after Huang Mingzhe knew that Organization G had mature quantum computer technology, he personally led this organization and has been fighting against the quantum world of Organization G.
From the original generation of 4096-bit super-digital encryption algorithm quantum key technology artificial intelligence.
To the mid-term million-bit second-generation super-digital encryption algorithm, quantum key technology, artificial intelligence.
and then to the 10 billion third-generation super-digital encryption algorithm, quantum key technology, artificial intelligence, and biological computers currently in use.
The super-encryption algorithm itself was developed by Huang Mingzhe in order to fight against quantum computers, and quantum computers are not omnipotent, because all cryptography is born based on mathematics.
Huang Mingzhe didn't know what kind of quantum algorithm was used by the G organization, but it could still be estimated on a large scale, so he set up a special "super-number encryption algorithm".
The first generation of the "super-digital encryption algorithm" consists of four mathematical problems, each of which randomly occupies 1024 keys, plus these four mathematical problems are not solved by the modern mathematical community, and they are the types of mathematical problems that quantum computing is not good at.
Even if Organization G had a million-qubit quantum computer, it would still take more than 20 years to crack the key to the first generation of "super-encryption algorithms".
Moreover, at the beginning of that year, the key of the virtual world was changed once a week, and the key of the ordinary computer network was only changed every three months.
It is precisely this kind of strict defense that has allowed Organization G and other forces to never break through the virtual network.
With the passage of time, the network security center city is constantly updating network security technology.
The third-generation "super-number encryption algorithm" currently in use can be said to be at the perverted level, consisting of a total of 12 mathematical problems, each of which has a random number of more than a billion keys, and a total of more than 12 billion keys. あ七^八Chinese ヤ~(8)~1~ωωω.7\8z*òм
Plus other quantum cryptography technology, biological computer technology, artificial intelligence technology.
From the beginning of the fierce pursuit, the G organization has basically given up the idea of network intrusion.
If Huang Mingzhe hadn't known in advance that the G organization had a mature quantum computer, he might have been overshadowed by the G organization.
But a top mathematician who is wary of it, or an all-round scientist, wants to set up a targeted anti-quantum computing firewall, but it is not easy to get his hands on it.
However, the quantum world of Organization G cannot invade the virtual world of Netherworld, and Netherworld is a virtual world, and it cannot invade the quantum world.
The two are distinct, and they do not get along with each other.
The current network pattern is a virtual network, a new human intranet, the Internet, and a quantum world.
Among them, the virtual network has covered 34% of the world's regions, and the Internet occupies 66% of the area.
The new human intranet, which is a biological computer network that belongs exclusively to the new human, has no way for ordinary people to log in.
The quantum world is the internal network of the G organization, and it is also an open area for people and forces outside the G organization.
……
The gaze returned to the Chang V-E, which was launched on September 1.
Qiongzhou Wenchang Space Center.
"Report, the probe has entered the gravitational slingshot stage, please pay attention."
"Roger, auxiliary engine starts, ready to correct the track."
Through the Blue Star High Orbit Communication Relay Satellite, the space center on the ground precisely controls the Diting-25 probe, and through the ignition propulsion of the auxiliary engine, it is correcting the flight trajectory.
Blue Star's gravitational slingshot flung the Diting-25 probe into lunar orbit.
This process requires precise calculations of position and time to ensure that the DiTing-25 probe is captured by the moon's gravity and pulled into lunar orbit.
Three hours later.
"Report, the probe has been captured by the gravitational pull of the moon."
"Orbital flight around the Moon has begun, and the orbit is being corrected."
"The current orbital altitude is 6840~6950 kilometers on the moon."
At the same time, in orbit more than 400,000 kilometers away from Blue Star and 65,000 kilometers from the Moon, a communication relay satellite, the Queqiao satellite, is pointing out the way forward for the Diting-25 probe.
The Queqiao satellite is a lunar communication relay satellite launched by the Space Agency last year, orbiting at the L2 point of Lagrange.
This track has a special name: "Halo Track", and the English name is Halo. In fact, such a complex orbit design also benefits from the outstanding contribution of Lagrange in orbital dynamics.
Through the communication relay of the Queqiao satellite, the ground center continues to remotely control the Diting-25 probe, approaching the moon, and the scheduled orbit of the Diting-25 probe is 850~910 kilometers from the moon.
In the midst of the tense orbit correction, more than five hours passed imperceptibly.
Finally, the Diting-25 probe successfully entered orbit and operated in orbit at 850~910 kilometers from the moon.
"Start a probe scan."
"Roger."
At this time, the Diting-25 probe was on the front side of the moon, and a stream of neutrinos swept towards the moon, and then quickly returned back.
On the front side of the moon, such as the Apollo moon landing, there is an underground base, and there are also a few underground pipelines arranged under the moon.
The virtual moon of the space command center is being built rapidly.
Gradually, the Diting-25 probe entered the orbit of the far side of the moon.
The results of the exploration of the far side of the moon are even more striking, with the number of underground bases and underground pipes and tunnels being much larger and denser than the front.
Suddenly, there was a strong interference in the data fed back by the detector, and then the model was directly interrupted.
Looking at this result, Wang Fuxing, the person in charge of the space center, had an ugly face.
Next, even the Queqiao satellite also lost contact.
More than half an hour later, NASA's official website announced a news - due to the attack of an unknown cosmic ray stream, seven satellites near the moon were affected......
Huang Mingzhe and Li Aiguo also personally went to the headquarters of the space center through the virtual network.
Putting down the report, Li Aiguo sneered: "It's really ruthless, come and kill your own satellites together." ”
"I guess it's because we're worried that we'll find out their secrets, so let's just strike first." Huang Mingzhe said as he looked at the virtual moon model that had been detected.
On the virtual model of the Moon, about 36% of the area on the front side has been explored, while less than 17% of the area on the back side has been detected.
However, Organization G definitely didn't expect that the Listening Detector had already picked up some of them.