"He asked you to attack this notebook." Xueba said.
"Oh..."
Xu Mang glanced at Makarov, saw him nodding at him, and hurriedly said to Xueba, "How far is the attack? Completely paralyzed?"
soon,
Xueba said: "It's up to you."
with me?
This...isn't it good?
Xu Mang was stunned for a moment, it seemed that this notebook was not expensive.
After getting a laptop, Xu Mang started to operate it, but soon he found a problem. The other party's laptop was difficult to hack, and it was even quite cumbersome and complicated, and it took a little time.
At this time,
Makarov started to teach. He regarded the notebook as a quantum device, and Xu Mang became the one who stole it.
It almost means to steal the content of quantum communication. Unless this laptop is taken away, it is impossible to steal any information through digital attack.
Subsequently,
Makarov described the operation mode of quantum communication in terms of secrecy. In fact, it is the same as traditional ciphers. Through algorithms and keys, the algorithm of quantum communication ciphers is actually simpler than traditional ones.
of course,
The key is not the algorithm, but the key. In quantum communication, the length of the key is N bits, and it can only be used once at a time. When the N-bit key is transmitted next time, it will be reconstructed.
The summary is N-bit length, randomness, and one-time. These three conditions are called one-time notes. It is absolutely impossible to decipher in cryptography. This law was proved by Claude Elwood Shannon.
At last,
Makarov explained a problem that the public is very confused. Quantum communication can only transmit keys, because quantum mechanics can only generate random characters, and the amount of information in random characters is zero, so the quantum channel of quantum communication cannot be used to transmit information. .
In addition, he explained many questions that the public is puzzled... For example, how to realize key distribution is to use the two principles of quantum mechanics, the principle of superposition and the principle of mutation measurement, and how to know the information after having the key, which is used XOR encryption algorithm...
Of course it's coming to an end,
Makarov told all the students present that his notebook was constructed like quantum cryptography in defense, so Xu Mang's efforts would be useless.
But...
The voice just fell,
On the huge projector screen, a photo of Xu Mang's prosperous beauty appeared.
"..."
"..."
"..."
What the hell!
Terrifying!
What's so special about this?
Everyone present looked at the photo on the curtain in bewilderment. Why did the person in the photo seem familiar.
and many more,
Isn't it him!
at this time,
Everyone came to their senses and looked at Xu Mang in horror. Didn't they say that the digital attack was ineffective?
This...
How did this work?
Makarov was also surprised. He glanced at Xu Mang and then at his notebook.
"He asked you how you did it?" the enthusiastic Xueba said.
"His computer defense system is based on the existing code language, which can only imitate the form of quantum cryptography, but the core is code..." Xu Mang shrugged, and said with great ease: "I found a loophole at random, and then Just go in."
Hearing the translation from the enthusiastic scholar, Makarov couldn't help giving Xu Mang a thumbs up.
Subsequently,
Makarov explained why Xu Mang was able to hack into the notebook. In fact, he just copied Xu Mang's words and praised him casually.
After the public lecture,
Makarov asked Xu Mang for his contact information.
at the same time,
There was a middle-aged man who was very interested in Xu Mang. He was the director of the Department of Computer Science and Technology at Fuda.
This guy,
who is it?
......
Chapter 2 Sixteen
The director of Fuda's computer science and technology department is called Xia Zhi. Recently, this director Xia was worried about the upcoming city-wide computer information security competition. One of the main contestants was hospitalized due to acute appendicitis...
This main force is quite the main force, almost taking on the role of the offensive player of the entire team.
If there is no main force, the last place must be Fuda.
at first,
Director Xia didn't want to watch any public class on quantum hacking, but a professor of computer security said that he likes to listen to the public class on quantum hacking, because he has certain hacking skills.
Therefore,
Desiring to find contestants, Director Xia came to this multimedia classroom.
result...
You'll Also Like
-
Enforcer's Handbook
Chapter 1026 7 hours ago -
Origin
Chapter 1055 7 hours ago -
Global Game: Begin With 10 Billion Psionic Coins
Chapter 1368 7 hours ago -
It Starts With A Mountain
Chapter 1052 7 hours ago -
Reincarnation in Naruto World (Reborn into Naruto World with Tenseigan)
Chapter 1446 7 hours ago -
The Divine System Draws the Sword Billions of Times (Godly Sword System)
Chapter 1230 7 hours ago -
My Iyashikei Game
Chapter 1011 7 hours ago -
Master of the Last Days (Almighty Great Master of End of the World)
Chapter 1106 7 hours ago -
Shepherding Humanity (Nurturing Humanity)
Chapter 1470 7 hours ago -
I am the Way of Heaven: Creating the Strongest Chaos World
Chapter 124 22 hours ago