I really just want to be a scholar

Chapter 631 New task of artificial intelligence, and the reappearance of Mr. Q!

Chapter 631 New task of artificial intelligence, and the reappearance of Mr. Q!

Considering that Chen Ming and Chen Lan were both in the car, Qin Ke didn't say any more, just closed his eyes and rested in the car, thinking about how to solve the problem raised by Uncle Yang.

Suddenly, a system notification sounded in my ear:
"Ding! You have a new mission to learn God!"

"Ding dong! The task of learning the gods is updated with a special task 'It's time for artificial intelligence to show its due power'!"

"⑤[Special Task] It's time for artificial intelligence to show its due power: Your artificial intelligence level has been raised to LV3, and you already have qualified intelligence. Please assist Xia Guo to realize the security of the Lime operating system within 48 hours. Let’s make a great leap forward, and use artificial intelligence to successfully resist and repel this international cyber attack!”

"Task Reward: According to the completion of the task, the S-level evaluation rewards academic points (informatics) +1000! Special branch technology-artificial intelligence experience value +1000! An additional reward is a mysterious gift bag!"

Qin Ke was startled for a moment, then overjoyed!

After two or three years, the system finally issued a new task of "artificial intelligence"!
Sure enough, I guessed right, the system will trigger the release of such special missions only when encountering relevant special events!
As long as this special task can get an S-level evaluation, informatics can be upgraded from "professional level" to "professional level", and artificial intelligence can also be upgraded from the current LV3 to LV4!
Qin Ke cheered up. Since the system tasks have completion evaluations, they can't just be satisfied with fixing vulnerabilities and intercepting international network attacks. The goal must be to get S-level evaluations, so improve the security of the Lime operating system , and to use the power of Shimmer to repel the invading enemy has become his main consideration.

Qin Ke suppressed the excitement in his heart and silently calculated.

……

The Lime operating system is the brainchild of her, Qin Ke, and Qin Xiaoke, and it is also the first scientific research result of her and Qin Ke's joint cooperation. Although she has not taken care of the follow-up operation and maintenance these years, she has no control over the operation of Lime. The system still has a special feeling.

"Mr. Q", whom Yan Weizhou placed high hopes on, had been silent all night.

This can indeed not only guarantee the performance of the Lime operating system, but also further improve the security. If the source code is not leaked, it is indeed a very good audit mechanism. From this perspective, Xiaguo's IT industry is not short of talents.

"Use this encryption software to encrypt and compress part of the source code of the security audit mechanism of the 3.5 Dragon Edition operating system and related technical documents and send it to me."

This is a rather comfortable large suite, and it is no secret that the two of them live together, so when Chen Ming and the others arrange the room, they will always arrange the big bed room by default.

After waiting anxiously for more than half an hour, he finally received an email from an unfamiliar address.

Qin Ke raised his hand and gave her a high-five. The two smiled tacitly and began to work together.

Now, the "Mr. Q" he is about to face should be such a mysterious expert.

If Longteng Zaitian's computer room hadn't adopted a top-notch firewall, and gathered all the manpower to monitor the connection status of the core server at any time, it would have been compromised by now.

What a weird email address, like a string of irregular random characters, and the suffix of the email address has never been seen before.

Ning Qingyun really didn't understand these details in detail, but she also knew that the number of digits in the key is the length of the supported password. She couldn't help being surprised: "32-bit key? How about security..."

This night was a torment for Yan Weizhou. The technical explanation in the conference room had just ended, and security experts from all over the country stayed up all night. They were urgently discussing countermeasures, but judging by the situation, they still couldn't think of anything good. method.

Ning Qingyun said unexpectedly: "You want to use a new encryption algorithm with a 512-bit or even a 1024-bit key?"

When Qin Ke said this, he turned his gaze to Ning Qingyun: "Jun'er, I believe you have studied the process of my proof of Riemann's conjecture to a great extent. Next, you need to use Riemann's conjecture, Mersenne prime numbers, The Fibonacci sequence is used to upgrade and improve the encryption algorithm of the Lime operating system. These three problems in number theory are all about the distribution of prime numbers. As long as a better algorithm is designed, a shorter key can be used. , achieving the same or even higher security than current 256-bit keys."

Qin Ke wrote "32 is greater than or equal to 256" with the mouse, then smiled and encouraged: "This is your goal, time is very tight, there are only about 40 hours left, and the new algorithm must be written within this time .I believe you can do it. In terms of number theory and algorithms, you are at the level of the Philippine Award!"

Qin Ke continued: "Uncle Yang said that during the second development of Longteng Zaitian, he improved the security audit mechanism of the operating system. Although Uncle Yang didn't know the details, I can guess that the key algorithm should be improved and changed to the last key algorithm. The mainstream is 128-bit or even 256-bit, but in this way, the review speed of the first generation of "Xiaoqing" will not be able to keep up. They must have designed a new security review mechanism that does not require the full intervention of the first generation of "Xiaoqing". It seems to be more secure, at least the length and security of the key increase exponentially. But this will also lead to greater harm caused by source code leakage.”

"Q" sent a message, followed by another lock icon software:

Yan Weizhou received Lao Yang's instructions and waited in front of his mailbox.

After hearing that such a big event had happened, Ning Qingyun couldn't help frowning slightly.

"I see." Ning Qingyun understood.

With his speed-reading ability, which is the best in the world at this time, it only takes 10 minutes to read a tens of pages of advanced mathematics papers. Although the source code passed by Yan Weizhou has hundreds of thousands of lines of code, the technical documentation is also thick. It only took about three hours for Qin Ke to read all of the two thousand pages and understand them thoroughly.

"I see, what do I need to do?" Ning Qingyun asked with her fists clenched.

The two of them took off their coats and washed their faces before sitting together. Qin Ke was mainly recounting the news he heard from Uncle Yang, while Ning Qingyun listened intently.

Since the room was arranged by Chen Ming and the others, it had already been inspected, so there was no need to worry about bugs.

The girl clenched her small fist, took out the pen and manuscript paper and said, "Leave it to me! The Riemann conjecture has been deciphered by you, and it's time for it to play a new role."

As he expected, hundreds of technicians from Longteng Zaitian did make major changes to the security review mechanism of the Lime system. The key of the security encryption algorithm was increased to 256 bits, while the network data and network connection [-]. For the review of software scheduling, only the core part is reserved and handed over to "Xiaoqing", and the rest is in charge of several customized security review software with different functions.

After sending the encrypted compressed package, Mr. Q only left a sentence: "I want to see it first, wait for my message."

Time passed by, except for a hasty dinner with Ning Qingyun, singing the birthday song and sharing the cake, Qin Ke devoted almost all his energy to this response.

……

……

Qin Ke directly sent a message and location to "Shimmer" who was far away in the Lime data center in Xiaguo via WeChat.

In terms of development ability and computer knowledge, Ning Qingyun is not outstanding, not even an ordinary graduate student majoring in computer science.At the beginning, she cooperated with Qin Ke to write the Lime operating system. She was mainly responsible for UI, interface and other appearance design parts and related code parts, and Qin Ke was responsible for all the core code parts of the operating system.

However, the attacks and intrusions from the international network have never stopped, and they have become more and more intense, making Longteng Zaitian's security team tired of dealing with them.

Qin Ke's task is heavier, and he is responsible for more parts.

Qin Ke thought for a while and said: "I haven't got the source code of the security audit mechanism of Lime OS V3.5. for you."

It's just that this more complex and better audit mechanism is more dependent on the source code itself. Once a top hacker studies the source code, it is not difficult to find targeted loopholes, thereby bypassing the security audit mechanism and directly invading the system. Internally, obtain the highest administrator privileges - if it is not for the core part and "Xiaoqing" is in charge, such an intrusion will be easier.

At this time, the logistics staff brought a hot breakfast, allowing everyone who had been busy all night to stop and rest for a while.

Lao Yang next to him came over, identified it, nodded and said, "It's Mr. Q, you can trust the software in this attachment."

The first thing he has to solve is the security of his network connection.He is now in Japan, and it is not safe to use a transnational network, and the traffic is too large and it is easy to attract attention.

"In addition to the security mechanism and protection software, computer security also has a very important part, which is the encryption and decryption algorithm. The current mainstream encryption and decryption algorithms, whether it is AES, Twofish, 3DES, RSA or Serpent, etc., or several The composite application of multiple algorithms rarely uses more than 256-bit keys for encryption, including the communication software dedicated to 'Mr. Q' developed by us. And our latest V1.0. Allows installation on older computers, using only 32-bit keys."

The software opens automatically, and the contact person only has a profile picture of "Q".

"Okay, you say."

Although it will be troublesome and resource-consuming, the security level is the highest. There is no company or organization in the world today that can intercept and crack, or even notice these scattered data packets that look like useless information on the surface.

With the new algorithm of 32-bit key, to achieve the security effect equal to or even surpass the current mainstream algorithm of 256-bit key?

Qin Ke is not a top hacker, but his informatics level is by no means inferior to any doctoral student majoring in computer science in the world, and he is proficient in all fields.

Two minutes later, another "twilight" in the laptop automatically opened a new command window, and prompted: "Master Qin Ke, a secure encrypted dedicated channel has been established."

"There is also this anti-intrusion software, which monitors network anomalies and prevents someone from intruding on this computer. You'd better install it on all public computers that may be intruded."

The night was getting deeper and deeper, and it was dawn the next day in a blink of an eye.

The matter is of great importance. Yan Weizhou personally operated the computer, downloaded the attachment in the email, but had to enter the password to run it. It was Lao Yang who took the keyboard and entered the pre-agreed password, and soon an unknown mysterious software was automatically installed. Yes, there was no hint at all during the period, and "Xiaoqing", the core of the operating system, did not make any interception actions.

He has never heard of "Mr. Q", but he also knows that there is indeed a team of experts with only code names, never showing up, and mysterious identities. They are all weirdos with top strength in the industry.These mysterious experts will not appear as unsung heroes in news reports, but they can often be seen faintly in the country's advanced fields.

Half an hour later, the two returned to the hotel they had arranged in advance, walked into the room and closed the door.

However, after experiencing the development work of "Qiguang EDA", Ning Qingyun has also gained a lot of experience in development, especially in advanced software algorithm methods, and is also very familiar with code development through "Lime Smart Programming". At this time, he is confident that he can still played a lot of role.

This is a secure and encrypted dedicated channel established with the help of more than 1000 high-performance servers in the Lime Data Center. All instructions and messages sent by Qin Ke on his laptop will be broken into tens of thousands or even hundreds of thousands of encrypted data packets and sent back After arriving in Xiaguo, after several transfers, they were aggregated to the Lime Data Center, and Xiaoguang re-deciphered the combination with huge computing resources.

Seeing Lao Yang next to him nodding, Yan Weizhou immediately ordered the technicians to do the same.

……

And Ning Qingyun was the same, immersed in writing and calculating on the table, even forgot to drink tea.

In order for Ning Qingjun to understand better, Qin Ke turned on the drawing function of the notebook, and directly used the mouse to draw while explaining: "No matter how to fix the problem of the current security review mechanism, there is one thing that must be done, and it is the easiest If it takes effect, that is the improvement of the algorithm.”

This is not difficult to understand. After all, it is very difficult to understand the current security audit mechanism in one night, let alone propose a solution to the current problem.

Ning Qingyun was taken aback by Qin Ke's goal, and immediately became blazing with fighting spirit.

He quickly thought of several countermeasures, and began to refine them one by one, judging the most suitable and best solution to the problem.

"Security is not a problem, because the core of its security mechanism is the artificial intelligence 'Xiaoqing', there is 'Xiaoqing' to conduct security audits, 32-bit keys are enough, even if the source code is leaked, it is difficult to bypass the 'Xiaoqing' Qing' directly exploits and invades the operating system."

And Qin Ke can directly connect back to the Lime data center through the encrypted dedicated channel, which is equivalent to being in China, so he doesn't have to worry about the security of the transnational network.

He quickly logged into Mr. Q's dedicated encrypted mailbox, encrypted the specially written communication software and sent it to President Yan Weizhou's mailbox.

However, Qin Ke has long wondered how to achieve a safe connection in case of emergencies when going abroad, especially the "twilight" has been upgraded to LV3 - the low light of LV3 has surpassed most of the artificial intelligence in the world, even if it is not as good as Google's "Alpha Dog" is definitely closer. If it can be upgraded to LV4, it will not be a problem to surpass "Alpha Dog".

After Qin Ke got the source code and technical documents, he began to concentrate all his energy on speed-reading ten lines at a glance.

Qin Ke shook his head: "The new encryption algorithm using a 512-bit or even 1024-bit key is too cost-effective, and it cannot be promoted on ordinary computers within ten years. Because the longer the key, the more difficult it is to implement, and the calculations required for encryption and decryption The more resources there are, the 128-bit key and 256-bit key are currently the best value for balancing computer performance and security.”

Not to mention that this is very likely to affect Xia Guo's information security lifeline for the next decade or even decades.

But Qin Ke lowered his voice.

"President, let's have breakfast first." The secretary personally brought the breakfast to Yan Weizhou.

Lao Chen's secretary Chu Shumin and Lao Yang's secretary Lu Xinping also brought breakfast to their bosses.

But the three of them had no thoughts or appetites, and they just forced themselves to eat a little casually.

At this moment, there was a commotion in the conference room.Lao Yang, Lao Chen, and Yan Weizhou raised their heads at the same time, and the scene in front of them shocked them all.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like