Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 15 Cryptography

"Password cracking...what is that?"

Zhou Huan, who was confused, looked around and smiled at his colleagues.

Yesterday, the China Security Bureau launched an anti-espionage operation.

During this operation, the security agency agents arrested several foreign spies hidden in the country and even dug out a very deep contact information between spies.

However, just as the Security Bureau closed the network, a spy with an important identity was destroying a computer before being arrested. When the Security Bureau agent found him, the spy committed suicide in advance.

Fortunately, this computer with hidden contact information between spies was not completely destroyed. Although the computer hard drive was seriously damaged, it was eventually repaired.

Unfortunately, although the computer was repaired, the files in the hard disk were passworded.

Of course, many people know that as long as there is enough time, even in difficult passwords, there are ways to crack them.

However, the time left for the Strategic Intelligence Department is not much, and the above requirements are to crack the hard drive within three days, find contact information between spies, and prepare to catch more spies hidden in China in one fell swoop.

If it cannot be done, it will inevitably alert the enemy. At that time, the spies will be prepared and flee from China. This operation will be more than worth the loss.

Just last night, the Security Bureau invited many domestic password experts and decipher experts, and repeatedly studied, but never failed to crack the password of this hard disk.

Password experts and decipher experts regretfully said that the password on this hard disk is very special and uses several layers of encryption methods. If you want to crack it forcibly, it will take as soon as one week.

However, if it really took a week to crack it, the daylily would be cold and those foreign spies would have run away long ago. How could they catch people?

"You guys mean, let me learn to crack the password, and then, let me try to crack this computer?"

Zhou Huan looked at everyone stupidly.

"Hahahaha...jokingly, Zhou Huan, don't care."

"Well, everyone was tired last night. Just kidding, how can you really let you crack the password? Even if you can remember all the computer theory knowledge, cracking this thing is not something you can learn in a day or two."

"Yes...hey, you guys say, if we can't crack this password in three days, those spies might..."

Everyone laughed and gradually became silent again.

"Just kidding?"

Although Zhou Huan had a smile on his face, his eyes slowly narrowed, "Isn't it just cracking the password? Is it really that difficult?"

Unfortunately, Zhou Huan, who knows nothing about cryptography, can crack any passwords, let alone passwords that even professionals cannot crack. How could he crack it?

However, Zhou Huan didn't think she was really not good.

And men can't say they can't do it.

But even if he really can't do it, isn't he still MT?

Because he is a newcomer, what Zhou Huan has to do now is to learn some of the rules of the Security Bureau. After he becomes familiar with the rules of the Security Bureau, the superiors may send him some simple tasks.

Today, Gao Qiang, who came to work, had no time to pay attention to him because of the spy code, so Zhou Huan was very leisurely and leisurely.

Since you are so idle, should you find something to do?

"MT, I want to learn cryptography!"

The next moment, MT's voice sounded in his mind.

"clear!"

Cryptography is a discipline that studies how to convey information in a hidden way.

In modern times, it refers specifically to the mathematical research on information and its transmission, which is often considered to be a branch of mathematics and computer science, and is also closely related to information theory.

The famous cryptography scholar Ron Rivest explained: "Cryptography is about how to communicate in the environment where the enemy exists." From an engineering perspective, this is equivalent to the similarities and differences between cryptography and pure mathematics.

The key to cryptography is that the primary purpose is to hide the meaning of information, not the existence of information.

Similarly, cryptography has promoted computer science, especially technologies used in computer and network security, such as access control and confidentiality of information.

Of course, many people know that passwords are an important confidentiality method for both parties to communicate in special information changes according to the agreed rules.

According to these rules, changing plain text into cipher text is called encryption transformation. Changing cipher text into plain text is called decryption transformation.

In the early days, only text or digital were added and decrypted. With the development of communication technology, voice, images, data, etc. can be added and decrypted...

In an instant, countless knowledge from cryptography appeared in Zhou Huan's brain, which made him feel that his own head would explode in the next moment.

Of course, this knowledge also becomes Zhou Huan's memory and permanent memory after MT input is completed.

...

...

"What is he doing?"

Gao Qiang looked at Zhou Huan who ran to the original confinement room during the day, and was sitting at the desk in the confinement room, staring at the computer, and asked his colleagues beside him.

Gao Qiang discovered that Zhou Huan had been in this state for a whole day. Not only did he not eat lunch, but he didn't even eat dinner. It was time for get off work, and he had not left.

"Who knows!"

The colleague shrugged and said that he didn't know what Zhou Huan was doing.

He looked down at the watch on his wrist and Gao Qiang looked at the confinement room where Zhou Huan was staying.

"What is he busy with every day and night?"

With big strides, Zhou Huan was facing the computer keyboard, and his hands kept pulling and pulling like flying swallows. The speed of operation was dazzling.

As the saying goes, you have specialized skills. Before learning cryptography, you must first learn and master computer theory.

Only by being able to operate computers quickly can one learn more advanced cryptography practices.

Seeing that Zhou Huan was fine, Gao Qiang walked to the side and placed a lunch box on the dining table.

Seeing Zhou Huan's focus on operation and looking out of the world, Gao Qiang looked at Zhou Huan's back in surprise. He never expected that the young man in front of him, who seemed a little young, would be so focused, clearly as if he was possessed.

Shaking his head and taking a casual look at the knowledge about cryptography on the computer, he already knew what Zhou Huan was doing.

This made a little warmth appear in his eyes, and he turned around and left the room.

Zhou Huan was fully focused on deciphering work. As for whether his stomach was empty, he didn't pay attention to it.
Chapter completed!
Prev Index    Favorite Next