292. Chapter 292 Cracking the Quantum Trojan


Chapter 292 Cracking the Quantum Trojan

After thinking of such a direction, Ferrell couldn't help but become excited.

“If I can develop a mature quantum Trojan, it will not only affect the quantum computers of Star Technology, but also ensure that our computers are free from the intrusion of this quantum Trojan.”

If you can develop a computer Trojan for quantum computers, you can naturally find a corresponding anti-virus method. Ferrell is very convinced of this.

Soon, Ferrer was ready for this new job.

Quantum Trojans still have many similarities with ordinary computer Trojans. The difference is that they are more difficult to prevent and are much more targeted at quantum computers.

Theoretically, as long as quantum computers are connected to the network, it will be difficult to prevent such quantum Trojans.

As for Xia Guo’s future quantum computer plan, these quantum computers must be connected to the quantum cloud network, otherwise it will be difficult to maximize their role.

Quantum computers that cannot access the quantum cloud network are like birds that have lost their wings. No matter how powerful they are, they are limited and can only work within a very limited range.

……

In the following time, Ferrell and his assistants worked on research projects related to quantum Trojans.

This research went very smoothly. Soon, they found the malicious code to attack the quantum computer and verified their conjecture through experiments.

These quantum codes are very cunning. Because of the special nature of quantum, they can be well disguised and it is difficult to distinguish them from ordinary code information.

And these quantum codes are not just one, but there are dozens of them. If it were not for them being the inventors of these codes, even they themselves would have difficulty identifying these quantum codes.

“As long as we inject these quantum codes into Xia Guo’s computer network...then these quantum computers will be affected, and we will not even be able to detect the source of these effects.”


Quantum Trojans will not affect the normal operation of ordinary computers. Even if there are some operational failures in quantum computers, it will be difficult for people to associate them with "Trojan horses."

More likely, people will think that there is a problem with the quantum computer itself, or that the surrounding environment is not stable enough, causing the quantum computer to be unable to operate stably.

Once this plan is successfully implemented, it will even affect the sales of Xingchen Technology’s quantum computers, because those users who purchase quantum computers will think that this is a quality problem of the quantum computers, and will have a negative impact on Xingchen Technology’s reputation and market value. will have serious consequences.

In order to further verify the effect of these quantum Trojans, Ferrell decided to conduct an experimental attack on Quantum Leap first.

Ferrer decided not to worry about the Galaxy Quantum Computer for the time being. After all, if two quantum computers were attacked at the same time, they might be alerted.

...

In the study, Ning Chen is studying the design plan of a quantum computer.

After these days of continuous design and modification, Ning Chen has basically completed the design of a new generation of quantum computers.

Once such a quantum computer is successfully manufactured, its overall performance will be improved by about 50% compared to quantum leap.

Such an improvement is very scary. Because of the snowball effect, the actual improvement in application fields is likely to be far more than 50%.

At this moment, Ning Chen heard Xiaozhi's voice suddenly coming from his mind.

[Master, it was detected that Quantum Leap was attacked by a quantum Trojan. Xiaozhi has automatically blocked the quantum Trojan and pretended that Quantum Leap was under attack...]

Hear Ning Chen also felt that the news sent by Xiaozhi was very unexpected.

"Quantum Trojan...what is this?"

Even in the previous life, Ning Chen had never heard of a similar concept, which made Ning Chen feel a little sad. No bottom.

Immediately, Ning Chen checked the specific information sent by Xiaozhi to check the situation.

After all, Ning Chen had a very rich reserve of knowledge. After reading the specific information sent by Xiaozhi, he quickly understood what the so-called "quantum Trojan" was.

"It turns out to be a Trojan targeting quantum computers. Without Xiaozhi's reminder, I'm afraid it would be really difficult for me to notice this."

In fact, with Ning Chen's ability , it would not be very difficult to develop something similar. It was just because Ning Chen was not used to thinking in this direction, so he had never considered similar things before.

However, Ning Chen still felt a little tricky, because these quantum Trojans are indeed very difficult to guard against.

Unless the code has been clearly determined to be a quantum Trojan, it is difficult to identify them through some typical properties.

"No...even if they have identified various quantum Trojan codes that have appeared in the past, they are still capable of making new quantum Trojans. In this case, unless they never use the quantum cloud network, Otherwise, it will be difficult to avoid being attacked by such a quantum Trojan."

Thinking of this, Ning Chen couldn't help but feel a little disappointed, because if he didn't use the quantum cloud network, it would represent Ning Chen's previous plan. Will be completely disappointed.

Ning Chen had to admit that his previous plan was indeed a bit too perfectionistic, and he had not thought about extreme situations at all.

When these situations really arise, Ning Chen will still be a little at a loss.

"It is too late to suspend the mass production of quantum computers now. Whether it is the accessories that have been produced or the contracts signed with these universities and scientific research institutions, they will have a great impact on Xingchen Technology." Ning Chen thought. .

Except for Xingchen Technology and the Chinese Academy of Sciences, it is difficult for other universities and scientific research institutions to consume the computing power of a quantum computer alone.

If they cannot access the quantum cloud network, it will be difficult for them to afford the use of a quantum computer, resulting in a waste of scientific research funds.

However, Ning Chen has a very strong psychological quality after all. After two lifetimes of tempering, Ning Chen quickly got rid of these negative emotions.

After calming down, Ning Chen thought about some possible solutions to the problem.

"Since Xiaozhi was able to successfully detect that they were quantum Trojans when he first received these quantum codes...then theoretically, I can also find their patterns."

Although Xiaozhi It is an artificial intelligence far ahead of this era, but after all, Xiaozhi is also a product of science, and all behavioral logic can be explained through science.

After screening out these quantum Trojan codes, Ning Chen analyzed them carefully. "Enable concentration!" Ning Chen said silently in his heart.

In order to have a better brain state, Ning Chen decisively turned on the concentration state.

In an instant, Ning Chen's brain seemed to have suddenly evolved, possessing faster thinking speed and more concentrated attention.

With the blessing of a focused state, Ning Chen quickly analyzed and thought about these quantum Trojans, and finally found some of their characteristics.

“If I design it in this way, I should be able to create some new quantum Trojans.”

Although this cannot immediately help Ning Chen resist quantum Trojan attacks, at least it can It can help Ning Chen better study these quantum Trojans.

After editing these codes that may be called quantum Trojans, Ning Chen immediately conducted experiments to verify whether his codes were effective.

"Sure enough... it is very similar to the information feedback from Xiaozhi just now. These quantum Trojans will not cause very serious consequences to the computer like ordinary computer Trojans, but they will interfere with the superposition state of qubits. , and affects the operating environment of the quantum computer. "

Such interference may not seem obvious, but because quantum computers are very precise instruments and have very high requirements for the operating environment, such an impact is actually. Very deadly.

After determining the characteristics of these quantum Trojans, Ning Chen thought about specific solutions.

“No...if you only rely on these features for identification, it is easy to accidentally kill the information. In this case, there is not much difference from not connecting to the quantum cloud network.”

But soon, Ning Chen thought of a new direction.

"Wait a minute... If we change our thinking, we may be able to completely solve the risks that quantum Trojans may bring."

The method that Ning Chen suddenly thought of was to secure all the information that could be confirmed to be safe. Label them to distinguish between safe and suspected risky information.

This method seems to be very difficult to operate, because the amount of various information on the Internet is so large that it is almost impossible to label all the information.

But for quantum computers, this is actually something that can be achieved.

Because quantum computers do not need to process all information, but only certain specific information.

In this way, as long as all the information of companies that cooperate with quantum computers is encrypted using quantum encryption technology, various information can be effectively screened.

“This is the weakness of quantum computers. Fortunately, quantum computers are not the only ideal computer. Tasks that quantum computers cannot complete can be left to supercomputers for the time being.”
< br>Because supercomputers are closer to ordinary computers, they will not be attacked by such quantum Trojans, and their security is more controllable.

Song Xiyun happened to come to the company at this time, and Ning Chen decided to solve these tasks with Song Xiyun.

Song Xiyun was also very surprised when she heard what Ning Chen said.

"Ning Chen, you said that someone maliciously attacked Quantum Leap just now?"

"Yes, and it was done in a very covert way. If you don't pay attention, it is likely to be considered just a It’s just an accident.”

When a quantum computer is running normally, there will occasionally be cases where the computational fidelity is low. Of course, this can generally be corrected by the quantum computer’s own error correction mechanism. , and will not attract people's attention.

Looking at the data retrieved by Ning Chen, Song Xiyun also realized that this was indeed not an ordinary quantum computer bug.

"Yes, this situation is indeed very unusual. There is a high probability that someone is maliciously attacking. Ning Chen, have you found the source of the attack?"

"It hasn't been found yet, but I'm sure it doesn't come from China." Ning Chen replied.

In fact, Ning Chen already had a rough guess about the source of this attack. When Ning Chen frees up time, he will definitely investigate this matter to the end.

The first thing Ning Chen needs to do now is to solve the problem of quantum information security first, so that he can have no worries, and then find out the mastermind behind the scenes.

......

In the following time, Ning Chen, Song Xiyun and others studied quantum encryption technology together.

This is actually a very common technology in the field of quantum computing, but this time Ning Chen needs to apply this technology more maturely, and must use the quantum secret key while ensuring smooth information transmission. degree.

Under the leadership of Ning Chen and Song Xiyun, this technology was successfully developed and the first experiment was successfully completed.

After confirming the feasibility of this quantum encryption technology, Ning Chen informed Yue Jiafeng of the Chinese Academy of Sciences about what had happened before.

After hearing the news, Yue Jiafeng was also very surprised.

“Teacher Ning, you mean that our quantum cloud network has become the target of attack?”

"Yes, at least Quantum Leap has been attacked by this kind of quantum Trojan. This attack is still experimental and has not seriously affected the operation of Quantum Leap, but I am worried that such attacks will be more serious in the future. Strong. I wonder if there has been anything unusual in the Galaxy recently? "

"Well... we haven't found this yet, but I think we need to check it more carefully."
< br>Ning Chen feels that the Galaxy may not have suffered similar attacks, but in the future, the Galaxy will also have a high risk of being attacked.

"Academician Yue, recently we have developed a quantum encryption technology that can protect the security of quantum computer information. I suggest that the Chinese Academy of Sciences also apply this technology, which can protect our quantum cloud network in the future Information security.”

Hearing Ning Chen’s words, Yue Jiafeng agreed without any hesitation.

"Great, Teacher Ning, we are definitely very willing to access this technology. If our secrets are leaked through the quantum cloud network, the consequences will be disastrous."

"The quantum Trojan we discovered now, It only interferes with the normal operation of quantum computers, but does not have the ability to steal information. Of course, accessing quantum encryption technology will definitely further improve our information security.”

(End of this chapter)

< br>


Previous Details Next