Chapter 241 Just one day!
As for why not just use the confidential channel? For the same reason as before, the conditions for the confidential passage were too good to be suitable.
However, there are really two confidential telephone lines used to ensure dispatching cooperation. Once connected, there will be no interruption. In this era, I can really say: heroic!
With the exchange of instructions and close cooperation from both sides, the two test communication lines were called. After being called, all the telephone offices along the two lines were ensuring the smooth flow of this line. In the words of the leader of the Postal and Communications Commission, these two lines cannot be severed unless the reactionaries counterattack.
Can the reactionaries counterattack? Obviously not.
The experiment went smoothly. After all, both sides were elites from their respective units, as were the line support personnel from the telephone offices along the way.
Basically, there were no problems and Gao Zhendong didn’t need to intervene too much. The whole experiment went smoothly.
As for remote messaging, the two leaders of the National Defense Working Committee and the Postal and Communications Committee, who are extremely familiar with telegraphs, feel that it is very novel, has great potential, and has great future, but now it is not far away from the telephone and telegraph. Before the popularization of systems for receiving and automatically processing such data, it was a bit of a shock, but not very profound.
However, the leaders of the Postal and Communications Commission expressed great interest in the speed of message communication. With the fingers of the operator flying, within one minute, a message of more than 100 words was edited and sent to the destination. land.
This efficiency, regardless of the channel establishment time, only the speed of writing, sending and displaying, is basically more than 5 times that of telegram.
After all, message communication greatly simplifies the process of telegram compilation, sending, copying, and translation. What you see is what you get. It is sent immediately after editing, and the recipient can wait for it immediately.
Moreover, computers will not get tired, but people will.
The entire process of telegraphy and the workload of message communication, as well as the demand for manpower, are obviously much simpler in the latter.
The leader of the Postal and Communications Commission smiled and said: "The only regret is that this news has to be copied from the screen manually, otherwise it would be faster."
Gao Zhendong immediately let go Guess: "I have completed the original design of a printer that can directly and automatically print text content on a computer onto paper. Together with the computing institute, I have organized relevant manpower and handed it over to the computing institute for implementation. It should be implemented within a few months. There is good news.”
When the leaders of the National Defense Work Committee and the Postal and Communications Committee heard Gao Zhendong's words, they looked at each other. Comrade Zhendong's actions were a series of actions that were dizzying.
"Really?" Although he knew that Gao Zhendong would definitely not be bragging on this occasion, the leader of the National Defense Work Committee still asked. The main reason was that Gao Zhendong's movements were too fast, as if from DJS- From the beginning of 59, it was all planned.
Gao Zhendong nodded: "Now the most difficult print head, with the assistance of our factory's senior technicians, has completed the prototype in conjunction with the computing department, and it is basically working."
Prevention The leader of the working committee was very satisfied with Gao Zhendong's answer. What he was satisfied with was not the progress of the printer, but that Gao Zhendong was obviously using his own abilities to drive all related forces forward together.
A single tree does not make a forest, only good things to everyone is truly good.
After listening to Gao Zhendong's words, the leaders of the Postal and Communications Commission became more interested in using computers + modems to replace part of the telegrams. This thing is good, at least it will not be so difficult for people to achieve the effect of sending telegrams.
Although it is very expensive, the price of hundreds of thousands is not unaffordable for some important nodes, and the thing called "printer" that Gao Zhendong just mentioned can be regarded as a complement. This is the last panel for data presentation.
Although he does not have a systematic concept of information and data, he knows that the smooth flow of information is crucial to all walks of life. Even for planning, the more comprehensive the data, the more comprehensive the data. , the more scientific the plan.
In fact, what he didn't know was that when the single-board computer that Gao Zhendong was working on came out, the last board would really be completed, and it would not only be the telegraph one, but also many other things.
The leader of the Defense Working Committee patted Gao Zhendong on the shoulder: "Comrade Zhendong, thank you for your hard work."
Gao Zhendong subconsciously puffed up his chest: "Serve the people!"
This reminded the leader of the National Defense Working Committee of Gao Zhendong's roots and laughed.
At this time, the test was carried out on file transfer.
If message communication brings novelty to the two leaders, then file transfer brings subversion.
When they saw a 10,000-word Chinese character file, it took 3 minutes and 17 seconds to be transmitted, and they quickly received confirmation from the computing center that the bit error rate was 0%, they realized Now, what does Gao Zhendong mean when he said at the last meeting that "it's too convenient and easy to be exploited"?
After all, the parameters seen at the meeting are all text and are not intuitive. Only by immersing yourself in the situation can you have a real feeling.
Ten thousand words, how long would it take to send a telegram instead?
According to the Chinese character encoding scheme developed by Gao Zhendong with calculations, each Chinese character occupies two bytes, and 10,000 words is equivalent to 20k bytes. To be honest, in Gao Zhendong’s view, this It takes three minutes to click on the data, which is really annoying.
After all, the modem’s speed of 1200bps can only transmit 0.1k bytes in one second, and 20k takes about 200 seconds. 200 seconds, in Gao Zhendong’s previous life, if 5G was open and running, it would be enough for a movie. , and it’s also high-definition and high-bitrate.
But for those who experienced the magic of network communication for the first time at the scene, this was like the beginning of the world, so fast! !
The units of bps, byte, and kb at the conference were not intuitive enough, and some people even saw them in a fog. However, here, intuitive experiments told everyone: your imagination cannot keep up with the reality of technology.
Amidst everyone's surprise, the leader of the Defense Working Committee turned his head and looked at Gao Zhendong: "Can the data transmitted by this thing be automatically encrypted?"
He thought of a lot , this thing has too broad prospects. Gao Zhendong smiled and said: "Yes, I have designed an encryption method that can automatically encrypt before sending and automatically decrypt at the receiving end. But now I have only completed the mathematical algorithm principles and have not implemented it in the program."< br>
What Gao Zhendong is thinking about is the classic symmetric encryption standard DES, which is an encryption algorithm using a 56-bit key and was established in Citigroup in 1977.
Although the 56-bit key will no longer be secure in the future, at this time, the amount of calculations required to traverse and crack it is astronomical for existing computers.
If you want to crack it, it is much more reliable to dig through the trash can to find common keys that may be leaked than to traverse the crack. This is the legendary "social engineering attack".
Imaginary hacker: fingers flying, typing wildly on the computer.
Realistic Hacker: shredding paper in the trash can.
As for 3DES and AES, which are more secure, Gao Zhendong is prepared to slow down. The amount of calculations is much larger, and it is easy to lose track if the pace is too big. As for RSA, that's even further away.
And DES has an advantage, that is, after the computer has enough computing power, it is easy to transition to the more secure 3DES.
The leader of the National Defense Working Committee asked: "How is the security?"
Gao Zhendong said: "If the keys are managed well, it is quite safe."
The leader of the National Defense Working Committee's eyes lit up: "Okay! Make this thing as soon as possible. I'll give you three months!"
Gao Zhendong shook his head.
"The time is too short? Are those five months enough?"
Gao Zhendong shook his head again and stretched out a finger.
“One year?”
“One day!”
Everyone at the scene opened their mouths and looked like “Do you really want to make sure you are really special?” What are you talking about?" expression.
The leader of the National Defense Working Committee had a serious expression: "One day? Isn't it a bit hasty?"
It means Zhendong, take it easy, you have to be responsible, change your words quickly.
Knowing that what he said was a bit sensational, for the sake of everyone's physical and mental health, Gao Zhendong quickly explained: "It's just one day. The trouble with this thing is the mathematical algorithm. I have already completed it, and only programming is left. . And this thing is actually a computer that keeps doing repetitive things. The program is not complicated, and one day is enough."
After thinking about it, he added: "Of course, it will take a long time to put it into use. The time of the process is beyond my control. "
The DES program itself is really not complicated. Gao Zhendong wrote it himself. Even if he only uses the standard library and does not use any third-party libraries, it only takes a few hundred lines of C. Language code thing.
In fact, the core parts of many software are not necessarily large in scale. The large ones are often functions that are of little use, or things that serve software developers.
Gao Zhendong couldn't help but think of a music software on his mobile phone in his previous life, which didn't download any songs, but had more than 3 gigabytes. I really don't know what these three gigabytes were.
So Gao Zhendong is not going to waste time. If he delays, it will disrupt the rhythm of his other work. He wants to cut through the mess quickly and write early.
And not only the program, but also the algorithm description and standards are written together, so that others can use it after throwing it out, without having to worry about it yourself.
As for how to use it, relevant personnel should worry about it, such as the leaders of the National Defense Working Committee.
Gao Zhendong feels that he is now like the Up owner of a certain website, digging holes everywhere. The front ones have not been filled in, but the back ones are dug again. There is no way, there is too much knowledge, and time is tight.
After thinking about it, I am much better than some Up owners. At least I am not inferior. Although there are many pits, as long as they are dug, they will be filled. For example, this one now, what the hell am I doing? Dig now and fill now.
Well, that’s okay.
Seeing that he was so confident and explained the reason for his confidence, the leader of the Defense Working Committee felt relieved.
He had seen Gao Zhendong fire cannons a lot, but he had never seen him fire cannons before. He had only asked out of concern and protection just now.
Since Gao Zhendong has made it so clear, there must be no problem.
He thought for a while and said to Gao Zhendong: "Well, in that case, I will find someone to contact you as soon as possible to discuss the details and technical issues with you, and then you can write."
(End of this chapter)