Chapter 248 The fastest pit to be filled


Chapter 248 The fastest pit to be filled

The people from Changjian Factory and the user happily left the third rolling mill with the results and went back to work.

Gao Zhendong, on the other hand, continued to post in the factory, and there were quite a lot of people there.

Lao Chen has said it alone a long time ago. It doesn’t matter whether he posts or not. Master, you are already a mature male parent and you must learn to keep track of days by yourself.

Others such as Factory Director Yang, Deputy Factory Director Li, acquaintances from the Technical Department, acquaintances from the Security Department, and many acquaintances in the workshop all met while making products.

As for Yu Yuncheng and the others, Gao Zhendong also informed that people coming from Haihekou not far away still want to feel the warmth of a big family. The single crystal furnace they jointly built is almost successful, but looking at Yu Yuncheng like this, The plan is to wait until Gao Zhendong gets married before settling the question, so as to give Gao Zhendong a double happiness.

However, Gao Zhendong didn’t just notify everyone if he knew him, because in other people’s eyes, the appearance would be too ugly. He really had to know, be familiar with, and have a good relationship with him before he would notify him.

For example, Lao Yuan, who had been punished several times by Gao Zhendong in the technical department, was too lazy to say a word.

There are not many other factories that need to be notified. The Computing Office and the Capital Steel Plant only notified familiar leaders. Familiar ordinary employees and middle managers were not notified very much. It’s not that they looked down upon them. , but I am afraid that people will think too much. Besides, these days, it is not a good thing if the battle is getting bigger.

In the midst of this busyness, on Wednesday, people from the National Defense Working Committee came, brought by people from the confidential room. They first verified the identity of the visitor.

Seeing that they were brought here by the confidential room, Gao Zhendong himself verified their identities with the National Defense Work Committee again, and Gao Zhendong invited them to his office.

The visitor looked embarrassed: "Director Gao, look, you have been busy getting married in the past two days, and we are really sorry to bother you. I wish you a happy wedding in advance, and congratulations. "

It seems that the leader of the National Defense Working Committee has said hello. Gao Zhendong doesn't care. If you don't come, I have to go to work. It's impossible not to work this week. How can I do it? Such a big face.

"Thank you, thank you. There's nothing to be embarrassed about. There's always work to be done. Why are you here this time?"

"Do you remember the last time Director Gao did data? During the remote communication experiment, our leader asked you to create a data encryption program to solve the confidentiality problem in data transmission. ”

Gao Zhendong said "Ah" and remembered.

"Yes, there is such a thing. Why, you have already determined the demand?"

"Yes, this is our idea, take a look."

Gao Zhendong took the file, opened it and read it.

The requirements are not complicated. They are basically the requirements for symmetric encryption. DES is very suitable for these requirements and there is no difficulty.

Simply put, in information technology, symmetric encryption is the most familiar encryption method. The same or the same set of keys is used to encrypt and decrypt data. Decryption is the inverse operation of encryption. Common compression software such as Rar, Zip, and 7z in the future will use this type of encryption method.

The advantage is that brute force cracking is difficult, the amount of calculation is small, and the encryption and decryption speed is fast. However, there is a fatal flaw. The difficulty of brute force cracking does not mean high security. The biggest weakness of this method lies in the management of keys. , especially when the key needs to be changed frequently, how to safely send the key to the other party becomes a problem.

In practice, some people have used an extremely complex root key to manage the key transmission problem. However, in fact, the root key itself has become a weakness. As for how to solve this problem in the end , that’s something for later.

However, for the current National Defense Working Committee and related units, key management is solved through management methods. For such needs, they have a large number of mature methods available.

It’s not as abstract as Citigroup, where the strategic ballistic missile launch code is a few 0s or 123456.

It’s not that the National Defense Working Committee doesn’t want to use asymmetric encryption public key algorithms, such as RSA in the future, SM2, and SM9 in national secrets, but because they have never imagined that such a thing actually exists. This is the limitation of the times.

However, although the national secret SM2 and RSA are both public key algorithms, they are very different. The former is based on elliptic curves, and the latter is based on large number decomposition.

Gao Zhendong has not thought about proposing asymmetric encryption now. The computational load of these encryption methods is much greater than that of symmetric encryption, and current machines cannot support it.

After reading the entire request, he smiled. This matter is easy to handle.

He called the National Defense Working Committee again and verified the identity of the visitor again, mainly to verify whether the relevant things would be handed over to the visitor this time. Based on the purpose of these things, It's not too much to be cautious.

Although the DES algorithm itself will actually be made public in the future, at this time, it is better to follow the relevant requirements.

The visitors also smiled and were very cooperative. In their opinion, Gao Zhendong’s behavior was perfectly normal.

After verifying the relevant matters, Gao Zhendong turned around and opened his safe, and took out a few things from the storage while carrying the visitor.

One tape and two paper documents.

“This is the encryption program I have written, two paper documents, one is the principle and description of the algorithm, and the other is the program source code and program usage instructions.”

Gao Zhendong did this for most of the day after the meeting. The procedures were all standard and did not take much time. What took time was the two paper documents. Because there was no printer yet, the source code and related instructions were all handwritten, which made him very tired.

It even made him want to calculate the progress and act as a supervisor. I said at the meeting that it would be solved in one day, so it only takes one day!

The visitor really didn’t expect that this matter didn’t need to be overnight, Gao Zhendong solved it on the spot.

"Director Gao, have you already done it? Is it worthy of this request?"

It's normal to have this worry. After all, I've never seen someone get something ready before looking at the demand.

Gao Zhendong nodded: "I have read it. This program can meet the requirements you brought over and does not need to be modified. Take it back and show it to the relevant experts, and they will know. If it is still If you have any questions, come back to me.”

In fact, this is also related to the fact that the National Defense Working Committee is not familiar with computer-related technologies and concepts, and it is difficult to propose specific algorithm indicators.

For example, the simplest one is the key length issue. In fact, they never thought of it when it was raised. They were aware of the relationship between key length and encryption strength, but they were unable to Quantitatively stipulating the length of the key, it can only be described qualitatively that "the key length should meet the requirements to prevent the traversal method from being cracked within XX time."

So Gao Zhendong fully evaluated the information sent by the National Defense Work Committee. After the demand was met, this thing was immediately taken out, no need to change, it was just fine.

Seeing that Gao Zhendong was full of confidence, the people from the Defense Working Committee were not nagging. As long as you are sure, I will take him away.

After signing the relevant procedures, the visitor sealed the three things. From this point on, they themselves could no longer open the seal, not even Gao Zhendong himself.

This hole was filled quite quickly, Gao Zhendong thought to himself.

With their things, they quickly returned to the Defense Work Committee.

At the National Defense Working Committee, the relevant personnel have already made preparations and have been waiting for a long time.

They were the relevant personnel who came to discuss the need for encryption software. Before they left, they heard reports that the things had been obtained, so they decided to continue working overtime. Moreover, they were also curious about what the things they built in one day looked like and how effective they were.

After a series of handover procedures, people opened the seal and took out three things.

"State Secret-1 (GM-1) Symmetric Encryption Algorithm Instructions", "State Secret-1 (GM-1) Symmetric Encryption Software Instructions", and a tape.

"Haha, the name is well chosen, grand and simple." Someone laughed.

The leader of the National Defense Working Committee did not answer the question. Based on his understanding of Gao Zhendong, this guy was a waste of names. This time it was all luck.

The math experts looked at the algorithm instructions first, while the computer technicians looked at the program instructions and prepared to run the encryption program.

Several mathematicians nodded while looking at the algorithm.

“Well, this algorithm is very good and has no obvious weaknesses. At first glance, if you want to crack it, you can either start with the key or use traversal.”

"Yes, it seems that the algorithm itself has no loopholes. Moreover, the amount of calculations for encryption and decryption itself is not large, which matches the current computer speed."

"The best thing is that this algorithm , is very suitable for the binary operation method of computers. It is different from the general methods of addition, subtraction, multiplication, division and square root. The algorithm is relatively complicated, but it is very suitable for computers. ”

"Not to mention, if you ask me to design, I really can't do it that well. I may be better than the designer in mathematics, but I'm really not as good as him in computer mathematics."

"I heard that it can be done in one day. What a genius, just designing this algorithm is not something that ordinary people can do in a day or two. "

It is true that it cannot be designed, but it is much easier to copy it.

"A 7-character key supports letters, numbers, and special characters. This range is quite large."

The DES key is 56 bits, exactly 7 bytes.

"The uppercase and lowercase letters are sensitive, so the range is even greater."

"."

The leader of the National Defense Work Committee laughed. It seems that the high-altitude artillery does not fire cannons. He said it is A day is really a day. As soon as the person passes by, the results come back.

It didn’t take long for the computer technicians to run the program and start related tests.

The encrypted file was not large, about 10,000 words and 20kByte. After a while, the operator reported: "Encryption is complete. There is no correlation between the ciphertext and the plaintext that can be directly interpreted."


This can only be said temporarily, and the details will need to be tested many times.

(End of this chapter)

Previous Details Next