Font
Large
Medium
Small
Night
Prev Index    Favorite NextPage

Chapter 630: New mission of artificial intelligence, and the reappearance of Mr. Q!(1/2)

Considering that Chen Ming and Chen Lan were both in the car, Qin Ke didn't say anything more. He just closed his eyes and rested in the car while thinking about how to solve the problem raised by Uncle Yang.

Suddenly, a system prompt sounded in my ears:

"Ding! You have a new mission for the God of Learning!"

"Dingdong! The God of Learning mission updates the special mission 'It's time for artificial intelligence to show its due power'!"

"Five [Special Tasks] It's time for artificial intelligence to exert its due power: Your artificial intelligence level has been upgraded to lv3, and it has qualified intelligence. Please assist Xia Guo in realizing the security of Qing Ning operating system within 48 hours.

Let’s make a huge leap forward and use artificial intelligence to successfully resist and repel this international cyber attack!”

"Task reward: Evaluated based on the completion of the task. An S-level evaluation will award 1,000 academic points (informatics)! 1,000 experience points for special branch technology-artificial intelligence! An additional mysterious gift pack will be awarded!"

Qin Ke was startled at first, and then he was overjoyed!

After two or three years, the system finally issued a new task of "artificial intelligence"!

Sure enough, I guessed it right. The system will only trigger the release of such a special task when a relevant special event is encountered!

As long as this special task can get an S-level evaluation, informatics can be upgraded from "professional level" to "vocational level", and artificial intelligence can also be upgraded from the current lv3 to lv4!

Qin Ke cheered up. Since the system's tasks have a completion evaluation, it cannot just be satisfied with fixing loopholes and intercepting international network attacks. It must aim to obtain an S-level evaluation, so the security of the Qing Ning operating system is improved.

, and using the power of shimmering light to repel the invading enemies became his main consideration.

Qin Ke suppressed the excitement in his heart and silently calculated.



Half an hour later, the two returned to the hotel they had arranged in advance, walked into the room and closed the door.

This is a large and comfortable suite. It is no secret that the two of them live together, so when Chen Ming and the others arrange the room, they will default to the king-size bed room.

The two of them took off their coats and washed their faces before sitting together. Qin Ke was mainly repeating the news he heard from Uncle Yang, while Ning Qingyun listened attentively.

Since the room was arranged by Chen Ming and the others, it has naturally been checked long ago, so there is no need to worry about bugs or the like.

However, Qin Ke lowered his voice.

After hearing that such a big event had happened, Ning Qingyun couldn't help but frown.

The Qing Ning operating system is the brainchild of her, Qin Ke and Qin Xiaoke. It is also the scientific research result of her and Qin Ke's first joint collaboration. Although she has no longer been in charge of subsequent operation and maintenance over the years, she is still very concerned about the Qing Ning operation.

The system still has a special feeling.

Not to mention that this is very likely to affect the information security lifeline of Xia State in the next ten or even decades.

"I understand, what do you need me to do?" Ning Qingyun clenched her fists and asked.

In terms of development ability and computer knowledge, Ning Qingyun is not outstanding, even inferior to ordinary computer science graduate students. When she collaborated with Qin Ke to write the Lime operating system, she was mainly responsible for UI, interface and other appearance design categories.

and related code parts, while Qin Ke is responsible for all the core code parts of the operating system.

However, after experiencing the development work of "Qiguang eda", Ning Qingyun has also gained a lot of development experience, especially experience in advanced software algorithm methods, and is also familiar with code development through "Qing Ning Intelligent Programming". At this time, she is still confident that she can

It has played a lot of roles.

Qin Ke thought for a moment and said: "I haven't gotten the source code of the security audit mechanism of Longteng Zaitian's Qing Ning operating system v3.5 version, but there is one thing that can be started first. I want to hand over this part.

for you."



"Okay, you say."

"In addition to the security mechanism and protection software, computer security also has a very important link, which is the encryption and decryption algorithm. The current mainstream encryption and decryption algorithms, whether it is aes, twofish, 3des, rsa or serpent, etc., or several

The combined use of these algorithms rarely uses more than 256-bit keys for encryption, including the special communication software we developed for 'Mr.

Allows installation on older computers, using only a 32-bit key."

Ning Qingyun really didn't understand these contents in detail, but she also knew that the number of digits in the key is the supported password length. She couldn't help but said in surprise: "32-bit key? How secure..."

"Security is not a problem, because the core of its security mechanism is artificial intelligence 'Xiao Qing', who conducts security audits, and a 32-bit key is enough. Even if the source code is leaked, it will be difficult to bypass 'Xiao Qing'

Qing' conducts vulnerability attacks and intrusions directly into the operating system."

"That's it." Ning Qingyun understood.

Qin Ke continued: "Uncle Yang said that Long Teng Zaitian improved the security audit mechanism of the operating system during its secondary development. Although Uncle Yang doesn't know the details, I can guess that the key algorithm should be improved and changed to the best one."

The mainstream 128-bit or even 256-bit, but in this way, the review speed of the first generation 'Xiaoqing' will not be able to keep up. They must have designed a new security review mechanism that does not require the full involvement of the first generation 'Xiaoqing'.

It seems to be more secure, at least the length and security of the key have increased exponentially. But this will also cause the harm caused by source code leakage to become greater."

In order to let Ning Qingyun better understand, Qin Ke opened the drawing function of the notebook and directly used the mouse to draw while explaining: "No matter how to fix the problems of the current security audit mechanism, one thing must be done, and it is also the easiest

What takes effect is the improvement of the algorithm."

Ning Qingyun said unexpectedly: "You want to use a new encryption algorithm with 512-bit or even 1024-bit keys?"

Qin Ke shook his head: "The new encryption algorithm using 512-bit or even 1024-bit keys is too cost-effective and cannot be promoted on ordinary computers within ten years. Because the longer the key, the higher the difficulty of implementation, and the calculation required for encryption and decryption.

The more resources there are, the 128-bit key and the 256-bit key are currently the best values ​​to balance computer performance and security."

When Qin Ke said this, his eyes turned to Ning Qingyun: "Jun'er, I believe you have studied my process of proving the Riemann Hypothesis to a great extent. Next, you need to use the Riemann Hypothesis and Mersenne prime numbers.

The Fibonacci sequence is used to upgrade and improve the encryption algorithm of Lime operating system. These three number theory issues all study the distribution of prime numbers. As long as a better algorithm is designed, shorter keys can be used.

, achieving the same or even greater security than current 256-bit keys.”

Qin Ke used the mouse to write "32 is greater than or equal to 256", then smiled slightly and encouraged: "This is your goal. Time is very tight. There are only about 40 hours left. You must write the new algorithm within this time."

.I believe you can do it. In terms of number theory and algorithms, you are at the level of the Philippine Prize!"

Using a new algorithm with a 32-bit key, can it achieve security effects that are equal to or even surpass the 256-bit key of the current mainstream algorithm?

Ning Qingyun was startled by Qin Ke's goal, and then her fighting spirit burned brightly.

The girl clenched her little fists, took out the pen and paper and said, "Leave it to me! You have cracked the Riemann Hypothesis, and it's time for it to play a new role."

Qin Ke raised his hand and gave her a high-five. The two of them smiled tacitly and began to work together.

Qin Ke's task is heavier and he is responsible for more parts.

The first thing he has to solve is the security problem of his own network connection. He is now in Japan, and it is not safe to use a cross-border network, and excessive traffic can easily attract attention.

However, Qin Ke has long thought about how to achieve a safe connection in case of an emergency when going abroad, especially since "Shimmer" has been upgraded to lv3 - the lv3 Shimmer has surpassed most artificial intelligences in the world, even if it is not as good as

Google's "Alpha Dog" is definitely close. If it can be upgraded to lv4, then surpassing "Alpha Dog" will not be a problem at all.

Qin Ke directly sent the message and location via WeChat to "Shiguang" who was far away in the Xiaguo Liming Data Center.

Two minutes later, another "Glimmer" in the laptop automatically opened a new command window and prompted: "Master Qin Ke, a secure encrypted dedicated channel has been established."

This is a secure and encrypted dedicated channel established with the help of more than a thousand high-performance servers in Qingning Data Center. All instructions and messages sent by Qin Ke on his laptop will be broken up into tens of thousands or even hundreds of thousands of encrypted data packets.

Returning to Xia Kingdom, after several transfers, it was aggregated to Qing Ning Data Center, where Weiguang used its huge computing resources to re-decrypt the combination.

Although it is troublesome and consumes resources, the security level is the highest. No company or organization in the world today can intercept and crack, or even notice these scattered data packets that look like useless information on the surface.

Qin Ke can directly connect back to the Qing Ning data center through an encrypted dedicated channel, which is equivalent to being in China and does not need to worry about the security of transnational networks.

He quickly logged into Mr. Q's dedicated encrypted mailbox, encrypted the specially written communication software and sent it to Chairman Yan Weizhou's mailbox.



Yan Weizhou received instructions from Lao Yang and waited in front of his mailbox.

He had never heard of “Mr.

Unsung heroes appear in news reports, but their figures can often be seen faintly in the country's most sophisticated fields.

Now, the "Mr. Q" he is about to face should be such a mysterious expert.

He waited anxiously for more than half an hour before finally receiving an email from an unknown address.

What a weird email address, like a string of random random characters, and the email suffix has never been seen before.

Lao Yang next to him came over, identified it, and nodded: "It's Mr. Q. You can trust the software in this attachment."

It was a matter of great importance. Yan Weizhou personally operated the computer and downloaded the attachment in the email. He wanted to run it but had to enter a password. Lao Yang took over the keyboard and entered the pre-agreed password. Soon an unknown mysterious software was automatically installed.

There was no prompt at all during this period, and the core "Xiaoqing" of the operating system did not make any interception actions.

The software opens automatically, and the contact only has a "q" avatar.

"q" sent a message and another software with a lock icon:

"Encrypt and compress part of the source code of the security audit mechanism of the 3.5 Dragon Edition operating system and related technical documents with this encryption software and send it to me."

"There is also this anti-intrusion software that monitors network anomalies to prevent someone from invading this computer. You'd better install it on all public computers that may be invaded."

Yan Weizhou saw Lao Yang next to him nodding and immediately ordered the technicians to do as he was told.

After the encrypted compressed package was sent, Mr. Q only left one sentence: "I want to take a look first and wait for my news."



After Qin Ke got the source code and technical documents, he began to concentrate all his energy and read ten lines at a glance.

With his speed-reading ability, which was unparalleled in the world at the time, it only took ten minutes to read an advanced mathematics paper of dozens of pages. Although the source code passed over by Yan Weizhou had hundreds of thousands of lines of code, the technical documentation was also as thick as

It only took Qin Ke about three hours to read the two thousand pages and understand them thoroughly.
To be continued...
Prev Index    Favorite NextPage