I Am Not A Mage Lord
Chapter 49: Hidden loopholes in algorithms buried in the world of wizards
"What is this? The show is over?"
"Did I miss any secrets just now?"
"Who just took notes? What about the memory genius? What happened?"
In a short time, the apprentices of the mage in the audience began to talk in a disturbing manner.
There is only one possibility for the lecturer to reject an apprentice’s "show operation"——
The secrets involved are too important to add.
In an instant, countless eyes locked on Lynch's body, like a spotlight, following him until the corner of the first row.
Since the establishment of the college, the geniuses among these lecturer geniuses have all seen a lot, and they have allowed the dean to personally achieve a lot of goals.
But this scene in front of you?
Directly touch the "Rune Secrecy Act"?
This is the highest confidentiality law of Bluestar!
If ordinary people don’t come into contact with the mage, the possibility of touching another "Mage Protection Law" is not high.
But the "Rune Secrecy Act" affects human life in all aspects, controlling the part of the truth that the Blue Star humans can know, and accompanying them in life, old age, sickness and death.
Guo Zhifei, an apprentice who is determined to surpass genius with hard work, finally broke the charcoal pen in his hand and stared at the content on the blackboard that had been wiped off by the "invisible servant".
"Zhi Fei, he is not in the same category as us, you don't have to fight for this tone." The female apprentice at the same high school comforted.
Several apprentices sitting next to Guo Zhifei knew that he had designed a set of "encryption algorithms" all night long with the second-year student.
I just wanted to take the initiative to raise his hand. Who thought that Lynch was called up. When Lynch dragged on for a while, when he thought he had a chance to perform, the other party detonated the atmosphere on the spot.
Even at this moment, the entire auditorium classroom still uttered emotions one after another.
The apprentice who didn't understand the scene just now, after some popular science of the descendants of the mage family, also realized that this is a "depth bomb"!
Just like some creators of Blue Star, rely on the copyright of lyrics and music to survive for a lifetime.
In the Mage Association, there are not a few that rely on an excellent "algorithm" to rise to the top in one fell swoop!
The apprentices who just ridiculed Lynch and even ridiculed the cooking are already lying on the table with blushing face, lest others notice.
This scene of is very likely to become a "classic story" circulating.
If Lynch becomes a powerful mage in the future, everything that happened today will surely be passed on by word of mouth.
A carelessness, they will become the "harlequins" in the story. For these apprentices who aspire to become wizards, who can afford to lose this face!
Lynch, who copied the "half MD5 algorithm", with a flushed face, slowly sat next to the mysterious woman in the first row.
But he was somewhat surprised, the female lecturer on the stage responded so much that he almost thought he was going to be recruited.
"Wonderful?" Suddenly the girl apprentice at the long table smiled.
Lynch then formally looked at his deskmate.
Compared with Wang Ruoling, even the loose robe can hardly cover the other party's gourd figure, it is convex and plump.
The beautiful face and the skin of the bully Saixue are more like the fairy on the earth who walked out of the animation film and television drama.
"A little bit?" Lynch replied.
But his eyes fell back, but Lynch reluctantly opened up the entire MD5 algorithm model and began to deliberate little by little.
Obviously, the female mage An Qi would not think that he just conceived it casually, maybe it took many years of work.
Naturally, in everyone's eyes, Lynch is very familiar with this "algorithm", so he can't show it.
He also realized that behind the pretense, it takes "effort" as a price.
"It seems that you still underestimated the meaning." The female apprentice chuckled softly.
Lynch sounded strange.
In fact, the previous Blue Star said that the MD5 algorithm, except for the computer or the otaku who has known it, would really not study it.
But the hash function behind the MD5 algorithm goes deep into every aspect.
This kind of digest function is to input an unlimited length, and then output a fixed byte.
The famous "Bitcoin", the process of "mining" is to brute force the hash algorithm.
He knew the meaning too clearly. If it could be cracked, it would cost 50,000 dollars a piece and get rich every minute.
But for this mage’s rune, no, right?
The girl apprentice shook her head and chuckled.
Speaking of her, she turned her face away, her face exquisitely like a porcelain doll, staring at Lynch, "Tamper-proof and authentication, these two categories are the key directions of Talismanic literature, so in a sense, you just The algorithm is more precious than some encryption algorithms."
Lynch couldn't help but look surprised.
"Think about it, after the mages performed multiple encryptions, they kept the ciphertext in their minds. But over time, you can’t guarantee that the ciphertext in your mind is completely correct. Once the ciphertext changes a little, it is likely to cause The finally restored plaintext rune was also turned upside down."
"So this kind of completeness check algorithm can guarantee consistency, even because the output result is not complicated, it can even be recorded by hand."
"The above is just a small use of my example, including rune transcription, rune verification and other aspects of work, will use this authentication and anti-tampering features."
Lynch listened, it was already clear.
Everyone is "memorizing runes", but when researching, are your runes 100% accurate?
In the case that the Sismana rune cannot be said to be drawn, just compare the MD5 of your rune with the MD5 of the "official rune" to know the result!
This is the real usage!
Compared with the information "identity card", the "MD5" on the earth has also been widely used for "authentication".
For example, the "password" for logging in to a website. If the website directly compares "123456" with the "123456" entered by the user, there is a great risk in this process, and even the website administrator can see the password in plain text.
Therefore, the general website only saves the number "e10adc3949ba59abbe56e057f20f883e".
It is the MD5 value of "123456". When the user enters the password, calculate the MD5 and compare it with the database to determine whether the password is correct. And if the website is compromised, there is no need to worry about the leakage of user passwords.
Because everyone is lazy, basically the same password is used. Once the plaintext password is leaked, it means that other websites registered by the user will leak the password.
Therefore, Lynch’s previous life registration site password will add some identifiers, such as qq, add qq as the end to prevent collisions.
"I just discovered that your algorithm has the characteristics of compressibility, easy calculation, resistance to modification, and strong resistance to collision. If it passes the above screening test, it is likely to replace some of the old algorithms and promote their use."
Lynch's pupils widened instantly.
He didn't write it all just now, can the apprentice girl in front of me guess most of the advantages of the MD5 algorithm?
However, Lynch still smiled inwardly.
The other party still guessed a little wrong~www.wuxiaspot.com~ The algorithm's "collision resistance" is insufficient, which is why it is slowly being replaced even if it has many advantages, because there are already weaknesses in "authentication".
Lin Qi silently opened the book in the Palace of Memory, and carefully reopened the article on the MD5 algorithm by Academician Wang Xiaoyun.
Academician Wang Xiaoyun proved one thing. She can find the plaintext X2 when she knows the plaintext X1, so that its MD5 value is consistent with that of X1.
But what really destroys MD5's authentication in previous lives is that it can find strings with different prefixes but the same MD5 through collisions, which makes MD5 unreliable.
At this moment, the female mage An Qi on the podium has started the basic introduction of the entire rune literature, and began to introduce the traditional classic algorithms that were abandoned in the development of rune.
Lynch was about to tell the female apprentice next to him about the secret, suddenly his throat choked.
Academician Wang Xiaoyun’s paper does not count as cracking MD5, because the existence of plaintext X1 is also required.
But Rune X1, Lynch also knows it!
Doesn't this mean that after the MD5 algorithm is widely used in the mage world, he knows X1 (the correct rune), and calculates MD5 (X1) by himself.
Then he forged X2 (false rune), and the result was MD5(X2)=MD5(X1), thus passing the verification!
Lynch couldn't help but jump in his heart.
If he doesn't say anything about this, then in the case of MD5 algorithm promotion, doesn't it mean that he has injected a "critical loophole" into the entire world of wizards?
"It's nice to meet you." Suddenly the girl raised her hand and handed it to Lynch, "Zheng Yingluo of the Twilight Dragon Meeting, this time your enrollment examiner."
You'll Also Like
-
Transform into twin girls and start as Funina
Chapter 78 1 hours ago -
Lord of All: Daji at the beginning, I am so happy!
Chapter 87 1 hours ago -
After rebirth, my childhood sweetheart wife turned out to be a yandere
Chapter 64 1 hours ago -
American comics: I am Superman and my wife is Wanda!
Chapter 59 1 hours ago -
One Piece: Start Fusion Uchiha Itachi
Chapter 157 1 hours ago -
Autopsy in the morning and a blind date with Boss Yang in the afternoon
Chapter 151 1 hours ago -
Fantasy: Ten thousand times enhanced, I have countless divine objects!
Chapter 177 1 hours ago -
Urban Elf: Start by cultivating croaking frogs
Chapter 197 1 hours ago -
Hong Kong Movie: My understanding is incredible, I am a police hero
Chapter 191 1 hours ago -
The ultimate in tennis starts with devouring legendary talent!
Chapter 144 1 hours ago