Chapter 49: Secret Loopholes in Algorithms Buried in the World of Wizards

“What is this? The show is over?”

“Did I miss a secret just now?”

“Who just took notes? What about the memory genius? What happened?”

All of a sudden, the apprentices of the mage in the audience began to talk disturbingly.

There is only one possibility for the lecturer to reject an apprentice “show operation”——

The secrets involved are overwhelmingly important.

In an instant, countless eyes locked on Lynch’s body, like a spotlight, following him until the corner of the first row.

Since the establishment of the college, these geniuses among the geniuses of lecturers have all seen a lot, and there are a lot of them that can be used by the dean in person.

But this scene before me?

Directly touch the “rune secrecy law”?

This is the highest confidentiality law of Bluestar!

If ordinary people do not contact the mage, the possibility of touching another “Mage Protection Law” is not high.

However, the “Rune Secrecy Act” affects human life in all aspects, controlling the part of the truth that Blue Star humans can know, and accompanying them in life, old age, sickness and death.

The apprentice Guo Zhifei, who is determined to surpass genius with assiduously, finally broke the charcoal pen in his hand and stared at the content on the blackboard that had been wiped off by the “invisible servant”.

“Zhi Fei, he is not in the same category as us, you don’t have to fight for this tone.” The female apprentice from the same high school comforted.

The apprentices sitting next to Guo Zhifei last night knew that he had designed a set of “encryption algorithms” all night long with the second-year student who had inquired about.

I just wanted to take the initiative to raise his hand. Who thought that Lynch was called up. When Lynch dragged on for a while, when he thought he had a chance to perform, the other party detonated the atmosphere on the spot.

Even at this moment, the entire auditorium classrooms were still sighing with emotion one after another.

The apprentice who didn’t understand the scene just now, after some popular science of the descendants of the mage family, also realized that this is a “depth bomb”!

Just as some creators of Bluestar live their lives with the copyright of lyrics and music.

In the Association of Masters, there are not a few that rely on an excellent “algorithm” to rise to the top in one fell swoop!

The apprentices who had just ridiculed Lynch and even ridiculed the cooking were already lying blushing on the table, lest others notice.

This scene is very likely to become a “classic story” circulating.

If Lynch becomes a powerful mage in the future, everything that happened today will surely be passed on by word of mouth.

With one carelessness, they will become the “harlequins” in the story. For these apprentices who aspire to become mages, who can afford to lose this face!

Lynch, who copied the “half MD5 algorithm,” with a flushed face, slowly sat next to the mysterious woman in the first row.

However, he was somewhat surprised. The female lecturer on the stage responded so much that he almost thought he was going to be recruited.

“Surprise?” The girl apprentice at the long table suddenly smiled.

Only then did Lin Qi formally look at his deskmate.

Compared with Wang Ruoling, even the loose Magical Robe can hardly cover the opponent’s Calabash figure, which is bulging and plump.

The delicate face and the skin of Bullying Saixue are more like a fairy in the world from anime, film and television dramas.

“A little bit?” Lynch replied.

But when his eyes fell back, Lynch reluctantly opened up the entire MD5 algorithm model and began to deliberate little by little.

Obviously, the female mage An Qi would not think that he just conceived it casually, maybe it took many years of work.

Naturally, in everyone’s eyes, Lynch is very familiar with this “algorithm”, so he can’t show it.

He also realized that behind the pretense, “effort” is required as a price.

“It seems that you still underestimated the meaning.” The female apprentice chuckled softly.

Lynch sounded strange.

In fact, the previous Blue Star said that the MD5 algorithm, except for the computer or the otaku who has known it, would really not study it.

But the hash function behind the MD5 algorithm goes deep into every aspect.

This kind of digest function is to input unlimited length, and then output fixed bytes.

For the famous “Bitcoin”, the process of “mining” is to brute force the hash algorithm.

He knew the meaning too clearly. If he could really crack it, he would get rich every minute for 50,000 dollars.

But for this mage’s rune, no, right?

Suddenly the girl apprentice shook her head and chuckled, “It seems that the geniuses still have a place to be obstructed by a leaf.”

As she said, she turned her face away, her face exquisitely like a porcelain doll, staring at Lynch, “Tamper-proof and authentication, these two categories are the key directions of rune learning, so in a sense, you just The algorithm is more precious than some encryption algorithms.”

Lynch couldn’t help but look surprised.

“Think about it, after the mages performed multiple encryptions, they kept the ciphertext in their minds. But over time, you can’t guarantee that the ciphertext in your mind is completely correct. Once the ciphertext changes a little, it is likely to cause The finally restored plaintext rune was also turned upside down.”

“So this kind of algorithm for checking completeness can guarantee consistency, even because the output result is not complicated, it can even be recorded by hand.”



“The above is just a small use of my example, including rune transcription, rune verification and other aspects of work, will use this authentication and anti-tampering features.”

After Lynch listened, it was already clear.

Everyone is “memorizing runes”, but when researching, is your rune 100% accurate?

In the case that the rune of Sismana cannot speak and draw, just compare the MD5 of the own rune with the MD5 of the “official rune” to know the result!

This is the real usage!

Compared with the information “ID card”, the “MD5” on the earth has also been widely used for “authentication”.

For example, the “password” for logging in to the website, if the website directly compares “123456” with the “123456” entered by the user, there is a great risk in this process, and even the website administrator can see the plain text of the password.

Therefore, the general website only saves the number “e10adc3949ba59abbe56e057f20f883e”.

It is the MD5 value of “123456”. When the user enters the password, calculate the MD5 and compare it with the database to determine whether the password is correct. And if the website is compromised, there is no need to worry about leaking user passwords.

“I just discovered that your algorithm is compressible, easy to calculate, resistant to modification, and strong against collisions. If it passes the above screening tests, it is likely to replace some of the old algorithms and promote them.”

Lynch’s pupils widened in an instant.

He didn’t write it all just now, can the apprentice girl in front of him guess most of the advantages of the MD5 algorithm?

However, Lynch still smiled inwardly.

The other party still guessed a little wrong, and the “collision resistance” of the MD5 algorithm is insufficient.

This is why it is slowly being replaced even if it has many advantages, because there are already weaknesses in “authentication”.

Lin Qi silently opened the book in the Palace of Memory, and carefully reopened the article on the MD5 algorithm by Academician Wang Xiaoyun.

The academician proved that with the knowledge of the plaintext X1, the plaintext X2 can be found so that its MD5 value is consistent with the MD5 of X1.

But what really destroys MD5’s use of authentication in the previous life is mainly to find strings with different prefixes but the same MD5 after collision, which makes MD5 unreliable.

At this moment, the female mage An Qi on the stage has started the basic introduction of the entire rune learning, and began to introduce the traditional classic algorithms that were abandoned during the development of the rune.

When Lynch was about to tell the female apprentice next to him the secret, his throat suddenly choked.

Academician Wang Xiaoyun’s paper does not count as cracking MD5, because it is necessary to know the existence of plaintext X1 in advance to forge X2 and achieve the destruction of anti-tampering.

But runeX1, Lynch also knows!

Doesn’t this mean that after the MD5 algorithm is widely used in the mage world, he will calculate MD5 (X1) by himself when he knows X1 (correct rune).

Then he forged X2 (fake rune) that meets the characteristics, as long as MD5(X2)=MD5(X1), it can pass the verification!

Lynch couldn’t help but jump in his heart.

If he doesn’t say anything about it, does it mean that he has injected a “critical loophole” into the entire world of wizards when the MD5 algorithm is promoted?

Can provide a fake rune when necessary?

“It’s nice to meet you.” Suddenly the girl raised her hand and handed it to Lynch, “Zheng Yingluo at the Twilight Dragon Meeting, this time your enrollment examiner.”

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like