Become Top Student In A Second
Chapter 2106
Public key cryptography technology has long been heard of.
However, they have not seen it with their own eyes. Many of them are far away from today's computer industry, which is still an unsolved mystery.
Now, the inventor of the public key cryptography technology, brought him to the public.
Once they were eager to know public key cryptography, but when Martin Hellman wanted to analyze public key cryptography on the spot, they were still shocked!
This sentence, like a whirlwind, swept people's heads in an instant, shaking people's brains
-
under the stage, Qin Luo rubbed his ears to relieve the discomfort caused by the impact of huge waves.
Of course, his discomfort did not come from Martin Hellman. After all, he had known about Martin Hellman's subject, so he was not too surprised.
His discomfort stems from the exclamation of the crowd eating melons around him.
As loud as you want to be!
Emmmm, to be honest, are you so surprised?
Qin Luo has also heard about public key encryption.
Public key encryption, also known as asymmetric (key) encryption, belongs to the secondary discipline of network security under communication technology. It refers to the encryption method composed of a pair of corresponding unique keys (i.e. public key and private key). It solves the problem of key distribution and management, and is the core of commercial password. In public key encryption system, what is not disclosed is plaintext, but what is public is ciphertext, public key and algorithm.
His main field is in business, a technology that enables secure and efficient Internet transactions, often used to transfer trillions of dollars a day.
At the same time, it can be used to encrypt things.
It's not at all polite to say that Martin Hellman's invention adds a security lock to the dangerous Internet payment.
Martin Hellman's contribution to computer network security is unparalleled.
From this point of view, even Qin Luo would like to admire Martin Hellman!
Of course, admiration means admiration, but this does not prevent Qin Luo from winning the prize.
As a member of the Chinese academic community, he is responsible for the Chinese academic community.
In the face of the first Turing Award trophy in Chinese history, Qin Luo can't just admire it and give it to each other.
Thinking of this, Qin Luo quietly held a glance at the system panel.
He had intended to use his knowledge to deal with the award.
However, the appearance of Martin Hellman put a lot of pressure on Qin Luo, so Qin Luo decided to change his plan and use the system.
Of course, it is not Qin Luo's fear, but the principle of rational utilization of resources.
Anyway, the system is just there. It's a waste if you don't need it
Host: qinluo.
Math LV7
Chinese LV3
English LV3
History LV3
Computer lv6
Physics lv6
"Master: computer hacking technology, hydrogen energy extraction technology, hydrogen energy development technology, graphene extraction technology, nuclear fusion development technology, rocket propulsion manufacturing technology..."
However, they have not seen it with their own eyes. Many of them are far away from today's computer industry, which is still an unsolved mystery.
Now, the inventor of the public key cryptography technology, brought him to the public.
Once they were eager to know public key cryptography, but when Martin Hellman wanted to analyze public key cryptography on the spot, they were still shocked!
This sentence, like a whirlwind, swept people's heads in an instant, shaking people's brains
-
under the stage, Qin Luo rubbed his ears to relieve the discomfort caused by the impact of huge waves.
Of course, his discomfort did not come from Martin Hellman. After all, he had known about Martin Hellman's subject, so he was not too surprised.
His discomfort stems from the exclamation of the crowd eating melons around him.
As loud as you want to be!
Emmmm, to be honest, are you so surprised?
Qin Luo has also heard about public key encryption.
Public key encryption, also known as asymmetric (key) encryption, belongs to the secondary discipline of network security under communication technology. It refers to the encryption method composed of a pair of corresponding unique keys (i.e. public key and private key). It solves the problem of key distribution and management, and is the core of commercial password. In public key encryption system, what is not disclosed is plaintext, but what is public is ciphertext, public key and algorithm.
His main field is in business, a technology that enables secure and efficient Internet transactions, often used to transfer trillions of dollars a day.
At the same time, it can be used to encrypt things.
It's not at all polite to say that Martin Hellman's invention adds a security lock to the dangerous Internet payment.
Martin Hellman's contribution to computer network security is unparalleled.
From this point of view, even Qin Luo would like to admire Martin Hellman!
Of course, admiration means admiration, but this does not prevent Qin Luo from winning the prize.
As a member of the Chinese academic community, he is responsible for the Chinese academic community.
In the face of the first Turing Award trophy in Chinese history, Qin Luo can't just admire it and give it to each other.
Thinking of this, Qin Luo quietly held a glance at the system panel.
He had intended to use his knowledge to deal with the award.
However, the appearance of Martin Hellman put a lot of pressure on Qin Luo, so Qin Luo decided to change his plan and use the system.
Of course, it is not Qin Luo's fear, but the principle of rational utilization of resources.
Anyway, the system is just there. It's a waste if you don't need it
Host: qinluo.
Math LV7
Chinese LV3
English LV3
History LV3
Computer lv6
Physics lv6
"Master: computer hacking technology, hydrogen energy extraction technology, hydrogen energy development technology, graphene extraction technology, nuclear fusion development technology, rocket propulsion manufacturing technology..."
You'll Also Like
-
All Heavens: A Role-Playing System Starting from Tianlong
Chapter 54 9 hours ago -
I am the Immortal Emperor, and I am VIP 50.
Chapter 51 9 hours ago -
That's right, that's what adventure is like!
Chapter 83 9 hours ago -
Don't move, it's a robbery!
Chapter 99 9 hours ago -
Ice Sea Lord: Starting with Intelligence Update
Chapter 92 9 hours ago -
After marrying the fierce god, her handsome young husband was pampered to the extreme.
Chapter 491 9 hours ago -
Era: A college student came to the courtyard house
Chapter 69 2 days ago -
Two Realms: Modern Invasion of Cultivation
Chapter 60 2 days ago -
Three Kingdoms: Conquer Wu from Maicheng with Cavalry and Swords, Don't Fall Behind
Chapter 85 2 days ago -
I was the leader of the righteous path in high school.
Chapter 44 2 days ago