Senior Programmer - Zhao Zhigang ZZ

xiaoxiao2021-03-05  32

http://www.antiy.net/about/index.htm

Zhao Zhigang: One of the founders of Antiy Labs, graduated from Harbin Institute of Technology in 1992. Operating system

, Computer network, information security system, etc. have a building tree. Very deep understanding of the UNIX system

In software programming, he is a senior C / C and assembly programmer. 26 years old is broken into senior engineers, beauty

Guibell Lab special expert.

Zhao Zhigang is an Antiy Labs AHEVPN system proposal, algorithm development kit BNT & CAL SDK, information entrained software in

FO Stego's author, and hosting the development of basic research and development of many other products.

I used a few skilled senior technicians from the circle to always hear the name of "Lao Zhao", and

Great god. Because of the technology is not very, I will listen to the old Zhao, I heard the noun that I heard is almost all.

"Why didn't you read a report about him," If a detainer regrets, because one of them is so good to laugh

Shallowness of the smirk: "Do you think that genius should be a public figure? Don't forget, the real iceberg is under the water."

Out of the awe of genius, the author's interview with "Old Zhao" is starting from his "surrounding characters" in different periods.

"Lao Zhao" is really famous, not old, only 31 years old, its technical history is amazing.

The author understands the meaning of the iceberg metaphor. Indeed, Zhao Zhigang's experience is like hidden water.

odd.

First, the story starting from Harbin Institute

The outstanding programmer in the university is not going to class in the university, do not go to the exam, only hiding in the computer room.

Order, they will be hung red, usually play with fine, only talking about programming technology. Is this like this? Do not

This is just a programs, just as CIH creed - Chen Yinghao's "mad". There is also a programmer, he

They are not only fanatics to study computer technology, but also excellent door homework. Zhao Zhigang must belong to the latter.

With the top ten of the top ten college entrance examination in Heilongjiang Province, Zhao Zhi Gang entered Harbin Institute of Technology, with a number of four years later.

The results and all the transcripts go out of the school. Not only that, because he has reached a new height of academic, some people say this

Some of the number of Harbin Institute of Technology exist in the "shadow" left by Zhao Zhi.

When the big one, Zhao Zhigang's eyes were completely concentrated in UNIX, and even the computer system did not believe that there would be such concertes.

Newborn. At that time, I went deep into UNIX core technology, and the students were still an alpine alpine. Zhao Zhimeo

Relationship borrows the laboratory baby a general S280 manual, such as hunger reading, which lays him later to become a UNIX special

The foundation of home.

Entering the big two, according to Harbin Institute of practice, the development capability is very highlighting students will be transferred to the teaching and research section for teaching courseware

hair. "Lao Zhao" was also touched into the teaching and research room, responsible for the Fortran, who has received the National Science Conference Award.

Courseware development of language compilation systems. His thinking is not limited to teaching courseware, in the department, Wang opened professor guidance

Next, he finally made a very powerful Fortran integrated environment, provided graphic editing, simulation operation,

Interactive compilation and other means.

If we have the contribution of "Lao Zhao" in each of our machines, there may be many people don't believe it, but there is a machine.

This coincidence is made. At that time, Harbin University assumed the development of the national key project voice input system, Wang opened professor

Very appreciation Zhao Zhi Gong's high logical reasoning ability and excellent programming skills, allocating him under the guidance of Wang Xiaolong

Engaged in the rules of the background statement knowledge base. Later, he assisted Wang Xiaolong to design this part into one

An external input method. This is China's first statement level input method Insun 3.0, which is all using MS systems.

There are Microsoft Pinyin in the machine.

Zhao Zhigang showed the talents in grammar rules and score words, and he also participated in the development of Han-Ying machine translation system under the leadership of Zhao Tiejun. This is the national 863 project, he again undertake part of translation

The formulation of the rules. The system reached 3,000 rules in 1991, which was very advanced at the time.

"Lao Zhao" colleagues and several views of the brothers who have a backbone in China is that Lao Zhao is not only technical

Often excellent, and particularly organizational talents. "The first student computer association in Harbin Institute of Technology is his organization.

. "

Some people recalled his "happy life" at the time: "At that time, everyone used 286, he participated in the school's topic, only

He has two 386 servers in the bus, all SCSI hard drives. Let everyone envy. There is also a self in the management building.

The rooms have two 386. At that time, I was almost all the keys of the old Zhao borrowed the computer room.

Video game ".

In 1991, only the "Lao Zhao" of the San 3 had a strong interest in the distributed environment. At that time, the distributed system was still close.

Coupled, loose coupling two types. He creatively puts forward the so-called semi-plenty of half-tight concepts, the system is not simply controlled

Right to transfer or copy copy of the copy, but according to network overhead, system processing overhead, and data usage frequency

Complex mathematical statistical calculation strategy, make decisions for the use of storage objects, while complicating synchronization issues

Constraint. This finally has his graduation thesis - "Management Policy of Distributed Shared Storage System".

The author is lucky to know some of the tidbits related to this from the insider, enough to add a god of his university legend.

Come.

It is very interesting that there were 1 Ph.D. and 2 master's degrees to graduate from his achievements. Hello every day

Looking at the three brothers turned around yourself, he somewhat deliberately arranged three brothers to do some typing for yourself.

Work in poured water.

After the graduation thesis reply, after introducing his results, the reply group first whisper, after the understanding

Strictly harsh Harbin teachers have asked him 40 minutes. No one can be difficult to fall, even there is no question.

The title is within the scope of the papers, after all, this thought is too new. Some people recalled that this is "old Zhao" in the universal legend

The vertex of the calendar.

Second, "he is like coming"

Zhao Zhi Gang and the fate of Bell Lab have started from the university. First of all, from "Old Zhao" to UNIX. He is big

There are many projects that have been involved, but the most invested is still in UNIX. When he came to University in 1988, no matter whether it is

Computer Publishing Industry is still unhappy with foreign technology exchanges, more talking about what Internet view information, Leon

Source code analysis is absolutely not found.

The two materials helped "old Zhao" very busy, one of which is a series of techniques of the Sun 3 / S280 workstation.

Book, this is benefited from the Bank's loan to the 10 universities of China and the 10 universal universities offer several SUN workstations. Another one is a copy

The "oil print version" Unix source code is coming. Although only the core part, the program is very messy, some of them

It is the assembly code on PDP-11, but this is enough for "old Zhao" that is persistent to Unix.

In 1988, these are rare baby, especially the oil-printing material, let Zhao Zhi have learned a lot.

There are a lot of Unix's bugs that have been discovered during his university, mainly two aspects, one is the core coding drain of the system.

The problem of buffer overflow, the other is the issue of the C compiler in UNIX. Due to the lack of technology, the author

Searching on the online search for finding someone is probably a name "buffer overflow" to attack last year

The article of the focus ", according to this time. in this regard. Lao Zhao is definitely the domestic nose.

With the rich experience, he can not only find some vulnerabilities in UNIX, but also have their own ideas. He feels

You need a person who pointing, and I hope he can communicate with yourself.

He dropped his eyes in Unix's cradle-Bell laboratory, starting with a author communication with UNIX. At that time, it was not like now, a mail got. The post office's staff is curious about this young man who is often coming to the international mail.

I thought he had any overseas relationship.

"Lao Zhao" is very modesty: "At that time, picking a bad disease at that time, it is a relatively easy thing, and the system is written.

People from the security perspective are not a lot, nor is it more analyzed and disjected by many people now. If you say

Difficult, that is, the information is too small. From this point, the exchange of point-to-point to foreign experts is too necessary.

"

A senior programmer evaluates the exchange of old Zhao and UNIX authors with a very interesting metaphor. He said: "This is very embarrassing.

Mu, I have written to ask for advice to foreign genius programmers in my mind, but I have never imagined

The seniors giant dialogue, compared with the Guanyin, and he worships. "

The talents of this Chinese college student have attracted the attention of Bell Lab. When the third year, the Bell Laboratory sent a letter.

He can join after graduation.

Although Zhao Zhigang did not travel to Bell Laboratory, the technical exchange has been maintained. 1997, Bei

The laboratory officially invited to be special experts. Bell Lab Hope Zhao Zhijun can go to Bell to carry out two directions

One of them is to establish a security mechanism in the low-level UNIX operating system.

The Bell Lab also invited some Chinese experts to conduct academic exchanges, but like this to directly invite Chinese experts.

It is extremely rare to host the topic research. "Lao Zhao" is very cherishing this honor and opportunity, but the domestic business is

More needed, he can only notify the Bell Lab to postpone the interview period.

Senior engineers aged 3, 26

In the spring of 1992, the passionate university life bank will end. "Lao Zhao" is facing two choices, one is Bell experiment

The call of the room, one is a lot of teachers, and persuade him to continue. What is surprised is that Lao Zhao has gone out of the third road.

He went to the development of a national ministry to participate in a key project.

The new legend begins.

Zhao Zhigang has finally grilled in the operating system. He is responsible for the development of a certain type of safety operating system

Send a private key authentication mechanism section. This is a UNIX architecture system, which is said to reach the B1 level safety standard.

I don't know if there is no industrialization in such a result, it will not be a regret of the developer.

For this stage of work and grades, Lao Zhao did not introduce any introduction, he only said that the results belong to the country. We also

I only know that he has an important contribution to his in a series of work. In 1996, he was brought to a senior engineer 26.

.

Experts who have encountered such an operating system such as "Old Zhao", the author not only asked his views on the independent operating system, especially

It is about many people think that the Chinese can engage in operating systems is impossible and Linux hot. "Why do you feel that

How mysterious system is systematic, how high is something that is not cluched, look at the heat waves of Chinese Linux and change Linux.

Don't you care about the rights of safe operating systems, we need to take a safe operating system

Is Baoguang on Linux? "Lao Zhao talks about this problem with some unique understanding.

"Now, it is always said that key technologies are in the hands of people, have no mistakes are people, operating systems, databases, group parts.

The main software system is also people. But don't go deep, how can you have your own. The chip is kind, after all,

The technical gap is also process problems, but similar operating systems, the database is not our ability to engage in

Be sure to hibernate. Reference is necessary, but moving Linux is not a way, the GPL protocol, you abide by the non-compliance

Linux itself is not very sufficient on the preparation of safety, which is also a congenital system. Linux

Who is it? Who is the database? Who is the group? "

Old Zhao has a sense of worries and a sense of honor unique to that technology genius.

At the beginning of 1994, he assumed a project for a set of large-scale expert systems for a ministry. Because of the high requirements for security, the entrusting party wanted to use foreign database products. There are very few people who can live living throughout the project group.

Zhao Yifang should conduct the planning of the entire project, on the other hand, independently undertake a set of autonomous database systems

task. A set of C / S modes with complete permissions, review, encryption, check, etc., and support SQL

The industry standard database system was born after two months.

When writing this project, it is a C emergency, in order to increase the normative and easy maintenance of the project. database

The planning of the system is completely C , and in some special modules that require very efficient, it is written,

It's a good effect. According to the relevant personnel, the project is the first large project written in C .

Fourth, "The snow in that year, I will go today."

"Old Zhao" gives people feelings are abundant, his attention is not only concentrated in operating systems and network security levels.

On the same field of information security, it is suitable for his good mathematical foundation. In 1995, his personal note

It is intended to focus on information entry and encrypted communication, when the research and development of information camouflage technology in foreign countries, public

I heard that there is a technology that hides the military map in the scenery photo, but it is unknown. "Lao Zhao" heard about this technology

It is also very interested, and he realizes that this technology may have certain information security and future electronic copyright protection.

the value of. Although the information is not found, he still has quickly made a algorithm for bitmap entraining and writing entraining.

In 1996, it was still in hot summer. He spent a few days of spare time and wrote a graphic entrained gadget.

You can take information and other files in BMP. Although the sparrow is small, the five dirt is full, the jacket, compression, encryption, hashing, etc.

The algorithm is used. This is the predecessor of the information entry tool Info Stego. Later, he designed JPEG formats.

Route algorithm. "Amateur time I like a little thing, it is a kind of happiness."

Antiy Labs developers introduced me, "Currently, in addition to the entry algorithm of images and text,

Frequent, the jacket algorithm of the audio file we also design. "

They demonstrate the INFO Stego of Info Stego, which is still in the test phase, after passing, KEY and password verification.

A Word file is magical from a MP3 song file.

"The mechanism of information entraining technology is not complicated, nothing more than converting the inserted file or information into a modified carrier file.

But this change, if the human eye or human ear can not distinguish. What is important is how to specifically for different types of carrier files

Point, design a reasonable entry algorithm. "Old Zhao feels that there is no need to make everyone feel how high

deep.

The safety of the security, "Old Zhao" is as good as it is, and the system security and information security itself should not be separated.

And isolate, safe environments should be combined into an organic whole, so it is safe. This is his one

Extend point. The author feels that "Lao Zhao" is such a unity.

At 1998, long-term high-intensive work and irregular life, let him suddenly serious stomach bleeding, he returned to Harbin Hall

Bine rest, also think about the technical system. In the Harbin Institute of Harbin, Lao Zhao is in Antiy Labs

Under another sponsor of Xiao Xinguang, completed a mature technical idea, they named the program "

Safety Information Channel - Based Ciphertext Transmission System under Key System.

Some things are good things, but many times are subject to objective conditions and foundations, it is difficult to implement immediately, 2 years later, this

A set of options started from Antiy Labs. Their own statement is that "the snow in that year will come today."

5, create an ANTIY LABS

In 1998, 99 years is the hotspots of IT entrepreneurship. At this time, Zhao Zhi Gang did not expect to go to the venue.

You may not think that in 2000 is the golden season of entrepreneurship, but in May this year, Lao Zhao and Xiao Xinguang, that is

Jianghai guest on the Internet, led a group of young doors, began to create a new heaven and earth.

They don't play .com, and even their ideas and transportation a company is also very different, "to the road to Rome" more than one

After a few months of running combination and thinking, they positioned the team's goals in a information security and information technology.

High-end laboratories in the basic research.

They have used names than neighbors, hundreds of people, but they always feel unsatisfactory, they think that the technology created should be

It should be the world, "China should become the information technology output", so they give themselves an English single.

Word Antiy, "We are not .com, not even regular CO, we are us, is Antiy Labs."

"We want to thank the relevant departments and partners to give us strong support, which makes our work very smooth,

As a independent private laboratory, even though we are not strong, we must never lack technology, beliefs and

ambition"

You may not think that a Chinese folk R & D team, the beginning of the establishment, will put your own basic research

Place the challenge IPsec system because IPSec has become a security standard such as VPN.

Things are beginning to efficient VPN from a R & D group of Antiy Labs, although the code optimization is close to the limit

However, the efficiency of small bag communication is still much lower, and then the key links are hardware, but according to

It is ok.

Lao Zhao's calculation of system overhead, concluded that the small bag communication efficiency is the problem of IPSec system itself. for

Further confirming the conclusion, he led the team and tested the VPN products of several well-known foreign companies and found parcel communications.

Efficiency is reduced by almost 90%.

The idea on the IPsec head is mature in the old Zhao head.

Problems and intermediary attacks on IPsec for problems and intermediary attacks on packet communication efficiency under the IPSec system

In August 2000, a new VPN system -Ahevpn architecture finally matures in his mind, AHEVPN system plus

The packet length expansion is greatly reduced, and the impact of the package split on the efficiency of the system is greatly reduced, which can be comprehensive

Improve the efficiency of the virtual private network system, while safety is not reduced, but also against intermediaries against IPsec

The ability is also enhanced.

In the development of a unit, in the development of the model project, the ipsec's embarrassment, their digital network is all the data segment is only 2

2 bytes of parcel communication, because users have security requirements, I hope they are sold with VPN products, but test "

I can't bear to gambling.

Thus, they and Antiy Labs have set up a joint development group, which is led by Lao Zhao. Development of AHEVPN system development

VPN product. After a few months, the problem was successfully resolved.

Lao Zhao said that Antiy Labs plans to open AHEVPN system at the end of this year.

"Antiy Labs has no market sector, we only develop core technology, and the product promotion is a partner.

We only provide high-end support for partners. "

"Antiy will have several fixed technology issues, one is to gradually disclose some of the theoretical and institutional aspects in the professional field.

The results, while distributing some desktop products with new technologies for personal users, these are for technology promotion

"

After more than a year of hard work, many people in many circles feel that Antiy Labs is being taken on their unique ideas.

Step mature.

(Little: Thanks to many friends to contribute to this article)

Postscript: Harbin Institute of Technology

During the interview process of the author, an innative person also told the author a long-awaited secret: "Many people can return

One thing to recall is that the other two leaders of Lao Zhao and at the time, bringing out three of the 89ths. 89th

转载请注明原文地址:https://www.9cbs.com/read-34129.html

New Post(0)