my scientific age

Chapter 266 Princeton's Invitation!

Chapter 266 Princeton's Invitation!
Hello, Professor Yu Hua, first of all, thank you for your contribution to the Annual Report of Mathematics. This is your trust and support for the Annual Report of Mathematics. Regarding your research results - asymmetric cryptography, it is foreseeable that the development of world cryptography will have an unprecedented development. revolution, you have greatly improved the security of information transmission in human civilization.

After learning that you are from the National Tsinghua University of China, I, Professor Weyl, and Professor Neumann were very surprised and admired your important contribution to the development of mathematics in the world as a Chinese scholar.

In order to express our gratitude to you for the development of mathematics in the world and the safety of human information transmission, we decided to sincerely invite you. If you are interested in coming to the United States to engage in cutting-edge mathematics research, please be sure to contact us. The door of Princeton University is always open to you.

In addition, we also extended an invitation to Professor Hua Luogeng.

Solomon Lefschetz, professor at Princeton University and editor-in-chief of the Annals of Mathematics.

1937 7 Month 1 Day.

After reading the content of the letter, a postcard from the editorial office of the Annual Mathematics Report was included in the handwritten letter, with the autograph of Solomon Lefschetz, the editor-in-chief.

Obviously, the function of this postcard is exactly the same as that of Professor von Karman's business card.

This is an invitation from Princeton. With this postcard, you can go to Princeton anytime and anywhere to engage in cutting-edge mathematical research.

"If Professor Lefschetz knew that I was a student, I don't know how I would react." Yu Hua read the entire letter with a smile on his face, and a hint of interest appeared in his eyes.

A trip to Princeton was a must, but not for cutting-edge mathematics, but for a master's in mathematics and a Ph.D. in mathematics.

A degree is extremely important in the academic circle. With and without a degree, the authority and influence of speech are completely different. Yu Hua needs to get a doctorate in mathematics to improve himself.

After putting away the envelopes and postcards, Yu Hua smelled the stench of sweat coming from his body, suddenly remembered what he was supposed to do, said to Professor Zhao Zhongyao, and then went downstairs with a change of clothes.

It is a good thing that the paper is published after the draft, and it is also a good thing that Professor Zhuang Qianding agreed to join the project, but this does not prevent him from taking a bath.

Personal hygiene should be improved.

Humming a little tune, Yu Hua happily went downstairs, while a storm caused by the results of asymmetric cryptography was brewing in the outside world.

……

The theory of asymmetric cryptography, with the influence of the annual report of mathematics and the evaluation of the three Princeton Institute for Advanced Study, continues to ferment and spread, and the popularity remains high. The international mathematics community has responded enthusiastically. The department pays close attention to the research results.

As Yu Hua's previous analysis and speculation concluded, after repeated verifications to confirm the rigor and correctness of asymmetric cryptography, it has created a terrifying pressure of dimensionality reduction and strikes against the symmetric cryptography used by countries around the world today.

Symmetric passwords are rolled in all directions, and the security is exponentially improved.

The question in the intelligence field of various countries is very simple, use it or not.

There is only one answer - use.

And have to use it!
If you reject the theory of asymmetric cryptography, your own password will be easy to be deciphered by the enemy, and the enemy cannot decipher it by himself because of the asymmetric password, resulting in a terrible situation of one-way information transparency.

Whether economic, political, or military, one-way information transparency is a nightmare.

No country would allow such a thing to happen, and no country would bet that it would not use asymmetric encryption, and neither would other countries.

This is a chain of suspicion in the field of cryptography. As long as one country chooses to follow the theory of asymmetric encryption, then all countries in the world will inevitably enter the era of asymmetric encryption.

"Sir, the evaluation report on the theory of asymmetric cryptography has come out. I think we must write a new code based on the theory of asymmetric cryptography. The evaluation results show that asymmetric cryptography is better than symmetric cryptography in all respects." Office of Naval Intelligence, a The colonel opened the door, walked in, and came to the middle-aged man with the rank of brigadier general on the shoulder of the office director, and handed in the intelligence documents for the latest evaluation and analysis.

The middle-aged brigadier general put down his work, took over the intelligence document, glanced at the title "Assessment and Analysis Report of Asymmetric Cryptography Theory", opened the report document and read it carefully.

This assessment report is based on the asymmetric cryptography achievement paper jointly signed by Hua Luogeng and Yu Hua, makes logical assumptions and deductions, and lists data such as security, deciphering difficulty, timeliness, etc. one by one.

"What if we refuse to use asymmetric ciphers by force?" The middle-aged brigadier general quickly read the entire assessment report, put it on the table, raised his head, a pair of eagle-like eyes, and cast it towards the colonel officer.

"It is limited to the scope of the naval intelligence system, then, the content of our naval telegrams will be intercepted and deciphered by the Army Intelligence Agency, the FBI, the Japanese and the Germans. Assuming that all the above-mentioned decipherers use an asymmetric encryption system, we will not be able to decipher each other's passwords. "As a confidant colonel officer, his face is meticulous: "You will be dismissed by His Excellency the President, which is a price that you and the Office of Naval Intelligence cannot bear."

Technological progress cannot be blocked with just a paper ban. The consequences of refusing to use the theory of asymmetric cryptography are unbearable for any country or organization that needs information transmission.

The middle-aged brigadier general nodded: "Order: The Office of Naval Intelligence immediately organizes password coding experts to write a set of asymmetric passwords based on the theory of asymmetric passwords. After the new passwords are released, all the symmetric password tables in use and backup will be Destroy it. Also, try to contact Professor Hua Luogeng and Professor Yu Hua, they must have the most secure asymmetric cryptography."

"Yes, sir!" The colonel saluted and turned away.

……

In the office of the Japan Pavilion in Dongjiaominxiang Lane, Toiyuan was working at his desk with an extremely serious face. He stared at the evaluation and analysis report on [Asymmetric Password] on the desktop with a pair of eyes, and read it carefully.

As the content continued to go down, the facial expressions of the whole person became more and more solemn, and gradually changed to solemn.

"That is to say, our Hongmi-B password has fallen behind. In order to ensure security, we must transition to asymmetric passwords." After a few minutes, Doiyuan put down the report, rubbed his slightly swollen forehead, and turned towards Looking at the slim and heroic woman in front of her, she said slowly.

"Yes, Your Excellency Toi Yuan." The young woman nodded.

Headache.

Toi Yuan did not expect this accident to occur before the Great East Asia War.

After the theory of asymmetric cryptography was proposed, all symmetric cryptography in the world was swept into the garbage heap of history almost in an instant and became synonymous with backwardness.

Unfortunately, the underlying logic is a symmetric cipher, whether it is the latest replacement of the Red Secret-B cipher in accordance with the regulations, or the JN-25 series cipher used by the Navy.

In an instant, the ciphers used throughout Japan's communications were reduced to a backward sequence.

This made Doi Yuan, an intelligence giant, extremely uneasy.

No one wants to continue to use outdated ciphers. The Navy cannot control it. The Army must replace the Red Secret-B cipher as soon as possible and enter the era of asymmetric ciphers.

"Fangzi, how long will it take to write a brand new asymmetric cipher?" Doi Yuan looked at the confidant from the Kwantung Army and asked.

Toi Yuan has many henchmen, and the highest-ranking agent is the only woman in front of him with the highest level of secrecy, Yoshiko Kawashima.

Yoshiko Kawashima replied earnestly: "If you can get help from the professors of the Department of Mathematics at Imperial Kyoto University and Imperial Nagoya University, it will take about 3 to 5 months."

"I understand, I will report this matter to the base camp immediately, and the asymmetric password writing team will be assembled as soon as possible. The red secret-B password will be used as usual, but after the new password is written, it needs to be replaced and eliminated immediately to ensure security." Tu Feiyuan nodded: "Yunzi is on a lurking mission in Tsinghua Garden. You send her a message and try to contact Hua Luogeng and Yu Hua."

"Yes!" Kawashima Fangzi said rightly.

The words fell, turned and left.

"Asymmetric cryptography... I didn't expect Chinese people to achieve such success in mathematics." Looking at the back of Kawashima Yoshiko leaving, Doi Yuan's eyes fell on the report of the table case again, his eyes were sharp, and he whispered to himself.

The talent and wisdom of the Chinese people are really terrifying. Just two people can make earth-shaking changes in the world's cryptographic system.

The Great East Asia War must be carried out as soon as possible, and China must not be allowed to rise from weakness!
……

The intelligence departments of various countries have a very fast sense of smell and action, and they have started to write encryption algorithms at the same time. However, due to the difficulty of constructing encryption algorithms of asymmetric ciphers, it is temporarily impossible to come up with a set of effective asymmetric ciphers in a short time.

On the domestic side, the base area was the first to realize the importance and significance of Yu Hua's research results, and is organizing people to write a set of asymmetric ciphers. In Nanjing, although the old brother Zhongzheng and the Blue Clothes Club are bad, they are not stupid. Under the influence of the extremely popular asymmetric cryptography theory and cryptographic upgrade activities, they also chose to upgrade the cryptographic system.

They still understand the importance of information security.

However, unlike the self-reliance in the base area, the Blue Shirt Club's eyes fell on Hua Luogeng and Yu Hua. These two are the creators of the asymmetric cryptography theory and the souls who once deciphered the Japanese army's red cryptography system.

Soon, Tian Hong, an old acquaintance, came to the door.

"Team Leader Tian, ​​this is the first set of encryption algorithm and algorithm password table. I believe you understand the meaning of this document. I hope you will not disappoint Master and my hard work." On the evening of July 20th, Tsinghua Xiyuan No. [-] In the No. [-] room, old acquaintances who had been away for a long time met, Yu Hua looked at Tian Hong with a kind face, and said softly.

The words fell, and handed the asymmetric encryption algorithm and algorithm password table to Tian Hong.

Beside him, stood Master Hua Luogeng.

"Professor Hua, Student Yu, thank you, thank you very much, the country and the nation will remember your contribution." Tian Hong looked solemn, took the treasure-like encryption algorithm and password table with both hands, and bowed to Yu Hua and Hua Luogeng Thanks.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like