May 5, 2026!

The Blockchain Laboratory of Zhonghu University was officially put into use, and Ye Fei and others entered it and started working.

On the first day of work, Ye Fei called everyone to a meeting to explain the next work plan.

There are a total of ninety people in the laboratory, and the managers are Ye Fei, Lu Yishan, Liu Yisheng, Zhou Kang and Yuan Hua.

The actual manager is Ye Fei, and the other four people only have temporary positions and rarely come to the laboratory.

The rest are divided into researchers, associate researchers, assistant researchers and intern researchers according to their professional titles.

Most of them are assistant researchers and intern researchers, and three of them, Ye Fei, Amata and Balaz, are associate researchers.

Lu Yishan, Liu Yisheng, Zhou Kang and Yuan Hua are researchers.

In the crowded conference room, everyone was sitting at the bottom of the stage, but Ye Fei was the only one sitting on the stage.

Between the stage and the audience, there is a large LCD screen.

Ye Fei controlled the computer, which was connected to an LCD screen with PPT projected on it.

Many school leaders sat in the first row of the audience.

They also want to see how Ye Fei's blockchain laboratory is doing.

Ye Feidao: "The research direction of our laboratory is asymmetric encryption algorithms. There are five traditional asymmetric encryption algorithms."

"But each one has advantages and disadvantages, so we want to create an asymmetric encryption algorithm that is better than these five asymmetric encryption algorithms."

"As we all know, asymmetric encryption algorithms are divided into two parts, one is the public key and the other is the private key."

"Public key encryption, private key decryption."

"The shortcomings in traditional asymmetric encryption algorithms are."

"The amount of calculation required to operate large numbers using public keys is extremely large, and the speed is far inferior to that of private key cryptography systems."

"A considerable part of the password information in public key cryptography must be published, which will inevitably have an impact on the system."

"In public key cryptography, if the public key file is changed, the public key is compromised."

"The key advantage is also obvious, the key distribution is simple."

"The keys are kept in small quantities."

“Satisfies confidentiality requirements for private conversations between people who do not know each other.”

“Digital signatures and digital authentication can be completed.”

"In view of the above advantages and disadvantages, we should retain the advantages and remove the disadvantages."

"I have been studying algorithms for the past few years."

"In the past year, I have also been exposed to encryption algorithms and asymmetric encryption algorithms."

"If you want to develop a more perfect asymmetric encryption algorithm, you can start from the following aspects."

"They are the quadruple prime RSA asymmetric encryption algorithm, JAVA asymmetric encryption algorithm, EPGA asymmetric encryption algorithm, XML asymmetric encryption algorithm and Goldbach's conjecture asymmetric encryption algorithm."

"Based on my research on asymmetric encryption algorithms, encryption algorithms and algorithms, my suggestion is to start with the asymmetric encryption algorithm of Goldbach's conjecture."

"And for greater security, a hashing algorithm is added to it."

When Ye Fei finished speaking, everyone was talking about it below.

Ye Fei's method is very difficult to study.

First of all, Goldbach's conjecture is one of the seven major problems in mathematics.

If an asymmetric encryption algorithm is developed from Goldbach's conjecture, then Goldbach's conjecture must be studied.

This is not to prove Goldbach's conjecture, but to develop an asymmetric encryption algorithm from it.

But even so, the difficulty is very high.

It is equivalent to the difficulty of proving the ABC conjecture.

In addition, adding a hash algorithm to it merges two unrelated things together.

The difficulty goes up a notch again.

These people have never worked with Ye Fei, so they don't know Ye Fei's research capabilities.

The number theory team and others have worked with Ye Fei, and they know Ye Fei's research capabilities.

Therefore, except for the number theory team, everyone else doubted Ye Fei's idea.

"Huh?" Many people wonder: "Is the hash algorithm highly secure?"

"Through de-translation attacks, we can obtain the password of the hash algorithm. Is this highly secure?"

But they knew that Ye Fei was talking at this moment, so it was not easy to ask questions at this time. They could ask questions after Ye Fei finished speaking.

Ye Fei was like a tyrant, scolding: "Quiet!"

When everyone calmed down, Ye Fei continued: "The reason why I chose Goldbach's conjecture to study asymmetric encryption algorithms."

"It's because Goldbach's conjecture specializes in studying prime numbers, and prime numbers study algorithms."

"So Goldbach's conjecture is very beneficial to the study of algorithms."

If an algorithm can be developed from Goldbach's conjecture, then such an algorithm will be the most advanced algorithm. "

Everyone nodded, they agreed with this point.

It's just that Goldbach's conjecture, as one of the seven major problems in mathematics, is very difficult to study.

If you want to study an asymmetric algorithm from Goldbach's conjecture, you must first study Goldbach's conjecture, and then study an asymmetric encryption algorithm from it.

The difficulty is very high!

"Now let me tell you how to study it."

"Everyone knows Goldbach's conjecture, one of the seven major problems in mathematics."

"Any odd number greater than 5 can be divided into the sum of three prime numbers."

"The famous former Soviet mathematician I. Vinogradov used the circle method and the trigonometric sum method he created to prove that large odd numbers can be expressed as the sum of three odd prime numbers. This is the famous three prime number theorem."

"This is also the biggest breakthrough in Goldbach's conjecture so far."

"And in the process of proving Goldbach's conjecture, such a proposition was also put forward."

"Every sufficiently large even number can be expressed as the sum of two numbers with no more than m prime factors and no more than n prime factors. This proposition is abbreviated as m+n. Obviously 1+1 is Goldbach's The basic proposition of conjecture.”

"The three prime number theorem is just a very important corollary."

"In 1966, the famous Chinese mathematician Chen Jingrun improved the sieve method and proved that 1+2, which is a sufficiently large even number, can be expressed as the sum of two numbers."

"One of them is a prime number and the other is either a prime number or the product of two prime numbers."

"This proof result of Chen Jingrun is called Chen's theorem."

"It is also the current record for Goldbach's conjecture research."

"But to prove Goldbach's conjecture, we still need to prove 1+1."

"According to Goldbach's conjecture, a large even number can be obtained by adding two prime numbers."

"That is: E=p+q, p and q are two prime numbers."

"By studying this, we can study asymmetric encryption algorithms from Goldbach's conjecture."

Ye Fei said this, which means that everyone does not need to study Goldbach's conjecture too much, but directly study the problem Ye Fei mentioned.

This greatly saves everyone’s research time and energy.

"Wow..." Everyone in the audience exclaimed.

Ye Fei was amazing. They had never seen it before, and he clearly pointed out the research direction and methods before they even started researching.

This is nothing to study!

You have clearly found your research direction. Are you calling this group of people here just to verify your research direction?

Doing this makes us feel very unfulfilled!

They thought that when they came here, they would spend a long time looking for research directions.

But unexpectedly, Ye Fei pointed out the research direction before starting the research.

There were no exclamations or surprises from the number theory team.

This is Ye Fei, this is their team leader.

Pointing out the research direction in advance is Ye Fei's basic operation.

The people in the number theory group looked at the surprised crowd around them and were speechless: "A group of people who have never seen the world are surprised, are they? What's even more surprising is yet to come!"

When they were researching with Ye Fei, Ye Fei pointed out the research direction.

Moreover, after each study, it was found that the direction pointed out by Ye Fei was correct without any mistakes.

It stands to reason that the research direction should be studied by many people many times, and only after countless trials and errors can the correct research direction be known.

But Ye Fei is just one person. He can know the research direction in advance without going through many studies and countless trials and errors.

As for why Ye Fei knew.

Only God and Ye Fei know.

In other words, Ye Fei may really be a prophet, and knowledge is automatically stuffed into Ye Fei's mind.

There is another possibility that is the most absurd, Ye Fei has a system.

But how is this possible?

They would rather believe that Ye Fei is a prophet than that Ye Fei has a system.

Because the system only appears in novels and cannot appear in reality.

Ye Feidao: "Let's talk about the hash algorithm next."

"The hash algorithm is a secure hash algorithm, a family of cryptographic hash functions, and a secure hash algorithm certified by FIPS."

The hash algorithm is referred to as SHA.

There are five hash algorithms, namely SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.

The latter four belong to SHA-2.

SHA-1 is widely used in many security protocols.

Including TLS and SSL, PGP, SSH, S/MIME and IPsec, it was once considered the successor of MD5.

But the security of SHA-1 is now seriously questioned by cryptographers.

Although there has not yet been an effective attack on SHA-2, its algorithm is basically similar to SHA-1.

So some people started researching other alternative hashing algorithms.

The so-called hash algorithm uses a specific method to combine multiple algorithm characteristics in a complex and chaotic way.

But this is not a random splicing, but a scientific approach to splicing the advantages of multiple algorithms to create a better algorithm.

Just like Algorithm A has the advantage of fast operation speed but the disadvantage of large loading capacity.

Algorithm B has the advantage of small loading capacity and the disadvantage of slow operation speed.

Hash these two algorithms together to achieve the two advantages of fast operation speed and small load capacity.

Ye Feidao: "The hash algorithm has high security, but it also has a very fatal flaw, that is, as long as you can get a string of the specified user's password, you can get the user's password."

“In an asymmetric encryption algorithm, public key encryption is made public and private key decryption is kept secret.”

"We then integrate the hash algorithm into it, and the password of the hash algorithm is locked."

"Plus asymmetric encryption algorithm information cannot be changed."

"It's useless even if you get a string that is a patchwork of the specified user's password."

"He also couldn't change his password."

This is a conspiracy, can't you crack the password?

Okay, let me crack it for you.

But to crack the password, you know the password, but you can't change it.

If you can't change your password, you lose access.

After passing multiple verifications, it is found that you are not a real user, and the account will be temporarily logged out and you will be kicked out of the right to use it.

The account is returned to the real user.

"Wow..." everyone exclaimed.

Everyone was excited: "I never thought that the hash algorithm can be used like this."

"It's amazing, it turns out that the shortcomings of the algorithm can still be used in this way."

"If that's the case, the shortcomings are not shortcomings."

"It's awesome. You can't hide your shortcomings, so you won't hide them and just leave them there. But no one can do anything about them."

"As expected of Ye Fei, a genius is a genius, his brain is just different from that of ordinary people."

"Awesome, team leader!"

"..."

Everyone was amazed and admired!

In the past, they only thought about how to solve and improve shortcomings so that the algorithm would have no shortcomings.

But Ye Fei put the shortcoming there and used another method to make everyone helpless in the face of this shortcoming.

Many leaders sitting in the first row were all brightened up when they heard what Ye Fei said.

The principal smiled at the dean of the School of Mathematics next to him and said, "Young people have very flexible minds. We will definitely not think of this method."

The dean smiled and nodded: "Yes, in fact, we can learn from his method in many places. In the past, we only focused on how to improve the mistakes, but did not think about putting the mistakes there. In another way, even if we know it It’s a mistake, and there’s no way to take advantage of it.”

"Yes!" The principal nodded.

"..."

Ye Feidao: "In this way, the high security of the hash algorithm in other aspects can strengthen the asymmetric encryption algorithm."

The hash algorithm has only this disadvantage, and it has advantages in other aspects of security.

Of course, because this shortcoming is so fatal, many people think that hash algorithms are less secure.

But now that Ye Fei has made everyone unable to do anything about the shortcomings of the hash algorithm, the hash algorithm has become a highly secure algorithm.

Ye Fei: “Adding a hash algorithm to an asymmetric encryption algorithm can make up for all the shortcomings of an asymmetric encryption algorithm.”

"So, it is difficult to add the hash algorithm to the asymmetric encryption algorithm."

"But as long as it succeeds, our asymmetric encryption algorithm will be a very perfect asymmetric encryption algorithm."

"Pah, pah, pah..."

Everyone stood up and applauded fiercely.

No matter how difficult it is, at least they see that the asymmetric encryption algorithm Ye Fei said has a promising future.

If this asymmetric encryption algorithm can really be created, it will be the most advanced asymmetric encryption algorithm in the world.

One of the four core technologies of blockchain, asymmetric encryption algorithm technology is completely solved.

In the future, research on asymmetric encryption algorithms will only be based on Ye Fei's asymmetric encryption algorithm and strengthened.

It is equivalent to say that Ye Fei's asymmetric encryption algorithm will completely solve the problem of insufficient asymmetric encryption algorithm technology at this stage.

Ye Feidao: "Let's first study the asymmetric encryption algorithm in Goldbach's conjecture."

"After that comes the hashing algorithm."

"The hashing algorithm is then integrated into the asymmetric encryption algorithm."

"Research on the asymmetric encryption algorithm of Goldbach's conjecture is divided into three steps."

After hearing what Ye Fei said, everyone in the number theory team took out a small notebook to record it.

They knew that Ye Fei would definitely talk about the research steps.

Every time they heard Ye Fei talking about a meeting, they knew that Ye Fei would definitely talk about the research steps.

Therefore, bring a small notebook to record Ye Fei's research steps.

Many people were shocked when they saw them taking out their little notebooks.

Of course, some people bring notebooks and some don’t.

I saw people in the number theory group taking out small notebooks to record, and those with small notebooks also took out small notebooks to record.

Those who did not bring a small notebook could only take out their mobile phones to record.

Ye Feidao: "First, encryption and decryption are completed by different keys."

"Second, know the encryption algorithm and get the decryption key from the encryption key."

"Third, either of the two keys can be used for encryption and the other for decryption."

Seeing that everyone had recorded it, Ye Fei said, "I won't tell you how to study it specifically. Let's explore it through research."

Everyone nodded, is this right?

If everything is explained clearly to you, what is the point of our study?

Ye Feidao: "If you have any questions in the future research, you can come to me."

"I hope we can develop an epoch-making technology that completely solves the problem of insufficient asymmetric encryption algorithm technology in the blockchain."

“Let Xia Guo’s blockchain technology take off.”

"Pa bang bang..." Everyone applauded enthusiastically again.

This sentence was so exaggerating. Only two people present were foreigners, and the rest were all Xia people.

Everyone wants their motherland to be strong.

The motherland is strong. When you go abroad, you will have face and everyone will respect you.

When Xia people went abroad in the last century, foreigners thought that Xia people were poor and looked down upon them.

Xia State is now the world's largest trading market, with its GDP ranking second in the world and the world's largest consumer.

The economies of some countries are supported by the consumption of Xia people, and half of the houses in some countries are bought by Xia people.

Countries in Asia, in particular, are particularly dependent on the consumption of Xia people.

Therefore, many people now think that Xia people are rich when they look at them.

In addition, Xia's overall strength is among the top two in the world.

Therefore, foreigners dare not look down on Xia people.

Amata and the two were also applauding, but they always felt a little out of place.

Amata is from England and Balaz is from Northern Ireland.

They don't have much affection for Xia Guo, and they only stay because of research.

After the applause stopped, Ye Fei said: "Okay, the meeting is over. We will start doing experiments in the afternoon."

It is already 12 noon. After everyone leaves the conference room, they go to the canteen to eat.

The principal and dean came up. The principal patted Ye Fei on the shoulder and said with a smile: "Young man, do your best, I'm very optimistic about you."

The principal listened to Ye Fei's report all morning, although Ye Fei's idea was very difficult.

But as long as it can be researched, Ye Fei's blockchain laboratory will become popular.

Zhonghu University also became popular.

Regardless of whether it is city, province, or top-level policies, they will all hit Zhonghu University like hail.

By then, it will be difficult for Zhonghu University not to take off. It is possible that Zhonghu University will also establish Xia State’s fourth global blockchain research center.

The remaining three are in Kyoto, Magic City and Pengcheng!

Ye Fei smiled and said: "Thank you, principal, I will not disappoint your expectations."

The principal smiled and said: "If you need anything, please contact me and I will try my best to help you."

"Okay." Ye Feidao.

The dean smiled and said: "Ye Fei, come on!"

"Okay!" Ye Feidao.

Afterwards, they walked outside together.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like