typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 266 Princeton's invitation!

 Hello, Professor Yu Hua, first of all, thank you for submitting your article to the "Annual Review of Mathematics". This is your trust and support for the "Annual Review of Mathematics". Regarding your research results - asymmetric cryptography theory, it can be predicted that the development of cryptography in the world will have a great impact.

An unprecedented revolution, you have greatly improved the security of information transmission in human civilization.

After learning that you are from the National Tsinghua University of China, I, Professor Weyl, and Professor Neumann were very surprised and admired you very much for your important contribution to the development of mathematics in the world as a Chinese scholar.

In order to express our gratitude for your contribution to the development of world mathematics and the security of human information transmission, we have decided to sincerely extend an invitation to you. If you are interested in coming to the United States to engage in cutting-edge mathematical research, please be sure to contact us. The door of Princeton University will always be open to you.

In addition, we also extended an invitation to Professor Hua Luogeng.

Solomon Lefshetz, professor at Princeton University and editor-in-chief of the Annals of Mathematics.

July 1, 1937.

After reading the content of the letter, the autographed letter contained a postcard from the editorial office of the Annual Report of Mathematics, with the autograph of editor-in-chief Solomon Lefshetz written on it.

Obviously, the function of this postcard is exactly the same as Professor von Kármán’s business card.

This is an invitation from Princeton. With this postcard, you can go to Princeton anytime and anywhere to engage in cutting-edge mathematical research.

"If Professor Lefshetz knew that I was a student, I don't know what his reaction would be." Yu Hua read the entire letter with a smile on his face and a touch of interest in his eyes.

Going to Princeton was a necessary journey, but not to engage in cutting-edge mathematical research, but to pursue a master's degree in mathematics and a doctorate in mathematics.

A degree is extremely important in academic circles. The authority and influence of speech are completely different between those with a degree and those without a degree. Yu Hua needs to get a doctorate in mathematics to improve himself.

After putting away the envelope and postcard, Yu Hua smelled the smell of sweat coming from his body. He suddenly remembered what he was supposed to do, said something to Professor Zhao Zhongyao, and then went downstairs with a change of clothes.

It is a good thing that the paper has been published, and it is also a good thing that Professor Zhuang Qianding agreed to join the project. However, this does not prevent him from taking a shower.

Personal hygiene must be done well.

Humming a little tune, Yu Hua happily went downstairs, while a storm in the outside world caused by the results of asymmetric cryptography was brewing.



Asymmetric cryptography theory, with the influence of the Annual Report of Mathematics and the evaluation of three giants of the Institute for Advanced Study in Princeton, continues to ferment and spread, and the popularity remains high. The international mathematics community responded enthusiastically, and the news media continued to follow up. Information from various countries

The department is paying close attention to this research result.

Just as Yu Hua's previous analysis and speculation concluded, after repeated verification and verification to confirm the rigor and correctness of the asymmetric cryptography theory, it has formed a terrifying pressure like a dimensionality reduction attack on the symmetric cryptography used by countries around the world today.

Comprehensively crush symmetric passwords and improve security exponentially.

The question facing the intelligence field in various countries is very simple: to use it or not to use it.

There is only one answer - use.

And it has to be used!

If you reject the asymmetric cryptography theory, your own password will be easily deciphered by the enemy. However, because the enemy uses asymmetric cryptography, it will be unable to decipher it, resulting in a terrible situation of one-way information transparency.

Whether it is economics, politics, or military, one-way information transparency is a nightmare.

No country will allow such a thing to happen, and no country dares to bet that it does not use asymmetric cryptography, and other countries do not use it either.

This is a chain of suspicion in the field of cryptography. As long as one country chooses to follow the asymmetric cryptography theory, then all countries in the world will inevitably enter the era of asymmetric cryptography.

"Sir, the evaluation report on asymmetric cryptography theory has come out. I think we must write new cryptography based on asymmetric cryptography theory. The evaluation results show that asymmetric cryptography is better than symmetric cryptography in all respects." A person from the Office of Naval Intelligence

The colonel officer opened the door, walked in, came to the middle-aged man with the rank of brigadier general, who was the director of the office, and handed over the latest intelligence documents for evaluation and analysis.

The middle-aged brigadier general put down his work, took the intelligence document, glanced at the title "Asymmetric cryptography theory evaluation and analysis report", opened the report document and read it carefully.

This evaluation report is based on the asymmetric cryptography achievement paper co-signed by Hua Luogeng and Yu Hua, making logical assumptions and deductions, and listing data one by one on security, deciphering difficulty, timeliness and so on.

"What will happen if we refuse to use asymmetric cryptography through coercive means?" The middle-aged brigadier general quickly read the entire evaluation report, put it on the table, raised his head, and looked at the colonel with a pair of sharp eyes like an eagle.

"Limited to the scope of the naval intelligence system, then the contents of our naval telegrams will be intercepted and deciphered by the Army Intelligence Agency, FBI, Japanese and Germans. Assuming that the above-mentioned decipherers all use asymmetric cryptography systems, we will not be able to decipher each other's codes.

As a confidant, the colonel officer said with a meticulous face: "You will be dismissed from your post by His Excellency the President. This is a price that you and the Naval Intelligence Agency cannot bear."

Technological progress cannot be blocked by just a ban. The consequences of refusing to use asymmetric cryptography theory are unbearable for any country or organization that needs to transmit information.

The middle-aged brigadier nodded: "Order: The Naval Intelligence Agency immediately organizes cryptography experts to compile a set of asymmetric ciphers based on asymmetric cryptography theory. All symmetric cipher tables in use and backup will be used after the new cipher comes out.

Invalidate and destroy it. Also, try to contact Professor Hua Luogeng and Professor Yu Hua, they must have the most secure asymmetric password."

"Yes, sir!" The colonel raised his hand in salute, turned and left.



In the office of the Japanese Pavilion in Dongjiaomin Lane, Doi Yuan was working at his desk with an extremely serious face. He stared at the evaluation and analysis report on [Asymmetric Ciphers] on the table and read the contents carefully.

As the content continues to go down, the person's facial expression becomes more solemn and gradually changes to solemnity.

"In other words, our red secret-B cipher has fallen behind. In order to ensure security, we must transition to asymmetric ciphers." A few minutes later, Doi Yuan put down the report, rubbed his slightly swollen forehead, and looked at

Looking at the slim and heroic woman in front of him, he said slowly.

"Yes, Your Excellency Doi Madoka." The young woman nodded.

Headache.

Doi Yuan did not expect that this accident would occur before the Great East Asia War.

After the asymmetric cryptography theory was proposed, all the symmetric cryptography in the world were swept into the garbage dump of history almost instantly and became synonymous with backwardness.

Unfortunately, no matter whether it is the latest red secret-B cipher used in accordance with regulations or the JN-25 series ciphers used by the Navy, the underlying logic is a symmetric cipher.

In an instant, the ciphers used for communications throughout Japan were reduced to backward sequences.

This made Madoka Doi, an intelligence giant, extremely uneasy.

No one wants to continue to use backward ciphers. He has no control over the navy. The army must replace the red secret-B cipher as soon as possible and enter the asymmetric cipher era.

"Yoshiko, how long will it take to write a new asymmetric code?" Madoka Doi looked at this confidant from the Kwantung Army and asked.

Madoka Doi has many confidants, the highest-ranking agents, but the one with the highest level of confidentiality is the woman in front of him - Yoshiko Kawashima.

Yoshiko Kawashima answered seriously: "If we can get help from professors at the Department of Mathematics at Imperial Kyoto University and Imperial Nagoya University, it will take about 3 to 5 months."

"I understand. I will report this matter to the base camp immediately and form an asymmetric password writing team as soon as possible. The red secret-B password will be used as usual, but after the new password is written, it needs to be replaced and eliminated immediately to ensure security."

Tu Feiyuan nodded: "Yunzi is performing a latent mission in Tsinghua University. You pass the news to her and try to contact Hua Luogeng and Yu Hua."

"Yes!" Yoshiko Kawashima said seriously.

After saying that, he turned around and left.

"Asymmetric cryptography... I didn't expect that the Chinese could achieve such achievements in the field of mathematics." Looking at Yoshiko Kawashima's leaving back, Madoka Doi's eyes fell on the report on the desk again, his eyes sharp, and he whispered to himself.

The talent and wisdom of the Chinese are truly terrifying. Just two people can bring about earth-shaking changes in the world's cryptographic systems.

The Greater East Asia War must be carried out as soon as possible, and China must not be allowed to rise from its weakness!



The intelligence agencies of various countries have a sense of smell and move very quickly, and they all begin to write encryption algorithms. However, due to the difficulty of constructing an encryption algorithm for asymmetric ciphers, it is temporarily impossible to come up with an effective asymmetric cipher in a short time.

In China, the base area was the first to realize the importance and significance of Yu Hua's research results, and is organizing people to write a set of asymmetric codes. In Nanjing, although Zhongzheng Brother and Lanyishe are bad, they are not stupid either.

Under the influence of the extremely popular asymmetric cryptography theory and password upgrade activities, we also chose to upgrade the cryptography system.

They still understand the importance of information security.

But unlike the base area's self-reliance, the Blue Clothes Society set its sights on Hua Luogeng and Yu Hua, the two creators of the asymmetric cryptography theory and the souls who once deciphered the Japanese army's red code system.

Soon, Tian Hong, an old acquaintance, came to the door.

"Team Leader Tian, ​​this is the first set of encryption algorithms and algorithm password tables. I believe you understand the significance of this information. I hope you will not let down the hard work of Master and me." On the evening of July 6, Tsinghua University Xiyuan No. 28

In the room, old acquaintances who had been away for a long time met. Yu Hua looked at Tian Hong with a kind face and said softly.

After saying that, he handed the asymmetric encryption algorithm and algorithm cipher table to Tian Hong.

Beside, stood Master Hua Luogeng.

"Professor Hua, classmate Yu, thank you. Thank you very much. The country and nation will remember your contribution." Tian Hong looked solemn, took the treasure-like encryption algorithm and password table with his hands, and bowed to Yu Hua and Hua Luogeng.

Acknowledgments.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next