From a university student to a chief academician

Chapter 121 Ye Fei's Research Direction

Chapter 121 Ye Fei's Research Direction

On November 2025, 11, in the afternoon, Ye Fei flew to Kyoto.

After arriving in Kyoto, I left the airport and took a taxi to the gate of a manor called 'Yizhu' in the suburbs.

After getting off the car, Ye Fei looked around.

The manor looks magnificent and full of nobility, just like the residence of an ancient prince.

From the outside, the estate occupies a large area.

At the gate of the manor, stood two young men in neat suits.

Many people lined up with invitations, and the two young men held a black machine in their hands. They scanned the invitations, looked down at the machines in their hands, and let people in.

Ye Fei also lined up at the end of the line, moving forward with the flow of people.

"Professor Ye!" At this time, someone called Ye Fei.

Ye Fei turned around in doubt, and said with a smile, "Professor Yue."

The person who came was a kind-hearted middle-aged man with a fat face and a round face.

Yue Fei, whose name is the same as the ancient national hero Yue Fei, has the same pronunciation but different characters.

Yue Fei is an honorary member of the Number Theory Association. Since both of them are studying Gaussian conjecture, they have had academic exchanges by e-mail.

Therefore, the two are fairly familiar.

Yue Fei is a professor of mathematics at Kyoto University. He is only 35 years old this year. Among all mathematics professors under the age of 40 at Kyoto University, his ability can be ranked in the top ten.

Ye Fei withdrew from the team, walked to Yue Fei's side, and said with a smile, "I didn't expect Professor Yue to come, too."

"Haha..." Yue Fei laughed, dimples appeared on both sides of his face, and said, "If you can come, of course I can come too."

"We all study number theory, and naturally we also have research on cryptography."

This is common sense because 90.00% of cryptography is number theory.

So, even if you don't deliberately study cryptography.

As long as you study number theory, you will study cryptography.

Yue Fei said: "I heard that this conference is of a very high standard. A conference with such a high standard must not simply discuss cryptography."

"Huh?" Ye Fei raised his eyebrows and asked, "Professor Yue, do you know the details?"

"I don't know!" Yue Fei shook his head: "I asked many people about this conference before this, such as Kang Jiachen, the president, and some honorary members of the association, but I didn't get any information."

"So mysterious?" Ye Fei said in astonishment: "A conference of this size is held so mysteriously. Could it be that they want to conduct research on state secrets?"

"Maybe." Yue Fei said, "I haven't encountered such a thing, but I've heard of it."

"Almost more than ten years ago, in 2013, when the country wanted to develop nuclear power, many mathematicians and physicists were convened to hold a coordination meeting for independent innovation of third-generation nuclear power technology cooperation to jointly develop Hualong One."

"After nearly ten years of research, in 2022, Hualong One will be developed."

"And my country's nuclear power has also changed from weak to strong."

"The size of the coordination committee at that time was about the same."

Ye Fei took a deep breath and said, "Then today's conference will not be easy."

"Yes." Yue Fei said.

Ye Fei couldn't laugh or cry: "I feel like I was tricked by the dean of my college."

"Huh?" Yue Fei asked interestedly, "How did you get tricked?"

"I told the dean of my college at the beginning that I didn't want to study cryptography. He agreed, but he asked me to come to the conference and said that I would not discuss whether to study cryptography until after the conference."

Ye Fei shook his head and said, "You see, all of us have come here, and knowing that this may be a research that is very helpful to the country. If I withdraw at this time, I will not only feel embarrassed, but also feel uncomfortable."

"Haha..." Yue Fei laughed loudly: "Then you were indeed tricked by the dean of your academy."

"Why don't you want to study cryptography?" Yue Fei asked, "You also study number theory. Studying cryptography is also helpful to study number theory."

"You know, I was studying the Gaussian conjecture, and now I have studied the second problem of the Gaussian conjecture, the second small problem of the Gaussian class number conjecture of the imaginary quadratic field. The elliptic curve has been completed, and only the modular form is left. gone."

"What?" Yue Fei's eyes widened in surprise, "You're so fast, you've even completed the research on elliptic curves?"

"I remember that you have only studied Gaussian conjecture for a little over a year!"

"Yes!" Ye Fei said.

"You..." Yue Fei didn't know what to say.

He studied the Gaussian conjecture five years ago, and only now has he studied the first small problem of the second problem of the Gaussian conjecture.

And the first small problem has not been studied yet.

On the other hand, Ye Fei started his research later than him, his research speed was faster than him, and his research progress was higher than his.

It's only been one year!

Yue Fei's heart seemed to be pricked, it was very painful and uncomfortable.

From childhood to adulthood, he has always looked down in his studies. He has never experienced the attitude of looking up, but now he has experienced it.

Yue Fei took a deep breath, suppressed his panic, then looked at the team, and said in a muffled voice, "Ye Fei, let's go to line up!"

"it is good!"

Immediately, the two walked to the end of the line and lined up.

But Ye Fei found that Yue Fei, who was originally quite active, seemed to be silent.

After a long time, he began to speak.

After inspection, the two entered the manor.

The inside of the manor is really big and the decoration is antique.

Stepping into the gate, there is an avenue paved with bluestone bricks, leading directly to the depths.

There are many bamboos planted on both sides of the road. It is late autumn at this time, and the bamboo leaves are withered and yellow.

Everyone walked forward along the avenue, passed through three courtyards, and finally entered a large room.

There are one chair and one chair in the big room, and there are more than 300 chairs by visual inspection.

Two meters in front of the chairs, there is a whole row of tables with conference microphones on them.

Ye Fei and Yue Fei sat down at random.

Almost half an hour or so, all seats are full.

After another few minutes, a group of people walked behind the table and sat down.

The middle-aged man sitting in the middle patted the microphone in front of him, and said, "Hi, mathematicians, I am Si Zhang Sui Zuyun from the Security Department, and I will preside over the meeting this time."

"With information security..."

He did a report for about an hour.

"This time everyone is called together to solve the current information crisis."

"Our current research directions are innovations in cryptographic algorithms, cryptographic mechanisms, and certificate structures."

"I would like to ask everyone to brainstorm on what methods should be used to conduct research from these three aspects."

Yue Fei said to Ye Fei beside him, "Ye Fei, do you have any good ideas?"

Ye Feidao: "I think in terms of cryptographic algorithms, the trusted computing cryptographic module should be redefined. In terms of cryptographic mechanisms, symmetric cryptography and public key cryptography should be combined. In terms of certificate structure, a dual-certificate structure should be adopted."

"Expand and talk about it in detail," Yue Fei said.

Ye Feidao: "As we all know, TCM is the hardware template of the trusted computing platform, which provides cryptographic computing functions for the trusted computing platform, and has a protected storage space."

"And symmetric cryptography, combined with public-key cryptography, increases security and efficiency."

"Dual certificate structure simplifies certificate management and improves usability and manageability."

After listening to Ye Fei's words, Yue Fei nodded and said, "I think so too. In terms of encryption algorithm, I think it should be improved on the basis of using the gift algorithm and the persistent algorithm."

"The combination and improvement between them can make the structure simpler and more efficient."

"And when running on FPGAs, there is still room for improvement in performance."

"By optimizing the 40 rounds of iterative calculations of the algorithm to 20 rounds, the encryption and decryption and round key generation operations are executed in parallel."

Ye Fei shook his head and said, "Although your encryption algorithm is advanced and has a lot of room for future development, it is not yet mature. Instead, I prefer the SM2 encryption algorithm that has been developed for many years."

The SM2 cryptographic algorithm has been around for many years, and many companies, banks, and government agencies around the world have established cryptographic algorithms based on SM2.

"Of course, we have to innovate. How can we create new algorithms without innovation?"

"You can combine SM2 and SM4, these two algorithms, to form a hybrid cryptosystem."

"The SM2 algorithm is an asymmetric encryption algorithm, while SM4 is a packet data, symmetric encryption algorithm."

"They both have high security and complement each other's capabilities."

"The first thing to create an algorithm is to have high security, so such an algorithm is just right."

In addition to SM2 and SM4, there are also SM1 and SM3.

SM1 is symmetric encryption, SM2 is asymmetric encryption, SM3 is information summary algorithm, and SM4 is a packet data algorithm of wireless local area network standard.

Yue Fei nodded inwardly, thinking that what Ye Fei said was also feasible.

He shook his head again and said, "I still think my idea is good. Although your algorithm is very good, there is no room for improvement."

"My algorithm is novel, and it may not be as secure as yours, but the future room for improvement is higher than your algorithm."

Ye Feidao: "The future of your algorithm is full of unknowns. We should solve the current difficulties instead of thinking about the unknown future."

"Moreover, the information security that the country is now facing is imminent, and there is no time for you to do experiments."

Yue Fei and Ye Fei, their thoughts.

A novelty, but with great room for future development.

One is old. Although there is no room for development in the future, it is stable and has a high safety factor.

If Ye Fei makes a novel cryptographic algorithm, he can do it too.

But the current situation does not allow him to do novel cryptographic algorithms.

Novel means unknown.

Yue Fei said: "The situation is imminent, but we can sacrifice part of our interests to gain a long-term future."

Ye Fei shook his head and said, "Why do we have to sacrifice part of our interests? We have to race against the clock and not give up an inch of land."

Sui Zuyun looked at the noisy people below, just like a vegetable market, and some people were arguing red-faced.

He didn't stop it either. Only when there are disputes can there be a conclusion, and the truth will be revealed after arguing and arguing.

Sui Zuyun said to the people around him: "Let's go drink some tea and let these mathematicians quarrel!"

"Okay!" Several people replied.

After speaking, they stood up and sat down to drink tea in the small private room next door.

Sui Zuyun said: "By the way, is Ye Fei from Zhonghu University here?"

Ye Fei left a deep impression on him. During the meeting, Si Zhang from the Department of Education and the Department of Science and Technology both mentioned Ye Fei.

Afterwards, he also conducted investigations, and Ye Fei was indeed a genius.

"Here we are." Someone replied, "I specifically contacted the dean of the School of Mathematics at Zhonghu University and asked Ye Fei to come to the meeting."

"En!" Sui Zuyun nodded.

About an hour later, Sui Zuyun heard the sound from the room next to him seem to have subsided a little.

He said to everyone: "Everyone, those mathematicians should have had enough noise, let's go and have a look!"

"it is good!"

After speaking, everyone put down their teacups and returned to the big room.

After Sui Zuyun sat down, he laughed into the microphone and said, "Everyone, have you had enough quarrel, have you found the answer?"

One of them stood up and said: "Mr. Sui, I think the large-state lightweight block cipher Gimli and Xoodoo algorithms should be used in the encryption algorithm. The advantages of these two algorithms are fewer logic gates, low power consumption, and accelerated encryption. Many advantages."

This person is known to many people present. His name is Cao Wencan, a fourth-level full professor at Kyoto University, a famous cryptography expert in Xia Guo, and an executive director of Xia Guo Cryptography Society.

Another person stood up and said, "I object. I think the ESF cryptographic algorithm should be used. The ESF cryptographic algorithm has the capability of differential fault attacks, which can well resist external intrusions and carry out counter-attacks."

Many people present here also know this person. His name is Fang Yongchang. He is a fourth-level full professor of Shuimu University, a famous expert in cryptography in the Xia Kingdom, and an executive director of the Xia Kingdom Cryptography Society.

"These two are fighting again." Many people thought in their hearts.

Cao Wencan and Fang Yongchang did not get along in the Cryptography Society, and they often quarreled because of academic issues.

Cao Wencan said: "The defense capability of the ESF encryption algorithm is very weak, and its main function is to attack."

"In this way, it is easy for the enemy to break through the defense."

Fang Yongchang said: "It is possible to break through, but ESF can hit the enemy, and offense is the best defense."

Cao Wencan said: "You do this..."

Sui Zuyun waved his hand and said, "Okay, both of you, stop arguing."

"Ye Fei, is Ye Fei from Zhonghu University here?"

"Ye Fei, what's your name?" Yue Fei asked.

Ye Fei was surprised and wondered, this person knows me?

He stood up and said, "Boss Sui!"

"Tell me, what method should be adopted?" Sui Zuyun looked at Ye Fei and said.

Ye Feidao: "A hybrid combined cipher algorithm of SM2 and SM4 should be used."

"This enables collection of heterogeneous edge devices..."

Ye Fei talked for more than ten minutes, telling the advantages and disadvantages of SM2 and SM4.

And according to the current situation, explain why SM2 and SM4 should be used.

Ye Feidao: "Of course, SM2 and SM4 are not very novel. The advantage lies in their high safety factor."

"But we're going to address the current situation, it has to be."

"President Sui said earlier that the current research directions are three, cipher algorithm innovation, cipher mechanism innovation, and certificate structure innovation."

"I think we can go a little further."

"Huh?" Sui Zuyun said in astonishment: "Then tell me, how to extend it?"

Ye Feidao: "I know that everyone likes to seek innovation when doing research. In fact, I also like to seek innovation."

"Using SM2 and SM4 to create a cryptographic algorithm, in fact, it has one of the biggest advantages."

"In addition to cryptographic algorithms, cryptographic mechanisms, and certificate structures, we can also innovate active immune architectures."

"Overcome TPM passive hook calls for TCG components..."

"This can usher in a new era of Trusted Computing 3.0."

"What is the new era of trusted computing 3.0? Represented by Xia Guo, breakthroughs have been made in system immunity, node virtual dynamic chain, host + trusted dual nodes, active immunity, and trusted immune architecture."

"Reinventing Trusted Computing."

"In this way, not only can we defend against external attacks, but in the credible era, the country of Xia can be the master."

Credible 1.0 is represented by the world's fault-tolerant block, and 2.0 is represented by TCG.

TCG Chinese name is Trusted Computing Group, which is an organization composed of AMD, HP, IBM, Intel and Microsoft.

This is an organization that is completely dominated by Western countries, to be precise, it is an organization that is dominated by the North Li country.

Everyone looked at Ye Fei in surprise.

Young people don't talk about martial arts, we are still discussing how to defend against external attacks, but you are better off, just re-establish the rules of trusted computing, and let Xia Guo decide.

The idea is very bold!

Yue Fei stared at Ye Fei dumbfounded, "Fuck, I thought my idea was very novel, but compared with yours, it pales in comparison.

This idea was discovered by Ye Fei when he was studying number theory. Xia Guo could only do so if he wanted to achieve cornering overtaking on trusted computing.

Sui Zuyun looked at Ye Fei in astonishment, young man, you seem to be out of line.

We are talking about how to defend against foreign cyber attacks, and you are talking about re-enacting the era of trusted computing.

Well, although there is a connection between them, this span is too large.

Sui Zuyun said: "That...Ye Fei, the cryptographic algorithm you mentioned is very good, I still agree, but to create a new era of trusted computing 3.0, I think let it go!"

Ye Fei let out a sigh of relief, and said, "I didn't say to create a new era of Trusted Computing 3.0, I just said all possible situations."

Sui Zuyun said: "If you have nothing else to say, just sit down!"

After Ye Fei sat down, Sui Zuyun said, "Does anyone have any other opinions?"

Afterwards, everyone was chatting again.

Sui Zuyun said: "Okay, let's vote!"

"Raise your hand if you agree with the Gimli and Xoodoo cryptographic algorithms!"

In an instant, more than 100 hands were raised.

"Don't let go of your hands, I say put them down and put them down again."

Someone counts the number of hands raised.

After a long time, Sui Zuyun said: "Okay, let go."

"If you agree with the ESF encryption algorithm, please raise your hand!"

In an instant, more than 100 hands were raised again.

"Raise your hand if you agree with the SM2 and SM4 encryption algorithms!"

In an instant, more than 100 hands were raised.

After a while, Sui Zuyun knew the votes counted, and he said: "The current situation is that the Gimli and Xoodoo encryption algorithms, the ESF encryption algorithm, and the SM2 and SM4 encryption algorithms have the same votes."

Sui Zuyun raised his wrist, glanced at his watch, and said, "It's noon now, let's go to dinner, we'll discuss this matter at two o'clock in the afternoon."

Immediately, everyone stood up and went down to eat under the leadership of the staff.

The private room next door!

Sui Zuyun and some people gathered here.

Sui Zuyun looked at a middle-aged man and said, "Academician Nan, tell me, what should we do now?"

"It's very simple!" Academician Nan said: "Let them compete among three parties, and whoever creates the best encryption algorithm will use whose encryption algorithm."

Sui Zuyun's eyes lit up, and said: "This is a good way, so that we can see whose encryption algorithm is the best."

Everyone nodded and agreed with this method.

Sui Zuyun was embarrassed again: "But how to compete? Could it be that they can create a complete cryptographic algorithm? That one person can't create it, and it will take a long time."

"It will be a few years before they are created, and we can't afford to wait!"

Academician Nan said: "To put it bluntly, the encryption algorithm is the application of mathematics. I think they can use mathematics knowledge to compete."

"A math problem?" Sui Zuyun asked.

"No!" Academician Nan shook his head: "You can use NIST, let them assume the algorithm in NIST, and then you can compete."

One of the functions of NIST is the framework of post-quantum cryptography algorithms, which can be run after adding algorithms.

With different algorithms, the functions and capabilities of NIST's cryptographic algorithms are also different, which is equivalent to a simulator.

Someone at the side explained to Sui Zuyun what NIST is.

After listening to the explanation, Sui Zuyun nodded: "Okay, let's use this method, so that we can detect which of the three parties said that the encryption algorithm is better."

"Through the competition, we can see the advantages and disadvantages of the cryptographic algorithms created by the three parties. We are more at ease when we study in this direction."

Everyone nodded, agreeing with Sui Zuyun's statement.

At two o'clock in the afternoon, Sui Zuyun said: "After our discussion, we decided that three professors, Cao Wencan, Fang Yongchang, and Ye Fei, will use NIST to conduct a square encryption algorithm competition. Whoever wins will use whose scheme."

Cao Wencan and Fang Yongchang looked at each other secretly, their eyes full of fighting spirit.

As for Ye Fei, they didn't take it seriously.

Ye Fei doesn't specialize in algorithm research, so they don't pay much attention to it.

If a non-professional defeated the two professionals, it would be a big joke.

Therefore, they believed that the winner must be between the two of them.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like