Chapter 151 Genius Ideas

October 2026, 5!
The blockchain laboratory of Zhonghu University was officially put into use, and Ye Fei and others entered it to start working.

On the first day of work, Ye Fei called a meeting with everyone to explain the next work plan.

There are 90 people in the laboratory, and the managers are Ye Fei, Lu Yishan, Liu Yisheng, Zhou Kang and Yuan Hua.

The actual manager is Ye Fei, and the other four are only on temporary assignments, and hardly ever come to the laboratory.

The rest are divided into researcher, associate researcher, assistant researcher and intern researcher according to their professional titles.

Most of them are assistant researchers and intern researchers, Ye Fei, Amata and Balaz are associate researchers.

Lu Yishan, Liu Yisheng, Zhou Kang and Yuan Hua are researchers.

In the crowded conference room, everyone sat under the stage, and Ye Fei was the only one sitting on the stage.

Between the stage and the audience, there is a large LCD screen.

Ye Fei controls the computer, and the computer is connected to the LCD screen, on which PPT is projected.

There are many school leaders sitting in the first row of the audience.

They also want to see what Ye Fei's blockchain laboratory is doing.

Ye Feidao: "The research direction of our laboratory is asymmetric encryption algorithm. There are five traditional asymmetric encryption algorithms."

"But each has advantages and disadvantages, so we want to create an asymmetric encryption algorithm that is better than these five asymmetric encryption algorithms."

"As we all know, the asymmetric encryption algorithm is divided into two parts, one is the public key and the other is the private key."

"The public key encrypts, and the private key decrypts."

"The shortcomings in traditional asymmetric encryption algorithms are."

"The public key operates on large numbers, and the amount of calculation is particularly huge, and the speed is far inferior to that of the private key cryptosystem."

"A considerable part of the cryptographic information in public key cryptography will be published, which will inevitably have an impact on the system."

"In public key cryptography, if the public key file is changed, the public key is compromised."

"The advantages of the key are also obvious, and the key distribution is simple."

"The amount of keys saved is small."

"It can meet the confidentiality requirements of private conversations between people who don't know each other."

"Digital signature and digital authentication can be completed."

"In view of the above advantages and disadvantages, we should retain the advantages and remove the disadvantages."

"I have been studying algorithms for the past few years."

"In the past year, I have also been exposed to encryption algorithms and asymmetric encryption algorithms."

"If you want to research a more perfect asymmetric encryption algorithm, you can start from the following aspects."

"They are quadruple prime number RSA asymmetric encryption algorithm, JAVA asymmetric encryption algorithm, EPGA asymmetric encryption algorithm, XML asymmetric encryption algorithm and Goldbach's conjecture asymmetric encryption algorithm."

"Based on my research on asymmetric encryption algorithms, encryption algorithms and algorithms, my suggestion is to start with the asymmetric encryption algorithm of Goldbach's conjecture."

"And in order to improve higher security, add a hash algorithm to it."

When Ye Fei finished speaking, everyone discussed below.

The method Ye Fei said is very difficult to research.

First of all, Goldbach's conjecture is one of the seven difficult problems of mathematics.

If the asymmetric encryption algorithm is developed from Goldbach's conjecture, then it is necessary to study Goldbach's conjecture.

It is not to prove Goldbach's conjecture, but to develop an asymmetric encryption algorithm from it.

But even so, the difficulty is very high.

It is equivalent to the difficulty of proving the ABC conjecture.

In addition, a hash algorithm is added to it to integrate two irrelevant things together.

Difficulty level up again.

These people have never worked with Ye Fei, so they don't know Ye Fei's research ability.

The number theory team and others have worked with Ye Fei, and they know Ye Fei's research ability.

Therefore, except for the number theory group, everyone else questioned Ye Fei's ideas.

"Huh?" Many people wondered: "The hash algorithm is highly secure?"

"Through a reverse translation attack, you can obtain the password of the hash algorithm. Is this safe?"

But they knew that Ye Fei was talking at the moment, so it was not easy to ask questions at this moment, and they could ask questions after Ye Fei finished speaking.

Like a tyrant, Ye Fei scolded, "Quiet!"

After everyone quieted down, Ye Fei continued: "The reason why I chose Goldbach's conjecture to study the asymmetric encryption algorithm."

"It's because Goldbach's conjecture is dedicated to the study of prime numbers, and prime numbers are used to study algorithms."

"So Goldbach's conjecture is very beneficial to the study of algorithms."

If an algorithm can be developed from Goldbach's conjecture, then such an algorithm will be the most advanced algorithm. "

Everyone nodded, they agreed with this very much.

It's just that Goldbach's conjecture, as one of the seven major problems in mathematics, is very difficult to study.

If you want to develop an asymmetric algorithm from Goldbach's conjecture, you must first study Goldbach's conjecture, and then develop an asymmetric encryption algorithm from it.

The difficulty is very high!
"Now let me talk about how to research."

"Goldbach's conjecture is known as one of the seven great problems of mathematics."

"Any odd number greater than 5 can be divided into the sum of three prime numbers."

"I. Vinogradov, a famous mathematician in the former Soviet Union, used the circle method and the triangle sum method he created to prove that a large odd number can be expressed as the sum of three odd prime numbers. This is the famous three prime number theorem."

"This is also the biggest breakthrough of Goldbach's conjecture so far."

"In the process of proving Goldbach's conjecture, such a proposition was also raised."

"Every sufficiently large even number can be expressed as the sum of two numbers with no more than m prime factors and no more than n prime factors. This proposition is abbreviated as m+n. Obviously, 1+1 is exactly Goldbach's The basic proposition of conjecture."

"The three prime number theorem is just a very important corollary."

"In 1966, Chen Jingrun, a famous Chinese mathematician, improved the sieve method and proved that 1+2 is a sufficiently large even number, which can be expressed as the sum of two numbers."

"One of them is a prime number, and the other is either a prime number or the product of two prime numbers."

"The result of Chen Jingrun's proof is called Chen's Theorem."

"It is also the highest record of Goldbach's conjecture research."

"But to prove Goldbach's conjecture, it is still necessary to prove 1+1."

"According to Goldbach's conjecture, a large even number can be obtained by adding two prime numbers."

"Both: E=p+q, p and q are two prime numbers."

"Studying this, we can study the asymmetric encryption algorithm from Goldbach's conjecture."

Ye Fei said this, which means that people don't need to study Goldbach's conjecture too much, but directly study the problem Ye Fei said.

This saves a lot of research time and energy.

"Woo..." Everyone in the audience exclaimed.

Ye Fei was stunned, they had never seen it before, and they clearly pointed out the research direction and method before they started the research.

This is still a fart!
You have clearly found the research direction, and you called us this group just to verify your research direction!
Doing so makes us feel unfulfilled!

They thought that coming here would take a long time to find research directions.

But unexpectedly, before the research started, Ye Fei pointed out the research direction.

The people in the number theory group did not exclaim or be surprised.

This is Ye Fei, and this is their team leader.

It is Ye Fei's basic operation to point out the research direction in advance.

The members of the Number Theory Team looked at the surprised crowd around them, speechless in their hearts: "A group of people who have never seen the world, are they surprised? The ones who are even more surprised are yet to come!"

When they and Ye Fei were researching, the research direction was pointed out by Ye Fei.

Moreover, after every research, it was found that the direction Ye Fei pointed out was correct without any mistakes.

It stands to reason that the research direction should be the correct research direction after many times of research by many people and countless times of trial and error.

But Ye Fei is just him, and he knows the research direction in advance without many times of research and countless trials and errors.

As for why Ye Fei knew.

Only God and Ye Fei know.

In other words, Ye Fei might really be a prophet, and the knowledge was automatically stuffed into Ye Fei's mind.

Another possibility is the most absurd, Ye Fei has a system.

But how is this possible?

They would rather believe that Ye Fei is a prophet than believe that Ye Fei has a system.

Because the system only appears in novels, it cannot appear in reality.

Ye Fei said: "Next, let's talk about the hash algorithm."

"The hash algorithm is a secure hash algorithm, a family of cryptographic hash functions, and a secure hash algorithm certified by FIPS."

The hashing algorithm is called SHA for short.

哈希算法有五种,分别是SHA-1、SHA-224、SHA-256、SHA-384和SHA-512。

The latter four belong to SHA-2.

SHA-1 is widely used in many security protocols.

Including TLS and SSL, PGP, SSH, S/MIME and IPsec, which were once regarded as the successor of MD5.

But the security of SHA-1 is now seriously questioned by cryptographers.

Although there has not been an effective attack on SHA-2 so far, its algorithm is basically similar to SHA-1.

So some people began to study other alternative hashing algorithms.

The so-called hash algorithm is to use a specific method to splice together the characteristics of various algorithms in a complex and chaotic manner.

But this is not a random splicing, but the advantages of multiple algorithms are spliced ​​​​in a scientific way to create a better algorithm.

Just like Algorithm A has the advantages of fast operation speed and the disadvantage of large loading capacity.

Algorithm B has the advantages of small load and the disadvantage of slow operation speed.

Combining these two algorithms together can form the two advantages of fast operation speed and small load.

Ye Feidao: "The hash algorithm is highly secure, but it also has a very fatal shortcoming, that is, as long as you can get the string assembled from the specified user's password, it is possible to get the user's password."

"In an asymmetric encryption algorithm, the public key encryption is open to the public, and the private key decryption is kept secret."

"We then integrate the hash algorithm into it, and the password of the hash algorithm is locked."

"In addition, the asymmetric encryption algorithm information cannot be changed."

"It's useless even if you get the string of the designated user's password."

"He can't change the password either."

This is a conspiracy, can't you crack the password!

Okay, let me break it down.

But crack the password, know the password, but you can't change the password.

Without being able to change your password, you lose access.

After multiple verifications, if you find that you are not a real user, your account will be temporarily logged out and you will be kicked out of the right to use it.

The account is returned to the real user.

"Woo..." Everyone exclaimed.

Everyone was excited: "I never thought that the hash algorithm can be used like this."

"It's amazing, the shortcomings of the original algorithm can still be used like this."

"If that's the case, a defect isn't a defect."

"Excellent, the shortcomings can't be covered up, so don't cover up, just put the shortcomings there, but no one can do anything about this shortcoming."

"As expected of Ye Fei, a genius is a genius, and his brain is different from that of ordinary people."

"Awesome, team leader!"

"..."

Everyone was amazed and admired!
In the past, they only thought about how to solve and improve the shortcomings, so that the algorithm has no shortcomings.

But Ye Fei put the shortcoming there, and used another method to make everyone helpless in the face of this shortcoming.

The eyes of many leaders sitting in the first row were brightened when they heard what Ye Fei said.

The principal smiled at the dean of the School of Mathematics beside him: "Young people are smart, we definitely can't think of this method."

The dean smiled and nodded: "Yes, in fact, we can learn from his method in many places. In the past, we only focused on how to improve the mistakes, but didn't think about putting the mistakes there. In another way, even if we know it It's a mistake, and there's no way to take advantage of it."

"Yes!" The headmaster nodded.

"..."

Ye Feidao: "The high security of the hash algorithm in other aspects can strengthen the asymmetric encryption algorithm."

The hash algorithm has only this one disadvantage, and it is an advantage in other aspects of security.

Of course, because this shortcoming is fatal, many people think that the hash algorithm is less secure.

But now Ye Fei makes the disadvantages of the hash algorithm so that everyone can't do anything about it, so the hash algorithm becomes a high-security algorithm.

Ye Fei: "Adding a hash algorithm to the asymmetric encryption algorithm can make up for all the shortcomings of the asymmetric encryption algorithm."

"So, although the hash algorithm is difficult to add to the asymmetric encryption algorithm."

"But as long as it succeeds, our asymmetric encryption algorithm will be a very perfect asymmetric encryption algorithm."

"Clap clap clap..."

Everyone stood up and applauded fiercely.

No matter how difficult it is, at least they see that the asymmetric encryption algorithm mentioned by Ye Fei has a promising future.

If this asymmetric encryption algorithm can really be created, it will be the most advanced asymmetric encryption algorithm in the world.

One of the four core technologies of the blockchain, the asymmetric encryption algorithm technology completely solves the problem.

In the future, the research on asymmetric encryption algorithm will only be based on Ye Fei's asymmetric encryption algorithm and strengthened.

It is equivalent to saying that Ye Fei's asymmetric encryption algorithm will completely solve the problem of insufficient asymmetric encryption algorithm technology at this stage.

Ye Feidao: "Let's study the asymmetric encryption algorithm in Goldbach's conjecture first."

"After that comes the hashing algorithm."

"Then incorporate the hashing algorithm into the asymmetric encryption algorithm."

"The research on the asymmetric encryption algorithm of Goldbach's conjecture is divided into three steps."

Hearing Ye Fei's words, everyone in the number theory team took out a small notebook to record.

They knew that Ye Fei would definitely talk about the research steps.

Every time they heard Ye Fei talk about a meeting, they knew that Ye Fei would definitely talk about the research steps.

Therefore, bring a small notebook to record Ye Fei's research steps.

Many people were stunned when they saw them take out their small notebooks.

Of course, some people brought a small notebook and some did not.

Seeing that the people in the number theory group took out small notebooks to record, those with small notebooks also took out small notebooks to record.

Those who did not bring a small notebook could only take out their mobile phones to record.

Ye Feidao: "First, encryption and decryption are done with different keys."

"Second, know the encryption algorithm and get the decryption key from the encryption key."

"Either of the third and two keys can be used for encryption and the other for decryption."

Seeing that everyone had recorded it, Ye Fei said, "I won't talk about how to study it specifically, we'll still explore it through research."

Everyone nodded, isn't that right?
If everything is clear to you, what is the point of our research?
Ye Fei said: "If you have any questions in the future research, you can come to me."

"I hope we can develop an epoch-making technology that completely solves the problem of insufficient asymmetric encryption algorithm technology in the blockchain."

"Let Xia Guo's blockchain technology take off wings."

"Papa papa..." The crowd applauded enthusiastically again.

This sentence is too powerful, only two people present are foreigners, and the rest are Xia people.

Everyone wants their motherland to be strong.

The motherland is strong, and you will have face when you go abroad, and everyone respects you.

When Xia people went abroad in the last century, foreigners felt that Xia people were poor and hated Xia people.

Now Xiaguo is the world's largest trading market, its GDP ranks second in the world, and it is the world's largest consumer country.

The economy of some countries is supported by the consumption of Xia people, and half of the houses in some countries are bought by Xia people.

Especially Asian countries, especially rely on the consumption of Xia people.

Therefore, many people now think that Xia Guo people are rich when they look at Xia Guo people.

In addition, Xia Guo's comprehensive strength is the top two in the world.

Therefore, foreigners dare not look down on Xia people.

The two of Amata were also applauding, but they always felt a little out of place.

Amata is from England, and Balazs is from North Korea.

They didn't have much affection for Xia Guo, they only stayed because of research.

After the applause subsided, Ye Fei said, "Okay, the meeting is over, and we will start the experiment in the afternoon."

It is already twelve o'clock at noon. After everyone left the meeting room, they went to the cafeteria to eat.

The principal and the principal came up, the principal patted Ye Fei on the shoulder, and said with a smile: "Young man, work hard, I am very optimistic about you."

The principal listened to Ye Fei's report all morning, although Ye Fei's idea was very difficult.

But as long as it can be researched, Ye Fei's blockchain laboratory will become popular.

Zhonghu University also followed suit.

Regardless of whether it is the city, the province, or the top policy, it will hit Zhonghu University like a hailstorm.

At that time, it will be difficult for Zhonghu University to think about taking off. Maybe Zhonghu University will also establish the fourth global blockchain research center in Xiaguo.

The other three are located in Kyoto, Modu and Pengcheng respectively!

Ye Fei smiled and said, "Thank you principal, I will not disappoint your expectations."

The principal smiled and said: "If you need anything, you can contact me, and I will try my best to help you."

"Okay." Ye Fei said.

The dean smiled and said, "Ye Fei, come on!"

"Okay!" Ye Fei said.

After that, they walked outside together.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like