Great Country Academician

Chapter 49 Start Deciphering

After Zhang Weiping left, there were not many people left in the office.

Liu Lu from Nantah University is still there. The youngest full professor of mathematics in China is crawling in front of the computer and doesn't know what he is busy with.

Professor Mo Komo of Nanyang University, who asked about the core of the Dirichlet function solution by the simplified method before, is still there, and he is sitting at the table frowning and calculating something.

He didn't know the remaining two people.

Withdrawing his gaze, Xu Chuan focused on the original ciphertext in his hand.

He is not very familiar with cryptography and encryption work, and some of his knowledge is limited to those of common sense.

Such as asymmetric encryption system, symmetric encryption system, hash algorithm, MD5 encryption, SHA1 encryption and so on.

He has a little knowledge of these common encryption methods, but not much.

However, from a mathematical point of view, there is actually no way to prove that an algorithm is 'absolutely safe'.

Of course, the proof of security in practice is the fact that it has never been cracked, which is still there.

In the past, people thought that the DES encryption system based on the symmetric encryption algorithm was very safe, but with the development of modern computers, the computing performance of an ordinary person's home computer can easily crack it by brute force.

Now we think that encryption algorithms such as AES, RSA, and elliptic curve are safe. After all, there has been no news that these encryptions have been cracked.

But in fact, these encryption methods are not absolutely safe.

For example, if RSA does not perform padding, an attacker can greatly reduce the decryption space by observing the ciphertext of a specific plaintext.

Or if AES encryption is the most original mode, then the same ciphertext will correspond to exactly the same plaintext.

In addition, some machines are not random enough when generating passwords, resulting in the fact that the keys that should be randomly distributed are actually exactly the same.

These are flaws.

Xu Chuan doesn't know much about encryption methods, and these are not things he needs to care about.

Because in this building, the most elite cryptography experts in District 9 gathered.

For example, academician Wang Xiaoyun, a top cryptography expert, has made the cryptography of Yuxia Kingdom in the ninth district a world leader by virtue of her own efforts.

In the early years, the first district claimed to have developed a set of MD5 encryption algorithm technology, claiming that this is the most secure algorithm in the world, and declared to the outside world that "no one will crack it within 100 years."

This has attracted the attention of the whole world, and many experts in the field of cryptography are scrambling to study it. Some scientists led a team to study it for more than ten years without success, but Wang Xiaoyun easily deciphered it.

Later, after knowing that MD5 was cracked, the first district urgently came up with another set of top encryption algorithm SHA-1.

SHA-1 is stronger and more complex than the previous MD5 algorithm. Countless top cryptographers came to challenge it. Most of them couldn't make progress after counting 40 steps, but Wang Xiaoyun still easily cracked it.

Moreover, the reason for this cracking made the first district vomit blood. The reason is simply because the code goddess was bored during the confinement period. She took out a pen and paper to write and draw, and then it took only two months to complete it. Cracked this extremely complex encryption algorithm.

With such top talents, Yuxia Kingdom's network security is as solid as gold.

But today, the encryption algorithm was upgraded again in the first district.

Not only redesigned the rules and algorithms, but also carried out double encryption to integrate huge functions into it.

This kind of encryption method is no longer pure cryptography, it involves other aspects of knowledge, even the top cryptography experts, even the goddess of cryptography, are unable to break this encrypted message alone.

Fortunately, Xu Chuan didn't need to worry about cryptography and encryption work.

He only needs to find the law behind the encryption of the double function algorithm, and build a mathematical model for it.

Regarding this point, Xu Chuan was still confident enough.

He came from twenty years later. Although he did not major in mathematics in his previous life, he can always get in touch with the world's top and cutting-edge mathematics knowledge at Princeton.

In Princeton, countless mathematics conferences are held every year, and countless geniuses and mathematicians deliver their ideas and results there.

Those advanced function knowledge and achievements are naturally included.

Since Galileo defined functions in the early days, functions have never left the core stage of mathematics.

If mathematics is the foundation of all subjects, then functions are the soul of mathematics.

The essence of function is to try to establish a mathematical tool to describe the "causal relationship" between related things.

The causal relationship is one of the most important laws of human cognition.

In simple terms, discovering and describing causal laws can give humans the ability to "predict" things.

For example, a function describing the movement of a car, as long as the function argument contains rich parameters such as time and speed, we can go back 5 minutes or predict where the car will be in 5 minutes.

If it is more complicated and loads more parameters, the function can even predict a person's actions and what time you will do tomorrow.

Before the invention of this mathematical tool, it was almost impossible to describe this relationship precisely.

In the mathematics room of the Information Security Department, Xu Chuan listed the materials in his hands on the table in front of him.

One side is the original ciphertext, and the other side is the translated mathematical puzzle. Each piece of information is unique without any repetition.

Xu Chuan carefully studied the mathematical problems after the transfer.

From basic exponential functions, logarithmic functions, power functions, trigonometric functions, inverse trigonometric functions, to complex hash functions, symmetric functions, Gaussian functions, max, min functions, Euler functions, etc.

These math puzzles include a variety of function puzzles.

But he was not intimidated by the complex and changeable functions. Xu Chuan knew very well that most of the complex functions are composed of basic functions.

Although these function problems in front of us are irregular, but the first district can use these various function problems to encrypt messages, and can send a large number of useless messages to interfere with other countries. Mass generation of mathematical laws for manufacturing various functional problems.

He doesn't believe that an ordinary person performing a task has the mathematical ability to decipher and solve these mathematical problems.

So calm down and search slowly, you will definitely find a clue.

Although from a mathematical point of view, perfect things exist, they cannot be created in reality.

It's like there are definitions of infinity and infinitesimal in mathematics, but can you write a number that represents infinity or infinitesimal?

This is simply not possible.

Thanks to book friends 20221005012213681, You Fang Dao Ren You Si Fang, Gu Yu, Nine-Tailed Orange, Qixing Sauce, Misaka Yujie 20001, Bai Xiaohanxing, Master Qingxuan, Memories under Liuli, Chaos to the Red Dust, Tranquility to the Universe and other readers Big guy's reward, thank you.

PS: There will be an update tomorrow, and the collection increase rules will be updated.

I am implementing all the update rules, the monthly tickets in the hands of the big guys, the recommendation votes, and the follow-up, please follow-up.

(づ ̄3 ̄)づ╭~

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like