Chapter 35 Ye Fei's Research Directions
On November 5, 2025, in the afternoon of the same day, Ye Fei took a plane to Kyoto.
When I arrived in Kyoto, I got out of the airport and took a taxi to the gate of a manor called 'Izuku' in the suburbs.
After getting out of the car, Ye Fei looked around.
The manor looks very magnificent, full of luxury, just like the mansion of the ancient prince.
From the outside, the estate covers a large area.
At the gate of the manor, stood two young men in straight suits.
Many people lined up with invitations, and the two young men each held a black machine in their hands, swept it on the invitation, and then looked down at the machine in their hands before letting people in.
Ye Fei also lined up at the end of the line, moving forward with the flow of people.
"Professor Ye!" At this time, someone called Ye Fei.
Ye Fei turned his head to look at it suspiciously, and said with a smile: "Professor Yue." ”
The person who came was a middle-aged man who was a little chubby, with a round face, and looked very kind.
Yue Fei, whose name is the same as the ancient national hero Yue Fei, has different words.
Yue Fei is an honorary member of the Society for Number Theory, and since both of them studied Gaussian conjectures, the two used to have an academic exchange of e-mails.
So, the two are quite familiar.
Yue Fei, a professor of mathematics at Kyoto University, is only 35 years old this year, and ranks among the top 10 mathematics professors under the age of 40 at Kyoto University.
Ye Fei withdrew from the team, walked to Yue Fei's side, and said with a smile: "I didn't expect Professor Yue, you are also here." ”
"Haha......" Yue Fei laughed, a dimple appeared on each side of his face, and said, "If you can come, of course I can come." ”
"We all study number theory, and we naturally have research on cryptography."
This is common sense, because ninety percent of cryptography is number theory.
So, even if you don't go out of your way to study cryptography.
As long as the study of number theory is accompanied by the study of cryptography.
Yue Feidao: "I heard that the standard of this conference is very high, and such a high-level conference must be more than just a simple discussion of cryptography. ”
"Huh?" Ye Fei raised his eyebrows and asked, "Professor Yue, do you know the details?" ”
"I don't know!" Yue Fei shook his head: "Before this, I asked many people about this conference, such as Kang Jiachen, the president, and some honorary members of the association, but I didn't ask for any information. ”
"So mysterious?" Ye Fei was stunned and said: "A conference of this specification is so mysterious, is it to conduct state secret research?" ”
"Probably, yes." Yue Fei said: "I haven't encountered this kind of thing, but I've heard of it." ”
"Almost more than ten years ago, in 2013, when the country wanted to develop nuclear power, many mathematicians and physicists were convened to convene a coordination meeting for independent innovation of third-generation nuclear power technology cooperation to jointly develop Hualong No. 1."
"After nearly ten years of research, in 2022, Hualong No. 1 was developed."
"And China's nuclear power has also changed from weak to strong."
"At that time, the size of the coordination meeting was similar to that."
Ye Fei took a deep breath and said, "Then today's conference is not simple. ”
"Yes." Yue Fei said.
Ye Fei couldn't help but laugh and said, "I feel like I've been cheated by the dean of my college." ”
"Huh?" Yue Fei asked with interest, "How did you get trapped?" ”
"I first told the dean of my college that I didn't want to study cryptography, and he agreed, but he asked me to come to the conference and said that I would wait until the conference was over to talk about whether or not to study cryptography."
Ye Fei shook his head and said: "Seeing that I have come here, and then I know that this may be a very helpful research for the country, let me quit at this time, I will not only lose face, but also my heart." ”
"Haha......" Yue Fei laughed: "Then you were indeed cheated by the dean of your college." ”
"Why don't you want to study cryptography?" Yue Fei asked: "You also study number theory, and studying cryptography is also helpful to the study of number theory." ”
"You know, I'm studying the Gaussian conjecture, and I've now studied the second problem of the Gaussian conjecture, the second problem of the Gaussian class number conjecture in the imaginary quadratic domain, the elliptic curve has been completed, and only the modular form remains."
"What?" Yue Fei's eyes widened in surprise: "You are so fast, you have completed the study of elliptic curves?" ”
"I remember that you have only been studying the Gauss conjecture for a little over a year!"
"Yes!" Ye Feidao.
"You ......" Yue Fei didn't know what to say.
He studied the Gaussian conjecture five years ago, and only now has he studied the first small problem of the second problem of the Gauss conjecture.
And the first little question has not yet been studied.
And Ye Fei is good, he started his research later than him, his research speed is faster than him, and his research progress is higher than him.
It's only been a year!
Yue Fei's heart seemed to have been stabbed, it was very painful and uncomfortable.
From childhood to adulthood, in learning, he has always looked down, and has never experienced the posture of looking up, but now he has experienced it.
Yue Fei took a deep breath, suppressed his fright, then looked at the team, and said in a muffled voice: "Ye Fei, let's go and line up!" ”
"Good!"
Immediately, the two walked to the end of the line and lined up.
But Ye Fei found that Yue Fei, who was originally more active, seemed to be silent.
It was a long time before he began to speak.
After an examination, the two entered the estate.
The inside of the manor is indeed large and the decoration is antique.
Stepping through the gate, there is a road paved with bluestone bricks that leads to the depths.
There are many bamboos planted on both sides of the road, and it is late autumn and the leaves are yellow.
The crowd walked along the avenue, passing through three courtyards, and finally entered a large room.
There were chairs in the large room, and there were more than three hundred chairs on sight.
Two meters in front of the chairs, there is a row of tables with conference microphones on them.
Ye Fei and Yue Fei found a random seat to sit down.
In about half an hour or so, all the seats were full.
After another few minutes, a group of people walked behind the table and sat down.
The middle-aged man sitting in the middle patted the microphone in front of him and said, "Hello mathematicians, I am the director of the Security Division. Zhang Sui Zuyun, this time I will preside over the conference. ”
"With the ...... of information security"
He did almost an hour of reporting.
"The purpose of convening everyone here this time is to solve the current information crisis."
"Our current research direction is cryptographic algorithm innovation, cryptographic mechanism innovation and certificate structure innovation."
"Please brainstorm what methods should be used to conduct research from these three aspects."
Yue Fei said to Ye Fei beside him, "Ye Fei, do you have any good ideas?" ”
Ye Feidao: "I think in terms of cryptographic algorithms, we should redefine the cryptographic module of trusted computing, in terms of cryptographic mechanism, the symmetric cryptography and public key cryptography should be combined, and in terms of certificate structure, it should be a dual-certificate structure." ”
"Tell me more about it." Yue Fei said.
Ye Feidao: "As we all know, TCM is the hardware template of the trusted computing platform, which provides cryptographic operation functions and has protected storage space. ”
"Symmetric cryptography combined with public-key cryptography improves security and efficiency."
"Dual-certificate structure simplifies certificate management and improves availability and manageability."
After listening to Ye Fei's words, Yue Fei nodded and said, "I think so too, in terms of cryptographic algorithms, I think it is improved on the basis of the gift algorithm and the persent algorithm." ”
"The combination of them can make the structure simpler and more efficient."
"And there's still room for performance improvement when running on FPGAs."
"By optimizing the 40-round iterative calculation of the algorithm to 20-round stacking, and the encryption and decryption and round key generation operations are executed in parallel."
Ye Fei shook his head and said: "Although your cryptographic algorithm is advanced and has a lot of room for future development, its development is not mature, and I prefer the SM2 cryptographic algorithm that has been developed for many years." ”
The SM2 cryptographic algorithm has been around for many years, and many companies, banks, and government agencies around the world have built cryptographic algorithms based on SM2.
"Of course, we can't help but innovate, how can we create new algorithms without innovation?"
"SM2 and SM4, these two algorithms can be combined to form a hybrid cryptosystem."
"The SM2 algorithm is an asymmetric encryption algorithm, while SM4 is a packet data, symmetric encryption algorithm."
"They all have a high level of security and complement each other."
"The first thing to create an algorithm is to have high security, so such an algorithm is just right."
In addition to SM2 and SM4, there are also SM1 and SM3.
SM1 is symmetric encryption, SM2 is asymmetric encryption, SM3 is information summary algorithm, and SM4-bit wireless LAN standard packet data algorithm.
Yue Fei nodded in his heart, thinking that the idea that Ye Fei said was also feasible.
He shook his head again and said, "I still think my idea is good, although your algorithm is very good, there is no room for improvement." ”
"My algorithm is novel, and it may not be as high as yours in terms of security, but the upside in the future is higher than your algorithm."
Ye Fei said: "The future of your algorithm is full of unknowns, and we should solve the current difficulties, not think about the unknown future." ”
"Moreover, the information security that the country is facing now is imminent, and there is no time for you to experiment."
Yue Fei and Ye Fei, the thoughts of the two.
A novelty, but with a lot of room for future development.
One is old, although there is no room for development in the future, but it is stable and has a high safety factor.
If Ye Fei made a novel cryptographic algorithm, he could also make it.
But the current situation does not allow him to make novel cryptographic algorithms.
Novelty stands for the unknown.
Yue Fei said: "The situation is imminent now, but we can sacrifice some of our interests for a long-term future." ”
Ye Fei shook his head and said: "Why should we sacrifice some interests, we have to race against time and not give up an inch of land." ”
Sui Zuyun looked at the noisy people below, like a vegetable market, and some people argued.
He does not stop it, there is a dispute before there is a conclusion, and the truth is made when there is a quarrel.
Sui Zuyun said to a few people around him: "Let's go have some tea and let these mathematicians quarrel!" ”
"Good!" Several people replied.
With that, they stood up and went to the small private room next door to sit down and drink tea.
Sui Zuyun said: "By the way, is Ye Fei from Zhonghu University here?" ”
Ye Fei made a very deep impression on him, and when the meeting was held, the directors of the Department of Education and the Department of Science and Technology. Zhang Du mentioned Ye Fei.
After that, he also did an investigation, and Ye Fei was indeed a genius.
"Here we are." Someone replied: "I specially contacted the dean of the School of Mathematics of Zhonghu University and asked Ye Fei to come to the meeting." ”
"Hmm!" Sui Zuyun nodded.
About an hour later, Sui Zuyun listened to the sound in the room next to him, and seemed to have stopped a little.
He said to the crowd, "Guys, those mathematicians should have had enough, let's go and see!" ”
"Good!"
After saying that, everyone put down the teacups in their hands and returned to the large room.
After Sui Zuyun sat down, he smiled into the microphone and said, "Everyone, have you quarreled enough, have you come up with the answer?" ”
One of them stood up and said, "Mr. Sui, I think that in terms of cryptographic algorithms, we should use the large-state lightweight block cipher Gimli and Xoodoo algorithms, which have the advantages of fewer logic gates, low power consumption, and accelerated encryption. ”
This person is known to many people present, his name is Cao Wencan, a fourth-level full professor at Kyoto University, a well-known cryptography expert in Xia Guo, and an executive director of the Xia National Cryptography Society.
Someone else stood up and said: "I object, I think the ESF cryptographic algorithm should be used, the ESF cryptographic algorithm has the ability of differential fault attack, which can well resist the intrusion of the outside world and carry out counter-attacks." ”
Many people present also know this person, his name is Fang Yongchang, a fourth-level full professor of Shuimu University, a well-known cryptography expert in Xia Guo, and an executive director of the Xia National Cryptography Society.
"The two are fighting again." A lot of people have their hearts in mind.
Cao Wencan and Fang Yongchang, the two did not deal with each other in the Cryptography Society, and often quarreled over academic issues.
Cao Wencan said: "The defense capability of the ESF encryption algorithm is very weak, and its main function is to attack. ”
"By doing this, it is easy for the enemy to break through the defenses."
Fang Yongchang said: "It is possible to break through, but ESF can hit the enemy, and offense is the best defense." ”
Cao Wencan said: "You do this, ......"
Sui Zuyun waved his hand and said, "Okay, both of you, don't quarrel." ”
"Ye Fei, is Ye Fei from Zhonghu University here?"
"Ye Fei, what about calling you?" Yue Fei said.
Ye Fei was surprised, and wondered in his heart, this person knows me?
He stood up and said, "Mr. Sui! ”
"Tell me, what method should be used?" Sui Zuyun looked at Ye Feidao.
Ye Feidao: "The mixed combination of SM2 and SM4 cryptographic algorithms should be used. ”
"This allows for heterogeneous edge device acquisition ......"
Ye Fei said for more than ten minutes, telling the advantages and disadvantages of SM2 and SM4.
And according to the current situation, explain why SM2 and SM4 are used.
Ye Feidao: "Of course, SM2 and SM4 are not very novel, and the advantage is that the safety factor is high. ”
"But if we want to resolve the current situation, it has to be so."
"Mr. Sui said earlier that there are three research directions now, cryptographic algorithm innovation, cryptographic mechanism innovation and certificate structure innovation."
"I think we can extend a little bit more."
"Huh?" Sui Zuyun was stunned: "Then tell me, how to extend?" ”
Ye Fei said: "I know that everyone likes to seek innovation when they do research, in fact, I also like to seek innovation. ”
"Using SM2 and SM4 to create cryptographic algorithms actually has one of the biggest advantages."
"In addition to cryptographic algorithms, cryptographic mechanisms, and certificate structures, we can also innovate active immunity architectures."
"Overcoming the TPM Passive Hook Call ...... for TCG Parts"
"This can usher in a new era of Trusted Computing 3.0."
"What is the new era of trusted computing 3.0, that is, represented by Xia Guo, breakthroughs have been made in system immunity, node virtual dynamic chain, host + trusted dual node, active immunity, and trusted immunity architecture."
"Reinventing Trusted Computing."
"This will not only defend against external attacks, but also be in the era of credibility, and the Xia Kingdom will be in charge."
Trusted 1.0 is represented by the world's fault-tolerant blocking, and 2.0 is represented by TCG.
TCG is called Trusted Computing Organization in Chinese and is an organization formed by AMD, HP, IBM, Intel and Microsoft.
This is an organization that is completely dominated by Western countries, to be precise, the organization of the Northern Beauty.
Everyone looked at Ye Fei in surprise.
Young people don't talk about martial arts, we are still discussing how to defend against external attacks, you are good, you have to reformulate the rules of credible calculation, and Xia Guo is in charge.
What a bold idea!
Yue Fei looked at Ye Fei dumbfounded, Damn, I thought my idea was very novel, but compared to you, it was a small thing.
This idea was discovered by Ye Fei when he was studying number theory, and Xia Guo could only do so if he wanted to achieve corner overtaking in credible computing.
Sui Zuyun looked at Ye Fei in amazement, young man, you seem to be out of line.
We're talking about how to defend against foreign cyber attacks, and we're talking about reinventing the era of trusted computing.
Well, although there is a connection between them, this span is too big.
Sui Zuyun said: "That...... Ye Fei, the cryptographic algorithm you said is very good, I still agree with it, but to create a new era of trusted computing 3.0, I think forget it! ”
Ye Fei exhaled lightly and said, "I didn't say that I would create a new era of trusted computing 3.0, I just said all possible situations." ”
Sui Zuyun said: "If you don't have anything else to say, just sit down!" ”
After Ye Fei sat down, Sui Zuyun said, "Does anyone else have other opinions?" ”
After that, everyone was talking again.
Sui Zuyun said: "Okay, let's vote!" ”
"Raise your hand if you agree with Gimli and Xoodoo's cryptographic algorithms!"
In an instant, more than a hundred hands were raised.
"Don't put your hand down, I say put it down and put it down."
Someone went to count the number of people who raised their hands.
After a long time, Sui Zuyun said, "Okay, put down your hand." ”
"Raise your hand if you agree with the ESF cryptographic algorithm!"
In an instant, more than a hundred hands were raised.
"Raise your hand if you agree with the SM2 and SM4 cryptographic algorithms!"
In an instant, more than a hundred hands were raised.
After a while, after Sui Zuyun knew the number of votes counted, he said: "The current situation is that the Gimli and Xoodoo cryptographic algorithms, the ESF cryptographic algorithms and the SM2 and SM4 cryptographic algorithms have the same number of votes for the three parties. ”
Sui Zuyun raised his wrist, glanced at his watch, and said, "It's noon, let's go to dinner, and at two o'clock in the afternoon, we'll discuss this matter again." ”
Immediately, everyone stood up and went to eat under the guidance of the staff.
Private room next door!
Sui Zuyun and some people gathered here.
Sui Zuyun looked at a middle-aged man and said, "Academician Nan, tell me, what should I do about this situation now?" ”
"It's easy!" Academician Nan said: "Let them compete in three ways, whoever creates a good cryptographic algorithm will use whoever's cryptographic algorithm." ”
Sui Zuyun's eyes lit up, and he said: "This method is good, so that you can see whose password algorithm is the best." ”
Everyone also nodded and agreed with this method.
Sui Zuyun was embarrassed again: "But how to compete? Will they be able to create complete cryptographic algorithms? That one person can't create it, and it takes a long time. ”
"By the time they create it, it's been a few years, and we can't afford to wait!"
Academician Nan said: "To put it bluntly, cryptographic algorithms are the use of mathematics, and I think they can use mathematical knowledge for competitions." ”
"Do math?" Sui Zuyun asked.
"No!" Academician Nan shook his head: "You can use NIST and let them assume the algorithm in NIST, so that they can compete." ”
One of NIST's functions is the framework of post-quantum cryptography algorithms, which can be run by adding algorithms.
Different algorithms have different functions and capabilities of NIST's cryptographic algorithms, which are equivalent to a simulator.
Someone on the side explained to Sui Zuyun what NIST is.
After listening to the explanation, Sui Zuyun nodded: "Okay, just use this method, so that you can detect which of the three of them said that the cryptographic algorithm is better." ”
"Through the competition, we can see the advantages and disadvantages of the cryptographic algorithm created by the three parties, and we are more assured to study in this direction."
Everyone nodded, agreeing with Sui Zuyun's statement.
At two o'clock in the afternoon, Sui Zuyun said: "After our discussion, we decided that the three professors, Cao Wencan, Fang Yongchang and Ye Fei, will use NIST to conduct a square cryptography algorithm competition. ”
Cao Wencan and Fang Yongchang looked at each other secretly, their eyes full of fighting spirit.
As for Ye Fei, they didn't put it in their eyes.
Ye Fei doesn't specialize in algorithms, so they don't pay attention to it.
If a non-professional defeats two of them, it will be a big joke.
Therefore, they believe that the winner must be between the two of them.
(End of chapter)