From university academician to chief academician
Chapter 121 Ye Fei’s research direction
On the afternoon of November 5, 2025, Ye Fei took a plane to Kyoto.
After arriving in Kyoto, I left the airport and took a taxi to the door of a manor called "Yizhu" in the suburbs.
After getting off the car, Ye Fei looked around.
The manor looks very grand and noble, just like the mansion of an ancient prince.
From the outside, the manor appears to cover a large area.
At the door of the manor, stood two young men in neat suits.
Many people lined up with invitations. Two young men each held a black machine in their hands. They scanned the invitations, then looked down at the machines in their hands before letting people in.
Ye Fei also lined up at the end and moved forward with the flow of people.
"Professor Ye!" At this time, someone called Ye Fei.
Ye Fei turned around in confusion and said with a smile, "Professor Yue."
The person who came was a middle-aged man who was a bit fat, with a round face, and looked very kind.
Yue Fei, whose name is the same as the ancient national hero Yue Fei, has the same pronunciation but different characters.
Yue Fei is an honorary member of the Number Theory Association. Since both of them study Gaussian conjecture, they have had academic exchanges via email.
Therefore, the two of them are relatively familiar.
Yue Fei is a professor of mathematics at Kyoto University. He is only 35 years old this year. Among all mathematics professors under the age of 40 at Kyoto University, his ability ranks in the top ten.
Ye Fei withdrew from the team, walked to Yue Fei's side, and said with a smile, "I didn't expect you to come, Professor Yue."
"Haha..." Yue Fei laughed, with a dimple on each side of his face, and said, "If you can come, of course I can come too."
"We all study number theory, and naturally we also study cryptography."
This is common sense because ninety percent of cryptography is number theory.
So, even if you don’t study cryptography specifically.
As long as you study number theory, you will also study cryptography.
Yue Feidao: "I heard that the standards of this conference are very high. Such a high-level conference must be more than just a simple discussion of cryptography."
"Huh?" Ye Fei raised his eyebrows and asked, "Professor Yue, do you know the details?"
"I don't know!" Yue Fei shook his head: "I asked many people about this conference before, like Kang Jiachen, the president, and some honorary members of the association, but I didn't get any information."
"So mysterious?" Ye Fei said in astonishment: "A conference of this size is so mysterious. Could it be that it is conducting state secret research?"
"Maybe." Yue Fei said: "I have never encountered this kind of thing, but I have heard of it."
"Almost more than ten years ago, in 2013, when the country wanted to develop nuclear power, it convened many mathematicians and physicists to hold an independent innovation third-generation nuclear power technology cooperation coordination meeting to jointly develop Hualong One."
"After nearly ten years of research, Hualong One was developed in 2022."
"And our country's nuclear power has also grown from weak to strong."
"The size of the coordination meeting at that time was similar to this."
Ye Fei took a deep breath and said, "Then today's meeting will not be simple."
"Yes." Yue Feidao.
Ye Fei said dumbfounded: "I feel like I was tricked by the dean of my college."
"Huh?" Yue Fei asked with interest, "How come you were tricked?"
"I initially told the dean of my college that I did not want to study cryptography. He agreed, but asked me to attend the conference and said that he would wait until the conference was over before deciding whether to study cryptography."
Ye Fei shook his head and said: "Looking at me, we have come here, and knowing that this may be very helpful research to the country, if you ask me to withdraw at this time, I will not only be embarrassed in face, but also in my heart."
"Haha..." Yue Fei laughed: "Then you were indeed tricked by the dean of your college."
"Why don't you want to study cryptography?" Yue Fei asked: "You also study number theory. Studying cryptography is also helpful to studying number theory."
"You know, I study the Gaussian conjecture. I have now studied the second problem of the Gaussian conjecture. The second small problem of the Gaussian class conjecture of the virtual quadratic field. The elliptic curve has been completed, and only the modular form is left. ”
"What?" Yue Fei's eyes widened in surprise: "You are so fast that you have already completed the research on elliptic curves?"
"I remember you started studying Gaussian conjecture in just over a year!"
"Yes!" Ye Feidao.
"You..." Yue Fei didn't know what to say.
He studied Gaussian conjecture five years ago, and only now has he studied the first small problem of the second problem of Gaussian conjecture.
And the first small problem has not been studied yet.
Ye Fei, on the other hand, was better. He started research later than him, researched faster than him, and made higher research progress than him.
This is only one year!
Yue Fei's heart felt as if he had been stabbed. It hurt and was very uncomfortable.
Ever since he was a child, he has always looked down when studying. He has never experienced the attitude of looking up, but now he can experience it.
Yue Fei took a deep breath, suppressed his fear, then looked at the team and said in a low voice: "Ye Fei, let's go queue up!"
"good!"
Immediately, the two walked to the end of the line and lined up.
But Ye Fei discovered that Yue Fei, who was originally more active, seemed to be silent.
After a long time, he began to speak.
After inspection, the two entered the manor.
The manor is indeed very large and decorated in an antique style.
Stepping through the gate, there is an avenue paved with bluestone bricks, leading straight into the depths.
There are many bamboos planted on both sides of the road. It is late autumn and the bamboo leaves are withered and yellow.
Everyone walked forward along the avenue, passed three courtyards, and finally entered a large room.
There are chairs one after another in the large room, and there are more than 300 chairs by visual inspection.
Two meters in front of the chair, there is a row of tables with conference microphones placed on them.
Ye Fei and Yue Fei randomly found a place to sit down.
In about half an hour, all seats were occupied.
After another few minutes, a group of people came and sat down behind the table.
The middle-aged man sitting in the middle patted the microphone in front of him and said: "Hello, fellow mathematicians, I am Zhang Sui Zuyun, director of the Security Department, and I will host the conference this time."
"With information security..."
He reported for almost an hour.
"We are called together this time to solve the current information crisis."
"Our current research directions are cryptographic algorithm innovation, cryptographic mechanism innovation and certificate structure innovation."
"Please brainstorm what methods should be used to conduct research from these three aspects."
Yue Fei said to Ye Fei beside him: "Ye Fei, do you have any good ideas?"
Ye Feidao: "I think that in terms of cryptographic algorithms, the trusted computing cryptographic module should be redefined. In terms of cryptographic mechanisms, symmetric cryptography and public key cryptography should be combined. In terms of certificate structure, it should be a dual certificate structure."
"Explain in detail." Yue Feidao.
Ye Feidao: "As we all know, TCM is the hardware template of the trusted computing platform, which provides cryptographic computing functions and protected storage space for the trusted computing platform."
"And symmetric cryptography combined with public-key cryptography improves security and efficiency."
"Dual certificate structure simplifies certificate management and improves availability and manageability."
After listening to Ye Fei's words, Yue Fei nodded and said: "I think so too. Regarding the cryptographic algorithm, I think it should be improved on the basis of the gift algorithm and the persistent algorithm."
“The improved combination between them can make the structure simpler and more efficient.”
"And there is still room for improvement in performance when running on FPGAs."
"By optimizing the 40-round iteration calculation of the algorithm into 20-round iterations, and executing the encryption, decryption and round key generation operations in parallel."
Ye Fei shook his head and said: "Although your encryption algorithm is advanced and has a lot of room for future development, its development is not yet mature. Instead, I prefer the SM2 encryption algorithm that has been developed for many years."
The SM2 cryptographic algorithm has been around for many years. Many companies, banks and government agencies around the world have established cryptographic algorithms based on SM2.
"Of course, we have to innovate. How can we create new algorithms without innovating?"
"SM2 and SM4, these two algorithms, can be combined to form a hybrid cryptosystem."
"The SM2 algorithm is an asymmetric encryption algorithm, while SM4 is a grouped data, symmetric encryption algorithm."
“They both offer high security and have complementary capabilities.”
“The first thing to create an algorithm is that it must be highly secure, so this algorithm is just right.”
In addition to SM2 and SM4, there are also SM1 and SM3.
SM1 is symmetric encryption, SM2 is asymmetric encryption, SM3 is information digest algorithm, SM4-bit wireless LAN standard packet data algorithm.
Yue Fei nodded in his mind, thinking that Ye Fei's idea was also feasible.
He shook his head again and said: "I still think my idea is good. Although your algorithm is good, there is no room for improvement."
"My algorithm is novel and may not be as safe as yours, but the potential for future growth is higher than yours."
Ye Feidao: "The future of your algorithm is full of unknowns. We should solve the current difficulties instead of thinking about the unknown future."
"Moreover, the country is now facing an urgent information security situation and there is no time for you to conduct experiments."
Yue Fei and Ye Fei, their thoughts.
A novel one, but with plenty of room for future development.
One is old. Although there is no room for development in the future, it is more stable and has a high safety factor.
If Ye Fei wants to create a novel cryptographic algorithm, he can do it too.
But the current situation does not allow him to create novel cryptographic algorithms.
Novelty represents the unknown.
Yue Feidao: "The situation is urgent now, but we can sacrifice some of our interests to gain a long-term future."
Ye Fei shook his head and said: "Why should we sacrifice some of our interests? We must fight against every second and not give up an inch of ground."
Sui Zuyun looked at the people below who were noisy, just like a vegetable market, and some people were arguing with red faces.
He doesn't stop it either. Only when there is dispute can there be a conclusion, and when there is a quarrel, the truth will be revealed.
Sui Zuyun said to the people around him: "Let's go have some tea and let these mathematicians make noise!"
"Okay!" several people replied.
After saying that, they stood up and went to the small private room next door to sit down and drink tea.
Sui Zuyun said: "By the way, is Ye Fei from Zhonghu University here?"
Ye Fei left a deep impression on him. During the meeting, Director Zhang of the Department of Education and the Department of Science and Technology mentioned Ye Fei.
He also did some research later and found that Ye Fei was indeed a genius.
"Here he is." Someone replied: "I specifically contacted the dean of the School of Mathematics at Zhonghu University and asked Ye Fei to come to the meeting."
"Yeah!" Sui Zuyun nodded.
About an hour later, Sui Zuyun heard that the sounds in the room next to him seemed to have subsided.
He said to everyone: "Everyone, those mathematicians must have had enough noise, let's go and take a look!"
"good!"
After saying that, everyone put down their teacups and returned to the big room.
After Sui Zuyun sat down, he laughed into the microphone and said, "Everyone, we have had enough arguing. Have you come up with the answer?"
One of them stood up and said: "Mr. Sui, I think the large-state lightweight block cipher Gimli and Xoodoo algorithms should be used as cryptographic algorithms. The advantages of these two algorithms are fewer logic gates, low power consumption, and accelerated encryption. Many advantages.”
This person is known to many people present. His name is Cao Wencan, a fourth-level full professor at Kyoto University, a famous cryptography expert in Xia State, and the executive director of Xia State Cryptozoology Society.
Another person stood up and said: "I object. I think the ESF cryptographic algorithm should be used. The ESF cryptographic algorithm has the ability of differential fault attacks and can well resist external intrusions and carry out counter-attacks."
Many people present knew this person. His name was Fang Yongchang, a fourth-level full professor at Shuimu University, a famous cryptography expert in Xia State, and the executive director of Xia State Cryptozoology Society.
"These two are fighting again." Many people thought to themselves.
Cao Wencan and Fang Yongchang were at odds with each other in the Cryptozoology Society, and they often quarreled over academic issues.
Cao Wencan said: "The defense capability of the ESF encryption algorithm is very weak, and its main function is attack."
"By doing this, it is easy for the enemy to break through the defense."
Fang Yongchang said: "It is possible to break through, but ESF can hit the enemy. Attack is the best defense."
Cao Wencan said: "You do this..."
Sui Zuyun waved his hand and said, "Okay, you two, stop arguing."
"Ye Fei, is Ye Fei from Zhonghu University here?"
"Ye Fei, what are you calling?" Yue Fei said.
Ye Fei was surprised and wondered, does this person know me?
He stood up and said: "Mr. Sui!"
"Tell me, what method should be used?" Sui Zuyun looked at Ye Feidao.
Ye Feidao: "A mixed combination encryption algorithm of SM2 and SM4 should be used."
"This enables the collection of heterogeneous edge devices..."
Ye Fei talked for more than ten minutes, listing the advantages and disadvantages of SM2 and SM4.
And based on the current situation, explain why SM2 and SM4 are used.
Ye Feidao: "Of course, SM2 and SM4 are not very novel. The advantage is that they have a high safety factor."
“But it’s necessary if we are to resolve the current situation.”
"President Sui said before that there are three research directions now, namely cryptographic algorithm innovation, cryptographic mechanism innovation and certificate structure innovation."
"I think we can extend it a little further."
"Huh?" Sui Zuyun said in shock: "Then tell me, how to extend it?"
Ye Feidao: "I know that everyone likes to seek novelty when doing research. In fact, I also like to seek novelty."
"Using SM2 and SM4 to create a cryptographic algorithm actually has one of the biggest advantages."
“In addition to cryptographic algorithms, cryptographic mechanisms and certificate structures, we can also innovate active immune architectures.”
"Overcoming TPM passive hook calls for TCG components..."
"This can create a new era of Trusted Computing 3.0."
"What is the new era of Trusted Computing 3.0? It is represented by Xia Guo, who has made breakthrough progress in system immunity, node virtual dynamic chain, host + trusted dual node, active immunity, and trusted immunity architecture."
“Reinventing Trusted Computing.”
"This will not only prevent external attacks, but also allow Xia to take the initiative in a trusted era."
Trustworthy 1.0 is represented by world fault tolerance, and 2.0 is represented by TCG.
TCG's Chinese name is Trusted Computing Group, which is an organization composed of AMD, HP, IBM, Intel and Microsoft.
This is an organization that is completely decided by Western countries. To be more precise, it is an organization that is decided by Beili Country.
Everyone looked at Ye Fei in surprise.
Young people don't care about martial ethics. We are still discussing how to defend against external attacks. It would be better for you to directly re-formulate the rules of trusted computing and let Xia Guo take the decision.
The idea is very bold!
Yue Fei looked at Ye Fei dumbfounded, "Fuck, I thought my idea was very novel, but compared to you, it pales into insignificance."
This idea was discovered by Ye Fei when he was studying number theory. Xia Guo had no choice but to do this if he wanted to achieve overtaking in a corner in trusted computing.
Sui Zuyun looked at Ye Fei in astonishment, young man, you seem to have gone too far.
We are talking about how to defend against foreign cyber attacks, and you are talking about re-establishing the era of trusted computing.
Well, there is a connection between them, but the span is too big.
Sui Zuyun said: "Well... Ye Fei, the cryptographic algorithm you said is very good, I still agree with it, but to create a new era of Trusted Computing 3.0, I think let's forget it!"
Ye Fei let out a breath and said: "I didn't say we would create a new era of Trusted Computing 3.0. I just stated all possible scenarios."
Sui Zuyun said: "If you have nothing else to say, just sit down!"
After Ye Fei sat down, Sui Zuyun said: "Does anyone have any other opinions?"
After that, everyone was talking in gibberish.
Sui Zuyun said: "Okay, let's vote!"
"If you agree with the Gimli and Xoodoo cryptographic algorithms, please raise your hands!"
In an instant, more than a hundred hands were raised.
"Don't put your hands down, I said put them down and put them down again."
Someone went to count the people who raised their hands.
After a long time, Sui Zuyun said: "Okay, put your hands down."
"If you agree with the ESF cryptographic algorithm, please raise your hands!"
In an instant, more than a hundred hands were raised.
"If you agree with the SM2 and SM4 encryption algorithms, please raise your hands!"
In an instant, more than a hundred hands were raised.
A moment later, after Sui Zuyun knew the voting numbers, he said: "The current situation is that the Gimli and Xoodoo encryption algorithms, the ESF encryption algorithm, and the SM2 and SM4 encryption algorithms, the votes of the three parties are the same."
Sui Zuyun raised his wrist, glanced at his watch, and said, "It's noon now. Let's go eat. We'll discuss this matter at two o'clock in the afternoon."
Immediately, everyone stood up and went to eat under the guidance of the staff.
The private room next door!
Sui Zuyun and some people gathered here.
Sui Zuyun looked at a middle-aged man and said, "Academician Nan, tell me, what should we do about this situation now?"
"It's very simple!" Academician Nan said: "Let them compete among three parties. Whoever creates a better cryptographic algorithm will use his cryptographic algorithm."
Sui Zuyun's eyes lit up and he said: "This is a good method. Only in this way can we see whose encryption algorithm is the best."
Everyone also nodded and agreed with this method.
Sui Zuyun said in embarrassment: "But how to compete? Can they still be allowed to create a complete cryptographic algorithm? Even one person can't create it, and it will take a long time."
"It will be a few years until they create it, and we can't afford to wait!"
Academician Nan said: "To put it bluntly, cryptographic algorithms are the application of mathematics. I think they can use mathematical knowledge to compete."
"Doing math problems?" Sui Zuyun asked.
"No!" Academician Nan shook his head: "You can use NIST and let them assume the algorithm in NIST, so that they can compete."
One of the functions of NIST is the framework of post-quantum cryptographic algorithms. Add algorithms to it and you can run it.
Different algorithms have different functions and capabilities of NIST's cryptographic algorithms, which are equivalent to a simulator.
Someone on the side explained to Sui Zuyun what NIST was.
After listening to the explanation, Sui Zuyun nodded: "Okay, let's use this method, so that we can detect which of the three parties says the encryption algorithm is better."
"Through the competition, we can see the advantages and disadvantages of the cryptographic algorithms created by the three parties. We research in this direction and feel more confident."
Everyone nodded and agreed with Sui Zuyun's statement.
At two o'clock in the afternoon, Sui Zuyun said: "After our discussion, we decided that three professors, Cao Wencan, Fang Yongchang and Ye Fei, will use NIST to conduct a square cipher algorithm competition. Whoever wins will use his plan."
Cao Wencan and Fang Yongchang secretly looked at each other, their eyes full of fighting spirit.
As for Ye Fei, they didn't take it seriously.
Ye Fei didn't specialize in algorithms, so they didn't pay much attention to it.
If a non-professional could defeat these two professionals, it would be a big joke.
Therefore, they believe that the winner must be between the two of them.
You'll Also Like
-
Pirates: I plundered entries in the underwater prison!
Chapter 114 2 hours ago -
Doomsday: Sign in to the planetary shelter at the beginning
Chapter 1376 6 hours ago -
My Players' Second Playthrough
Chapter 370 6 hours ago -
Dominate the Game of Thrones with Mount and Blade
Chapter 209 6 hours ago -
Participating in a money-saving variety show, earning billions because of stinginess
Chapter 109 6 hours ago -
Mortal Cultivator
Chapter 334 6 hours ago -
My villain wants to save himself, but the yandere heroine disagrees
Chapter 537 6 hours ago -
Honkai Impact 3rd: Live broadcast room, start!
Chapter 163 6 hours ago -
I have become the zombie king, and the zombie apocalypse has just broken out.
Chapter 261 6 hours ago -
Plundering countless entries, I became a god in the wasteland era
Chapter 182 6 hours ago