Not to mention how the old professor could climb up with his old bones, but if he really wanted to jump down, the three of them really couldn't guarantee that the professor would not suffer fractures or other problems.

Finally, with their kind words, Professor Kleinrock climbed down from the table.

"I feel like I'm being bullied by you in math."

After coming down, Professor Clay Locke said this.

Xiao Yi and the three of them scratched their heads involuntarily. Did they do something just now?

"I'm sorry, Professor, we were all watching Xiao Yi's derivation just now, so we thought you were watching too. Maybe we didn't notice you. What do you mean?"

Kleinlock let out a long sigh.

He felt like he was being bullied again.

It's so tiring to talk to these people who are good at math.

"Okay, okay, I want to know now, what is the use of this new polynomial you are talking about? Can our problem be solved now?"

Tao Zhexuan nodded and said, "Yes, the problem has basically been solved."

"And maybe... Xiao Yi not only solved the dangers brought by classification sieve to RSA encryption, but to some extent, it directly greatly improved the security of the entire RSA encryption."

"If we simply analyze the complexity, it will be no less difficult to crack this new RSA encryption than ECC encryption, and its cracking difficulty has also increased from the previous sub-exponential level to a truly exponential level."

"in addition……"

Tao Zhexuan suddenly thought for a while, and finally picked up a pen and calculated on the blackboard. When he finally got a divergent result, he said in surprise: "Even the Shor algorithm will be difficult to crack! Using the Shor algorithm The complexity of cracking it is still exponential, but the coefficient is slightly smaller.”

Terence Tao's words finally came within Kleinrock's understanding. He said with widened eyes: "Is the cracking complexity of Shor's algorithm so high?"

"Yes!" Terence Tao nodded again, "Because Xiao Yi performed a Fourier transform at the end, which directly greatly reduces the effect of the Shor algorithm in principle!"

The shor algorithm is a representative algorithm in quantum computing.

Its principle is based on the quantum Fourier transform algorithm, which uses the parallelism of quantum computing to perform large-scale factorization, which has a very significant effect in cracking the RSA encryption system.

At least, whether compared to ordinary number field sieves or today's classification sieves, the quantum Shor algorithm has incomparable advantages in prime factorization.

Of course, since it is called quantum computing, it is precisely because this algorithm requires the characteristics of a quantum computer to work, so it is also limited by the quantum computer. With the world's current quantum computer technology, if you want to use this algorithm in RSA It is still far from being effective in encryption cracking.

After all, there are only so many institutions in the world that are capable of researching quantum computers. It is impossible for those hackers to develop a quantum computer. If this is the case, why are they hackers?

"So in other words, even if we really invent a quantum computer ten years or decades later, the security of RSA encryption can still be guaranteed."

Terence Tao said.

This is the cutting edge of mathematics!

A giant step ahead of the world in any other subject!

Before quantum computers were developed, they had already found a method of control from a mathematical perspective.

Kleinlock became even more excited: "In this case, wouldn't RSA encryption around the world become more secure! Xiao Yi, you did a great job!"

However, after being excited for a while, Clay Locke suddenly calmed down and asked: "What about the difficulty in practical application?"

The difficulty of application is a key, just like ECC. Although its security is much higher than RSA, it is difficult to understand and the threshold is high, so it has not completely replaced RSA.

According to these difficulties written by Xiao Yi.

He can't even understand it. Is it difficult?

"The difficulty of practical application will indeed become higher, but..."

Tao Zhexuan took another look at the polynomial written by Xiao Yi, and then said: "But the cost of learning is lower than that of ECC. The way of expanding this polynomial is quite clear, for those who study cryptography , the difficulty of understanding it is at most an advanced level after entry. After all, the computer science department itself has to learn complex functions.”

Really?

I do not believe.

Kleinrock also followed Terence Tao's gaze and looked at the polynomials on the blackboard. After thinking for a moment, he said, "Then why can't I understand it?"

"Well……"

This is an embarrassing question.

In the end, Tao Zhexuan gave an answer with high emotional intelligence: "After all, this is a new kind of knowledge. It is completely normal that you can't understand it for the time being. Of course, it is also our fault. We should introduce theories in mathematics to scholars in other fields. It’s our responsibility, if you don’t understand, we didn’t explain them well.”

"Blame me, blame me." Xiao Yi next to him also said.

After all, it was him who created it.

"Blame me, blame me." Maynard continued. Since Tao Zhexuan and Xiao Yi have said it, it would be a little different if he didn't say it.

Kleinrock: "..."

"Okay, Professor Kleinlock, our most troublesome problem has been solved now. The next problem involves the design of the protocol. Although there is still a certain distance between us and the design of the protocol, there are still some problems. There are certain problems, but at least with Xiao Yi’s method, we can be considered a leader among all project teams.”

Tao Zhexuan changed the topic in time to avoid Professor Kleinrock from suffering a greater blow.

When it came to business, Kleinlock finally stopped worrying about what had just happened. He nodded and said, "Yes! Now we only have the design issue of this agreement left!"

At this moment, Xiao Yi spoke again: "Actually, I already have some ideas about the most critical multi-party security issues in this agreement."

The other three people were immediately stunned and looked at Xiao Yi in disbelief.

The most troublesome problem has just been solved, and now it turns out that the second most troublesome problem can also be solved?

The multi-party security issue of this cross-chain transaction protocol is indeed the second most troublesome issue besides solving the classification filter attack problem.

And compared with the problem of classification and screening attacks, this multi-party security issue is the core of this protocol.

The former is technically difficult, while the latter is the most difficult test of design ability.

How to ensure that traders are protected from hackers during cross-chain transactions, as well as theft from the trading platform, as well as other risks, are the key to this multi-party security agreement.

"How to solve it?" Kleinlock asked hurriedly.

He sought help from three top mathematicians, Xiao Yi, not just for this matter. This question could only be answered in the field of pure mathematical logic. With his mathematical ability, it was simply impossible to solve this problem.

"It's still this polynomial."

Xiao Yi clicked on the polynomial on the blackboard, and then said: "According to the general term formula of this polynomial, we can easily generate the term in which it is the digit."

"According to this principle, when a transaction occurs, the buyer and seller will each obtain a corresponding matching code, and each will generate such a polynomial based on the randomly obtained matching code."

"Then in this process, an algorithm is used to extract one term of the polynomial, and then Fourier transform is used..."

Xiao Yi explained and demonstrated on the blackboard.

Just like the original millionaire problem.

The agreement shown by Xiao Yi is also like the agreement in the millionaire's problem. It does not require any third party to achieve the exchange of information between the two parties. After all, the transaction is also an exchange of information.

Of course, more strictly speaking, the third party should be replaced by the protocol algorithm, and this third party is completely trustworthy.

As Xiao Yi finished explaining, the three professors once again didn't know what to say.

Until the end, Kleinlock murmured: "What a genius design!"

This time, Kleinlock finally understood. Although he still didn't understand how the polynomial was derived, it did not prevent him from understanding the principle of the agreement.

As a computer expert, they only need to know what a certain function does. As for how the function comes from, there is no need to study it carefully.

Tao Zhexuan also nodded seriously.

"According to this design, it is equivalent to avoiding the possibility of self-inflicted theft! As long as the generation of matching codes occurs on the terminals of both parties to the transaction, and they only upload a random term in the randomly generated polynomial, the trading platform will definitely be It is technically impossible to translate this random item."

"And even if it is a hacker attack, it is basically impossible for them to intercept the information of both parties to the transaction! Even if they intercept the information of one party, it will be difficult to intercept the information of the other party!"

"Unless they hacked into not only the server of the trading platform but also the computers of both parties to the transaction at the same time, even then, they would have to first decipher the digits of these two random items, and as long as this digit If the number is large enough, it will definitely take a lot of time to crack.”

"And during the period of cracking, as long as a detection system is added, the asset transaction can be terminated at any time, thereby protecting the property safety of both parties to the transaction!"

Although James Maynard sounded a little confused about how the whole process happened, he quickly understood the key.

He said in surprise: "In this way, wouldn't the two biggest risks in cross-chain transactions be greatly reduced?"

"Yes." Kleinlock nodded solemnly, "That's it!"

"The mathematical logic of this protocol is definitely the most outstanding design I have seen in all my years of working in the industry!"

He exclaimed: "This is a true work of genius!"

Chapter 115 "A new polynomial expansion brings the Riemann Hypothesis to the test

The boundary theorem approaches 50》

The boundary theorem approaches to 50%》

"If our final agreement can really be selected by the World Bank, Xiao Yi will definitely be the first to contribute!"

"I think so too." Terence Tao nodded in agreement.

Maynard certainly agreed.

Before cooperating with Xiao Yi, Xiao Yi was a super smart genius to them, with a talent that amazed the world.

And now after cooperating, Xiao Yi has become a god-level teammate to them.

Now they are all led by this god-level teammate.

"Well..." Kleinrock said: "So, when the 10 million US dollars reward is issued, I think Xiao Yi should get at least 5 million of it."

Tao Zhexuan said: "Hey, I think 6 million is not a big problem."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like