Chapter 49: Decoding work begins
After Zhang Weiping left, there were not many people left in the office.
Liu Lu from Nanjing University is still there. The youngest full professor of mathematics in the country is currently squatting in front of the computer and wondering what he is busy with.
Professor Mokomo of Nanyang University, who asked him about the core of the Dirichlet function using the simplified method, is also still there. He is sitting at the table with a frown, calculating something.
He didn't know the remaining two people.
Withdrawing his gaze, Xu Chuan focused his attention on the original cipher text in his hand.
He is not very familiar with cryptography and encryption work, and his knowledge is limited to common sense.
For example, asymmetric encryption system, symmetric encryption system, hash algorithm, MD5 encryption, SHA1 encryption, etc.
He had some knowledge of these common encryption methods, but not much.
However, from a mathematical point of view, there is actually no way to prove that a certain algorithm is 'absolutely safe'.
Of course, the proof of security in practice is the fact that it has never been cracked, which is still true.
In the past, people thought that the DES encryption system based on the symmetric encryption algorithm was very safe, but with the development of modern computers, an ordinary person's home computer has the computing performance to easily crack it violently.
Nowadays, we believe that encryption algorithms such as AES, RSA, and elliptic curve are safe. After all, there has been no news that these encryptions have been cracked.
But in fact, these encryption methods are not absolutely safe.
For example, if RSA does not perform padding, an attacker can greatly reduce the decryption space by observing the ciphertext of a specific plaintext.
Or if AES encryption is the most primitive mode, then the same ciphertext will correspond to the exact same plaintext.
In addition, some machines are not random enough when generating passwords, so the keys that should be randomly distributed are actually exactly the same.
These are all flaws.
Xu Chuan didn't know much about encryption methods, and these were not things he needed to care about.
Because in this building, the most elite cryptography experts in China are gathered.
For example, Academician Wang Xiaoyun, a top cryptography expert, has single-handedly made China's cryptography a world leader.
In the early years, the United States claimed to have developed a set of MD5 encryption algorithm technology, claiming that it was the most secure algorithm in the world, and declared that "no one will crack it in 100 years."
This attracted the attention of the whole world, and many experts in the field of cryptography rushed to study it. Some scientists led their teams to study it for more than ten years without success, but Wang Xiaoyun easily deciphered it.
Later, after learning that MD5 had been cracked, the United States urgently came up with another top encryption algorithm, SHA-1.
SHA-1 is more powerful and complex than the previous MD5 algorithm. Countless top cryptographers came to challenge it. Most people couldn't advance after counting 40 steps, but Wang Xiaoyun still cracked it easily.
And the reason for this cracking made the United States vomit blood. The reason was simply because the code goddess was bored during her confinement period, so she took out a pen and paper to write and draw, and then cracked it in just two months. This extremely complex encryption algorithm.
With such top talents, China's network security capabilities are as solid as gold.
But today, they once again upgraded the encryption algorithm.
Not only have the rules and algorithms been redesigned, but double encryption has been implemented to incorporate huge functions.
This kind of encryption method is no longer pure cryptography, it involves other aspects of knowledge. Even top cryptography experts, even the goddess of cryptography, are unable to break this kind of encrypted message alone.
Fortunately, Xu Chuan does not need to worry about cryptography and encryption work.
He only needs to find the rules behind the encryption of the double function algorithm and establish a targeted mathematical model. Regarding this, Xu Chuan is still confident enough.
He came from twenty years later, and although he was not a mathematics major in his previous life, at Princeton, he had access to the world's top and most cutting-edge mathematics knowledge at any time.
In Princeton, countless mathematics conferences are held every year, and countless geniuses and mathematicians are there to convey their ideas and results.
Those advanced functional knowledge and achievements are naturally among them.
Since Galileo defined functions in the early days, functions have never left the core stage of mathematics.
If mathematics is the foundation of all disciplines, then functions are the soul of mathematics.
The essence of a function is to try to establish a mathematical tool that describes the 'causal relationship' between related things.
Causality is one of the most important laws in human cognition of things.
In simple words, discovering and describing causal laws can give humans the ability to "predict" things.
For example, if a function describes the movement of a car, as long as the independent variables of the function include rich parameters such as time and movement speed, we can go back to 5 minutes ago or predict where the car will be in 5 minutes.
If it is more complicated and loads more parameters, the function can even predict a person's actions and what time you will do tomorrow.
Before the invention of this mathematical tool, it was almost impossible to describe this relationship accurately.
In the mathematics room of the Information Security Department, Xu Chuan listed the information in his hand on the table in front of him.
One side is the original cipher text, and the other side is the translated mathematical puzzle. Each piece of information is unique and there is no duplication.
Xu Chuan carefully studied the mathematical problems after the transfer.
From basic exponential functions, logarithmic functions, power functions, trigonometric functions, inverse trigonometric functions, to complex hash functions, symmetric functions, Gaussian functions, max, min functions, Euler functions, etc.
These math puzzles include a wide variety of function puzzles.
But he was not intimidated by the complex and changeable functions. Xu Chuan knew very well that most of the most complex functions are composed of basic functions.
Although these functional problems are irregular, the United States can use these various functional problems to encrypt messages, and can send a large amount of useless messages to interfere with other countries. It must have a large number of them in its hands. Generate mathematical rules for creating various function problems.
He does not believe that an ordinary person performing a task has the mathematical ability to decipher and solve these mathematical problems.
So calm down and search slowly, and you will definitely find a clue.
Although from a mathematical point of view, perfect things exist, they cannot be created in reality.
It's like there are definitions of infinity and infinitesimal in mathematics, but can you write a number that represents infinity or infinitesimal?
This is simply not possible.
Thanks to book friends 20221005012213681, You Fang Taoist Traveling Around the Square, Gu, Yu, Jiuwei Cheng, Qixingjiang, Misaka Yujie 20001, Bai Xiaohanxing, Master Qingxuan, Memories under the Glass, The world is so chaotic and the world is still. Thank you for the tip from the boss.
PS: There will be an update tomorrow, and the rules will be updated as the collection increases.
I am enforcing all the rules for adding updates. Please vote for the monthly votes and recommended votes in the hands of the bosses, and also follow up on reading, please follow up on reading.
(づ ̄3 ̄)づ╭~