Hello, Professor Yu Hua, first of all, thank you for submitting your article to the "Annual Review of Mathematics". This is your trust and support for the "Annual Review of Mathematics". Regarding your research results - asymmetric cryptography theory, it is foreseeable that the development of world cryptography will have an unprecedented impact. revolution, you have greatly improved the security of information transmission in human civilization.
After learning that you are from the National Tsinghua University of China, Professor Weyl, Professor Neumann and I were very surprised. We also admire you very much for your important contribution to the development of world mathematics as a Chinese scholar.
In order to express our gratitude for your contribution to the development of world mathematics and the security of human information transmission, we have decided to sincerely extend an invitation to you. If you are interested in coming to the United States to engage in cutting-edge mathematical research, please be sure to contact us. The door of Princeton University will always be open to you.
In addition, we also extended an invitation to Professor Hua Luogeng.
Solomon Lefshetz, professor at Princeton University and editor-in-chief of the Annals of Mathematics.
July 1, 1937.
After reading the content of the letter, the handwritten letter was accompanied by a postcard from the editorial office of the Annual Report of Mathematics, with the autograph of editor-in-chief Solomon Lefshetz written on it.
Obviously, the function of this postcard is exactly the same as Professor von Kármán’s business card.
This is an invitation from Princeton. With this postcard, you can go to Princeton anytime and anywhere to engage in cutting-edge mathematical research.
"If Professor Lefshetz knew that I was a student, I don't know what his reaction would be." Yu Hua read the entire letter with a smile on his face and a touch of interest in his eyes.
Going to Princeton was a necessary journey, but not to engage in cutting-edge mathematical research, but to pursue a master's degree in mathematics and a doctorate in mathematics.
A degree is extremely important in academic circles. The authority and influence of speech are completely different between those with and without a degree. Yu Hua needs to get a doctorate in mathematics to improve himself.
After putting away the envelope and postcard, Yu Hua smelled the smell of sweat coming from his body. He suddenly remembered what he was supposed to do, said something to Professor Zhao Zhongyao, and then went downstairs with a change of clothes.
It is a good thing that the paper has been published, and it is also a good thing that Professor Zhuang Qianding agreed to join the project. However, this does not prevent him from taking a shower.
Personal hygiene should be done well.
Humming a little tune, Yu Hua happily went downstairs, while a storm outside due to the results of asymmetric cryptography was brewing.
…
Asymmetric cryptography theory, with the influence of the Annual Report of Mathematics and the evaluation of three giants of the Institute for Advanced Study in Princeton, continues to ferment and spread, and the popularity remains high. The response from the international mathematics community is enthusiastic, the news media continues to follow up, and various countries’ intelligence The department is paying close attention to this research result.
Just as Yu Hua’s previous analysis and speculation concluded, after repeated verification and verification to confirm the rigor and correctness of the asymmetric cryptography theory, it has formed a terrifying pressure like a dimensionality reduction attack on the symmetric cryptography used by countries around the world today.
Comprehensively crush symmetric passwords and improve security exponentially.
The question facing the intelligence field of various countries is very simple: to use it or not to use it.
There is only one answer - use.
And it has to be used!
If you reject the asymmetric cryptography theory, your own password will be easily deciphered by the enemy. However, because the enemy uses asymmetric cryptography, it will be unable to decipher it, resulting in a terrible situation of one-way information transparency.
Whether it is economics, politics, or military, one-way information transparency is a nightmare.
No country will allow such a thing to happen, and no country dares to bet that it does not use asymmetric cryptography, and other countries do not use it either.
This is a chain of suspicion in the field of cryptography. As long as one country chooses to follow the asymmetric cryptography theory, then all countries in the world will inevitably enter the era of asymmetric cryptography.
"Sir, the evaluation report on asymmetric cryptography theory has come out. I think we must write new cryptography based on asymmetric cryptography theory. The evaluation results show that asymmetric cryptography is better than symmetric cryptography in all respects." A person from the Office of Naval Intelligence The colonel officer opened the door, walked in, came to the middle-aged man with the rank of brigadier general, who was the director of the office, and handed over the latest assessment and analysis of intelligence documents.
The middle-aged brigadier general put down his work, took the intelligence document, glanced at the title "Asymmetric Cryptozoology Theory Evaluation and Analysis Report", opened the report document and read it carefully.
This evaluation report is based on the asymmetric cryptography achievement paper co-signed by Hua Luogeng and Yu Hua. It makes logical assumptions and deductions, and lists data one by one on security, deciphering difficulty, timeliness and so on.
"What will happen if we refuse to use asymmetric cryptography through coercive means?" The middle-aged brigadier general quickly read the entire evaluation report, placed it on the table, raised his head, and cast a pair of sharp eyes like an eagle at the colonel.
"Limited to the scope of the naval intelligence system, the contents of our naval telegrams will be intercepted and deciphered by the Army Intelligence Agency, FBI, Japanese and Germans. Assuming that the above-mentioned decipherers all use asymmetric cryptography systems, we will not be able to decipher each other's codes. As a confidant, the colonel officer said with a meticulous face: "You will be dismissed by His Excellency the President. This is a price that you and the Naval Intelligence Agency cannot bear."
Technological progress cannot be blocked with just a ban. The consequences of refusing to use asymmetric cryptography theory are unbearable for any country or organization that needs to transmit information.
The middle-aged brigadier general nodded: "Order: The Naval Intelligence Agency immediately organizes cryptography experts to compile a set of asymmetric ciphers based on asymmetric cryptography theory. All symmetric cipher tables in use and backup will be used after the new cipher comes out. Invalidate and destroy it. Also, try to contact Professor Hua Luogeng and Professor Yu Hua, they must have the most secure asymmetric password."
"Yes, sir!" The colonel raised his hand in salute, turned and left.
…
In the office of the Japan Pavilion in Dongjiaomin Lane, Madoka Doi is working at the desk with an extremely serious face. He stares at the [Asymmetric Crypto] evaluation and analysis report on the table and reads the contents carefully.
As the content continues to go down, the whole person's facial expression becomes more solemn and gradually changes to solemnity.
"In other words, our red secret-B cipher has fallen behind. In order to ensure security, we must transition to asymmetric ciphers." A few minutes later, Doi Yuan put down the report, rubbed his slightly swollen forehead, and looked at Looking at the slim and heroic woman in front of him, he said slowly.
"Yes, Your Excellency Madoka Doi." The young woman nodded.
Headache.
Doi Yuan did not expect this accident to occur before the Great East Asia War.
After the asymmetric cryptography theory was proposed, all the symmetric cryptography in the world were swept into the garbage dump of history almost instantly and became synonymous with backwardness.
Unfortunately, regardless of the latest Red Secret-B cipher used in accordance with regulations, or the JN-25 series ciphers used by the Navy, the underlying logic is a symmetric cipher.
In an instant, the codes used for communications throughout Japan were reduced to a backward sequence.
This made Madoka Doi, an intelligence giant, extremely uneasy.
No one wants to continue to use backward ciphers. He has no control over the navy. The army must replace the red secret-B cipher as soon as possible and enter the asymmetric cipher era.
"Yoshiko, how long will it take to write a new asymmetric code?" Madoka Doi looked at this confidant from the Kwantung Army and asked.
Madoka Doi has many confidants, and the only agent with the highest status is the woman with the highest level of confidentiality in front of him - Yoshiko Kawashima.
Yoshiko Kawashima answered seriously: "If we can get help from professors at the Department of Mathematics at Imperial Kyoto University and Imperial Nagoya University, it will take about 3 to 5 months."
"I understand. I will report this matter to the base camp immediately and form an asymmetric password writing team as soon as possible. The red secret-B password will be used as usual. However, after the new password is written, it needs to be replaced and eliminated immediately to ensure security." Tufeiyuan nodded: "Yunzi is performing a lurking mission in Tsinghua Park. You pass the news to her and try to contact Hua Luogeng and Yu Hua."
"Yes!" Yoshiko Kawashima said seriously.
After saying that, he turned around and left.
"Asymmetric cryptography... I didn't expect that the Chinese could achieve such achievements in the field of mathematics." Looking at Yoshiko Kawashima's leaving back, Madoka Doi's eyes fell on the report on the desk again, his eyes sharp, and he whispered to himself.
The talent and wisdom of the Chinese are truly terrifying. Just two people can bring about earth-shaking changes in the world's cryptographic systems.
"The Point Guard Is Here"
The Greater East Asia War must be carried out as soon as possible, and China must not be allowed to rise from its weakness!
…
The intelligence agencies of various countries have a sense of smell and move very quickly, and they all begin to write encryption algorithms. However, due to the difficulty of constructing an encryption algorithm for asymmetric ciphers, it is temporarily impossible to come up with an effective asymmetric cipher in a short time.
In China, the base area was the first to realize the importance and significance of Yu Hua's research results, and is organizing people to write a set of asymmetric codes. In Nanjing, although Zhongzheng Brother and Lanyishe are bad, they are not stupid. Abroad, Under the influence of the extremely popular asymmetric cryptography theory and password upgrade activities, people also choose to upgrade the cryptography system.
They still understand the importance of information security.
But unlike the base area's self-reliance, the Blue Clothes Society's eyes fell on Hua Luogeng and Yu Hua, the two creators of asymmetric cryptography theory and the souls who once deciphered the Japanese army's red code system.
Soon, Tian Hong, an old acquaintance, came to the door.
"Team Leader Tian, this is the first set of encryption algorithms and algorithm password tables. I believe you understand the significance of this information. I hope you will not let down the hard work of Master and me." On the evening of July 6, Tsinghua Xiyuan No. 28 In the room, old acquaintances who had been separated for a long time met. Yu Hua looked at Tian Hong with a kind face and said softly.
After finishing speaking, he handed the asymmetric encryption algorithm and algorithm cipher table to Tian Hong.
On the side, stood Master Hua Luogeng.
"Professor Hua, classmate Yu, thank you. Thank you very much. The country and nation will remember your contribution." Tian Hong looked solemn, took the treasure-like encryption algorithm and password table with his hands, and bowed to Yu Hua and Hua Luogeng Acknowledgments.