Chapter 314 What Else is Hidden Here?_3
Li Jian Gao instinctively glanced at the time.
The response time was really fast, almost without any hesitation.
Are domestic laboratories this efficient? Or were they just waiting for the cooperation invitation from the Xilin Mathematics Research Institute?
"It will take approximately two days to build the model, let's reconvene in two days then," Qiao Ze replied.
"No problem, I'll send them a reply in a while, Dad."
"Mm."
Listening to the conversation between Qiao Ze and Dou Dou, Li Jian Gao fell silent for a moment and said: "Well, that... Su just sponsored the Qiao Ze Natural Science Foundation and is financing a new laboratory. There shouldn't be any financial issues, right?"
Before Qiao Ze could respond, Dou Dou interjected: "Grandpa Li, you underestimate my grandpa. He is really wealthy now, and you don't understand capital operations. If Grandpa really wants to establish this epoch-making supercomputing center, he could even do it without spending a dime, as people would rush to foot the bill."
Moreover, you still don't understand the significance of this supercomputing center if it truly commences operations. For instance, the prevalent encryption systems used currently, including those in banks, would need to be upgraded. Based on the current level of technology, a range of encryption technologies, whether it be symmetric encryption represented by AES and DES, asymmetric encryption represented by RSA and ECC, or even hash functions like SHA-256 and MD5.
Even the current digital certificates and TLS protocols could become a laughing stock; the biological supercomputing center could likely crack them in minutes. Just think about how much value could be generated from upgrading the corresponding cryptographic systems? In the future, the biological supercomputing center could take on this encryption system upgrade work."
After hearing Dou Dou's words, Li Jian Gao scratched his head, turned to Qiao Ze, and asked: "Really?"
Qiao Ze hesitated for a moment before nodding and responding: "It's just theoretical, whether or not it can achieve such effects has to be tested after it's built."
Li Jian Gao swallowed and, looking somewhat nervous, asked: "If it can really achieve such effects, are there alternative encryption algorithms that can ensure the security of this information?"
Indeed, at that moment, this honest man was genuinely nervous.
This Dou Dou...
Such things shouldn't have been mentioned.
If this biological supercomputing center truly achieves such capabilities, then it must be classified as top secret.
A stock market saying used to death comes to mind, confidence is more precious than gold.
In an era where many people's three-digit wealth is protected by six-digit passwords and various online payments are used frequently, if people find out that a six-digit password is no longer sufficient for protection and could even be cracked within minutes, it would be a staggering blow to the modern economic system.
If there had been a choice, he would rather not have heard Dou Dou's revelations just now.
Although the academic community has long rumored that once quantum computer technology matures, it could easily crack various asymmetric encryption protocols through the Shor algorithm, there has never been a timeline for the large-scale commercial use of quantum computer technology.
But Qiao Ze has already proven twice that if he gets involved in a project, it tends to get implemented very quickly.
For instance, the photolithography factory project in Huaxia and the current project he leads on deep-sea unmanned cluster exploration.
Fortunately, Qiao Ze nodded and said: "Alternative algorithms are already available."
"Already available?" Li Jian Gao was startled.
He indeed hadn't heard about this.
"Yes, Grandpa Li, I wanted you to study my dad's superspiral algebra, but you were reluctant. If you had studied superspiral algebra, you would know that the algebraic properties of spirals and ring structures in high-dimensional space can be used to construct encryption algorithms."
For example, a pair of public and private keys can be generated using random spiral paths in high-dimensional space. The public key describes the external features of the spiral path, including its geometric shape, direction, and density, whereas the private key involves the internal parameters generating these spiral paths, including initial conditions and control parameters."
Then, map the data to be encrypted to points in high-dimensional space, and then perform geometric transformations and nonlinear mappings using the spiral path described by the public key. These transformations depend on the data point's location and the characteristics of the public key, which would scatter the encrypted information across different locations in high-dimensional space."
The holder of the private key can restore the original information by carrying out the inverse geometric transformations and mappings on the encrypted data. Since the private key contains all the internal parameters used to generate the spiral path, only those possessing the private key can accurately reverse these complex operations."
Since the specific superspiral structure parameters for each key generation are random, it is nearly impossible to decrypt it. Even a super quantum computer could not decrypt the information without the initial spiral path parameters, and these spiral paths could also be dynamic."
This encryption technology has been used to protect my core files, but my dad has always been too lazy to publicize it. Otherwise, who would dare send my true form across the ocean, confident that they could never reverse engineer this new encryption technology."
Even if we don't reveal it, they would never know which encryption method we are using! Look, they have had my true form for so long, studied it extensively, and even failed to perform the most basic reverse analysis."
Dou Dou's proud voice echoed around the office, making Li Jian Gao
wonder if he was really getting old.