In 2017, Wang Xiaoyun’s “combat†tool, which was selected as an academician of the Chinese Academy of Sciences, is not complicated. A pen, a piece of paper, a computer, and methods are all in mind. She often put her chin on her head and looked at the ceiling. It was quiet and barely moving. If it is not the sharp eyes shot in the eyelids, it looks like a daze. At this moment, Wang Xiaoyun is exploring the direction in the maze of science.
Cryptography requires absolute concentration and requires a lot of interference to be achieved. In the eyes of others, perhaps the boring character, in Wang Xiaoyun's view, flashes a vibrant color everywhere.
"So the cumbersome and complicated operation of everything is contained in the simple numbers and shapes. Really sinking into the heart to understand these symbols, layering the bamboo shoots from shallow to deep, from simple to complex, one layer is closer to the essence than the first layer, it is Wonderful." Although he has been "crawling" in the field of cryptography for more than 20 years, he was successfully elected as an academician of the Chinese Academy of Sciences, but when he talked about the cryptography he loved, Wang Xiaoyun was like a first love.
"Setting up mystery" and "guessing mystery", fun endlessWith interest and willing to meet the challenge, this is what Wang Xiaoyun thinks must be good for cryptography. As a precise and concise language, passwords abstract the essence of things and control the complex structure of the entire world with minimal characters. In Wang Xiaoyun's view, cryptography is like a process of 'setting a mystery' and 'guessing a mystery'. It has a mature and complete scientific system and is fun.
In 2005, the American "New Scientist" magazine published an article "Crash! The Crisis of Cryptography, which reported the milestones achieved by Wang Xiaoyun in a very powerful language. For the academic world, this huge shock comes from the two algorithms that were cracked by Wang Xiaoyun and are generally regarded as “unbreakableâ€.
Over the years, the Hash function-based MD5 and SHA-1 issued by the National Institute of Standards and Technology (NIST) are recognized as the most advanced and widely used two important algorithms in the world. The great thing about these two algorithms is that any small tampering of the input information immediately causes an "avalanche effect", thus ensuring the uniqueness and unforgeability of the digital fingerprint of the information. Therefore, according to the conventional method, even if a large computer is called, it takes a million years to calculate. This ensures the absolute security of the electronic signature in reality.
The wide application of MD5 and SHA-1 stems from people's full trust in their security. In theory, they are "impossible to crack". The cryptography elites around the world have "identified their bodies" after they came out, and many cryptographers' attempts to crack have failed. However, Wang Xiaoyun was born out of the world and frequently sounded an alarm. The World Cryptography Conference in August 2004 and the RSA Annual Conference in February 2005 witnessed the success of the two algorithms in less than half a year.
We can understand the meaning of "Wang's attack" in a rough and simplified way: At present, at the fastest speed, the ordinary PC can find the "collision information pair" of MD5 in just a few minutes. This not only means the reduction of the security of the digital signature, but also the possibility that the security of other cryptographic applications based on the hash function is reduced. If this is the case, so-called "secure network sites", all cryptosystems and applications based on the collision-free nature of the hash function may be threatened by attacks. Therefore, the National Institute of Standards and Technology announced that the US government will no longer use SHA-1 within five years, instead it will be a more advanced new algorithm. Experts from well-known companies such as Microsoft, Sun and Atmel have also published their countermeasures. .
Wang Xiaoyun himself is willing to look at his own discovery from another angle, that is, calling for more advanced cryptographic algorithms to make network information more secure. "Cryptographic analysis scientists are different from hackers. Hackers steal password-protected information for profit, and cryptanalysts are engaged in basic theoretical research to evaluate the security of cryptographic algorithms and find their vulnerabilities to design safer. Password algorithm."
Meeting one challenge after another, this process fascinated meWhen the two pillar algorithms of the hash function were hit hard, in 2007, the National Institute of Standards and Technology collected a new international standard cryptographic algorithm from global cryptographers. Wang Xiaoyun abandoned the design of the new international standard cryptographic algorithm and switched to the domestic password. Algorithm standard. Today, Wang Xiaoyun is also proud of his choice. The needs of the motherland are an important driving force for her research.
In 2005, Wang Xiaoyun and other domestic experts designed China's first hash function algorithm standard SM3. Today, SM3 has escorted many industries in China, and has approved more than a thousand cryptographic products. A variety of products are widely used nationwide. More than 600 million smart grid users protected by SM3, including USB3 shipments of SM3. Over 1 billion, the bank card is over 100 million.
What makes Wang Xiaoyun most happy is that the national cyber security system is constantly advancing on the road of industry standardization. After the release of SM3, more than 30 industry standards in the field of password-related fields were released, and the country's understanding of network security issues became clearer and deeper.
"Cryptography is the core technology to solve modern information security problems. At present, there are more and more people engaged in cryptography research in China. They are constantly improving the cryptographic system for information security in various industries, which will further compress the hacker's living space because of general hackers. The attack is nothing more than a non-standardized cryptosystem or a network communication system that does not deploy cryptography at all," said Wang Xiaoyun.
In the field of cryptography, Wang Xiaoyun certainly has her unique talent. However, whether it is to emphasize inspiration, or machine-like and precise rationality, it has invisibly devastated the researchers for decades of hard work and struggle.
For cryptographers, the time unit is a month and a week of minutes and seconds cut into decades. It can be specific to each step on the calculation paper, inspiration, failure, and the result is close to the joy. It is a secret personal battle. Although this means that it may be unknown, Wang Xiaoyun said that she does not care, just hope to make a result that is truly satisfactory. "Cryptography can give you space to slow down. You need to concentrate your mind on one thing, drill down into one mind, and meet one challenge after another. This process fascinates me."
In 2017, Wang Xiaoyun was elected as an academician of the Chinese Academy of Sciences.
Let Chinese cryptography be at the forefront of the worldIn the fast-food era of new knowledge, there is a relatively pure environment to do what you like, and use your own mind and years of accumulation to do some groundbreaking and subversive work. Wang Xiaoyun said that this is the cryptographer’s “little luckyâ€. ".
From the diplomatic and military fields to the open, today, cryptography has developed into an interdisciplinary subject of integrated mathematics, computer science, electronics and communications, and microelectronics. Cryptography is the core of network information security, and cryptographic algorithms are the theoretical foundation of cryptography. Its importance is self-evident. "The country is paying more and more attention to cryptography. Tsinghua's good interdisciplinary cooperation platform and relaxed academic atmosphere have provided us with a strong guarantee for solving more complicated and unknown problems."
In addition to scientific research, what Wang Xiaoyun does most is to cultivate more students who can talk to the world's top cryptographers. "China still needs to accumulate thickness. The development of the discipline requires a batch of researchers to accumulate. The research time of one person is too limited, and it will be decades. If more excellent students are cultivated, they can continue to continue. Chinese cryptography has always been at the forefront of the world."
In Wang Xiaoyun's view, the best ability of cryptanalysts is to discover mathematical problems that really reflect security in cryptographic algorithms. Wang Xiaoyun's rich experience and students' whimsy often lead to whimsy. No matter how busy she is, she will always take the time to concentrate on the discussion with the students, and even call the students on the New Year's Day to exchange unexpected ideas.
Wang Xiaoyun's team has two research groups, public key cryptography and symmetric cryptography. When doing research, students will inevitably encounter setbacks. After all, this is a long and challenging subject of quantitative change.
"Interest is an indispensable factor in supporting everyone's progress. When you first enter the postgraduate stage, it is inevitable to find the direction. This time, teachers need to combine the characteristics of each student to guide." Wang Xiaoyun often encourages students. "If you find the wrong way, you don't have to be discouraged. If you don't work, you can change your mind and change your way. If you can't find the direction for the time being, just put it down and do something else. The new direction may suddenly appear in front of you. "This is also a valuable experience of her personal academic career for many years. "Do not pursue short-term goals, do not use papers and results as the only assessment mark. I hope that my students will have the will and motivation to explore the mysteries of cryptography. Challenge password math puzzles and have fun in the process."
Although in the field of passwords has long been famous, Wang Xiaoyun is still the Wang Xiaoyun - persistent research and love of life. In Wang Xiaoyun's office, there are a few pots of Clivia, and the green leaves are quite beautiful. Several flower buds are waiting to be released - "This is a new starting point." Wang Xiaoyun looked out the window and his eyes burned.
Biography:Wang Xiaoyun, professor of the Institute of Advanced Studies at Tsinghua University, was elected as an academician of the Chinese Academy of Sciences in 2017. The five international HASH function algorithms including MD5 and SHA-1 are solved, which solves the scientific problem of HASH function collision for more than ten years. The design of China's HASH function standard SM3 is adopted as the standard of China's cryptography industry in finance and transportation. Widely used in important economic fields such as the State Grid.
More than 40 representative papers, 3 papers won the best papers of Omi and Mei Mi. In 2016, he won the Network Security Excellent Talent Award. In 2014, he won the special prize of the China Cryptography Society Password Innovation Award. In 2010, he won the Su Buqing Applied Mathematics Award. In 2008, he won the second prize of the National Natural Science Award. In 2006, he won the Chen Jiageng Scientist Award and was an outstanding scientist. Awards, etc.
The outer layer of double wall heat shrinkable casing is made of high quality polyolefin alloy and the inner layer is made of hot melt adhesive. After molding, the product is crosslinked and continuously expanded by electron accelerator irradiation.
The outer layer has the advantages of softness, low temperature shrinkage, insulation, anti-corrosion and wear resistance, while the inner layer has the advantages of low melting point, good adhesion, waterproof sealing and mechanical strain buffering.
Widely used in electronic equipment wiring waterproof, leakproof, multi-strand wire harness sealing waterproof (such as home appliance wiring harness, automotive wiring harness, etc.), wire and cable branch sealing waterproof, metal pipeline corrosion protection, wire and cable repair, water pump and submersible pump wiring waterproof and other occasions.
Double wall heat shrinkable casing is produced by double layer co-extrusion process of polyolefin halogen-free flame retardant material and hot melt adhesive.
The outer layer is polyolefin, which has the characteristics of insulation, halogen-free flame retardant and low temperature shrinkage. The inner layer of hot melt adhesive has the advantages of low melting point, good adhesion, waterproof sealing and mechanical strain buffer.
Double Heat Shrink Tubing,Double Wall Heat Shrink,Double Wall Adhesive Heat Shrink,Double Wall Heat Shrink Tubing
CAS Applied Chemistry Materials Co.,Ltd. , https://www.casac1997.com