Ding Wei Li Dawei: The old tree sprouts, can 30 years of cryptography experience bring live water to the blockchain?

“The blockchain is the largest password application for the crypto industry in the next few years.”

The person who said this sentence is an entrepreneurial recruit, the old man in the password industry, and Li Dawei, chairman of Dingyi Commercial Password Evaluation Technology (Shenzhen) Co., Ltd.

The reason why it is a recruit is because this is Li Dawei’s first venture after leaving the institutional unit. Except for a few articles about Li Dawei’s meeting on the Internet, you can’t find out about Li Dawei. More personal information.

In fact, according to Li Da’s own statement, he has been in the cryptography industry for more than 30 years, and he is called the old man in the field of cryptography. Prior to this, Li Dawei served as the director of the Commercial Password Testing Center of the National Cryptography Authority for a long time. It is understood that the commercial password testing center was established in 2002 and is a commercial password testing institution approved by the national password authority.

What is the reason for the sea when you are not confused?

The commercial password detection center has been the only commercial password product inspection agency designated by the National Cryptography Authority for a long time. It is mainly responsible for password detection of commercial password products, password detection of information security products, password detection of products containing password technology, and information security. Level protection commercial password evaluation, commercial password administrative law enforcement password identification, national electronic certification root CA center construction and operation and maintenance, password technology services, commercial password detection standard specification and other work. Li Dawei has been working here until he is in his 40s.

In 2017, Li Dawei set up a trip to the sea from a public institution. At this time, Li Dawei had no doubts, and he had passed the entrepreneurial golden age of dare to fight. Fortunately, Li Dawei’s new journey is still the old one of the password, and he is familiar with the road. Dingyi has successfully become the second commercial password product testing institution designated by the National Cryptography Administration after the National Commercial Password Testing Center. It is also the first third-party commercial password product testing organization in the country.

In addition to the basic work of password product testing, password application security assessment, information security assessment, etc., Dingyi also undertakes the research and project landing work of the smart city password application in Pingshan District, and leads the development of the cluster chain platform in the blockchain. Created a password + blockchain incubator to incubate applications for passwords and blockchains.

At the same time, Dingyi also received strong support from the Shenzhen Pingshan District Government. According to industry and commerce data, Shenzhen Pingshan District State-owned Assets Supervision and Administration Office holds 100% of Dingyi. Pingshan District has provided a full range of nanny-style support and protection from policies, funds, personnel, places and housing. At the same time, Pingshan has obvious advantages. Pingshan is planning to build a super high-tech park covering an area of ​​51.6 square kilometers according to the high standard of “world-class high-tech park”. It is a commercial password industry supported by the new generation of information technology industry. Expansion capacity. Li Dawei is very proud of his ability to participate in the construction of Pingshan District. He said: "I witnessed the development of Zhongguancun Industrial Park 30 years ago. I witnessed the rise of Nanshan High-tech Zone 15 years ago, and then I went to 15 before I retired. In the year, I will be fortunate to participate in the take-off of Pingshan High-tech Zone."

In Babbitt's view, although Li Da does not have an age advantage in starting a business, the starting point is high and the background is profound. The government supports it. This is the soft power that other entrepreneurs do not have. At the same time, the direction of password detection for entrepreneurial choice is an industry with insufficient market competition, and the first-mover advantage is obvious. But as to whether the project can have a place in the fierce blockchain market, we will wait and see.

Cryptography: the only way for blockchain to move from art to science

Password is the most effective, reliable and economical way to solve network security. It is the core technology and basic support for maintaining network security. According to the definition of "Ci Hai", a password is a symbol that is programmed according to a specific rule and used to perform a clear transformation of the information of both parties. The password has four basic attributes: 1, authenticity; 2, confidentiality, anti-leakage; 3, integrity, anti-tampering; 4, non-negative, non-repudiation.

In Li Dawei's view, the blockchain and password complement each other and promote each other.

First, the blockchain is password-dependent. For example, the hash algorithm used for block generation, such as the digital certificate and signature verification algorithm required for node authentication. Therefore, the blockchain platform requires a password to support it.

At the same time, passwords also require blockchains to facilitate their development. The cryptographic industry has missed several opportunities for rapid development. For example, in the Internet era, privacy protection for users can promote the cryptographic industry to develop faster, but it is counterproductive. This is also an objective factor that users do not realize the importance of privacy protection. Larger relationship. Until the advent of the mobile Internet era, there was no better improvement. The rise of blockchains, naturally combined with passwords, has also contributed to the rapid development of the cryptographic industry.

Ding Wei Li Dawei

Passwords have been widely used in blockchains. As shown in the figure above, hash functions, digital signatures, symmetric encryption, digital certificates, SSL transmission encryption, and consensus mechanisms have been well established. Blind signature, zero-knowledge proof, ring signature, homomorphic encryption, post-quantum cryptography, etc. are still in the exploration stage in the cryptography community.

Blockchain is the largest password application for the crypto industry in the next few years.

Since cryptography is the only way for blockchain to move from art to science, how does Ding Yi, who is known for cryptography, take this path?

As mentioned above, Ding Hao led the development of the poly-chain platform and appeared in the government work report of Pingshan District in 2019.

Ding Yi - Li Dawei 2

It is understood that the Julong Chain Platform is a blockchain password innovation alliance established by Dingsheng Company in November 2017. It uses the Java language to independently develop the underlying technology platform of the blockchain.

Talking about the original intention of research and development, Li Dawei told Babbitt:

First of all, the blockchain technology is not mature in 2017, which makes application difficult. Many domestic enterprises use super-books and Ethereum to build blockchain applications, which hinder applications from security issues, password usage, functional completeness, stability and performance. Secondly, the blockchain is the largest password application in the crypto industry in the next few years. The secret enterprises need to contribute their own strength in the blockchain vents, gather the power of production, research and research, resource sharing and independent innovation. Finally, localization It is the most important direction during the 13th Five-Year Plan period in China's scientific and technological circles. Finance, government affairs, and energy are the top priorities of localization applications. The key areas of blockchains need to be supported by domestic blockchain platforms.

Ding Yi Li Dawei 3

Different from other blockchain platforms, the cluster chain adopts the national secret cryptosystem, including the algorithm implementation of SM2, SM3, and SM4. The communication between the nodes of the cluster chain requires signature and check to ensure the integrity and resistance of the message. For the repudiation, the SM2 algorithm is used. The hash value of the computed block uses the SM3 algorithm. Data encryption and decryption uses SM4. In addition, it also used the national secret digital certificate, and completed integration with Shenzhen CA, Beijing CA, CFCA, and used the national secret CA to issue digital certificates to support the cluster identity authentication and access control.

In order to protect the security of the password, in terms of hardware, the cluster has two different devices: PCI-E encryption card server and GMT0018 server password machine. Soft algorithms are generally considered to be more vulnerable than hardware, and it is difficult to effectively combat brute force attacks. In addition, the soft algorithm does not require a key save, and once the user's private key is compromised, the consequences are serious. The hardware device has strict regulations on key management. This is also considered by the cluster-integrated PCI-E encryption card server and the GMT0018 server password machine.

Looking into the future, Li Dawei said that the blockchain is shifting from the esteem of capital to a rational development, which is actually a crucial period from high-speed development to healthy development. The future of the blockchain will inevitably be in the alliance chain , so that the regulatory chain with identity authentication and authority control will inevitably shine. In the theoretical world, it has also spawned a lot of research power of "blockchain", more efficient consensus mechanism, privacy protection mechanism based on zero-knowledge proof, homomorphic encryption, group signature algorithm and so on in blockchain. These visible directions will inevitably lead to more results. In terms of application, the blockchain will inevitably be combined with more cutting-edge technologies, such as artificial intelligence, Internet of Things, 5G, etc., and will be combined with more industry solutions.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

The user information of the currency circle has been leaked on a large scale, and the fire currency and the currency security have issued risk warnings one after another.

On August 6th, a large number of users of the currency said that they received a call from a customer service company...

Market

Wu's Weekly Picks CoinEX attacked, FTX's coin selling rules, Binance US layoffs, and Top 10 news (September 9-15)

Author | Wu's Top 10 Blockchain News This Week. US August Unadjusted CPI Annual Rate 3.7% Core...

Blockchain

SBF trial imminent, let's see what legal experts have to say

Source Coindesk Translator LianGuaiBitpushNews Mary Liu FTX founder and former CEO Sam Bankman-Fried (SBF) will be in...

Policy

FTX Customers Buckle Up! $9B Shortfall Claim Payout Expected to Roll Out by Mid-2024

Good news for fashion lovers! FTX has reached a settlement with their debtors and creditors, potentially returning $9...

Blockchain

A number of exchanges will openly call the FATF proposal at the G20 opening meeting

The G20 summit of the G20, which everyone is paying attention to, will be held on June 28 and 29, 2019 in Osaka, Japa...

Market

Old-timers Leaving the Crypto Circle Some Get Married and Have Children, Some Start New Businesses

In the world of encryption, people come and go. Have you ever wondered where the people who have left the cryptocurre...