高级检索
    王宝楠, 胡风, 张焕国, 王潮. 从演化密码到量子人工智能密码综述[J]. 计算机研究与发展, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
    引用本文: 王宝楠, 胡风, 张焕国, 王潮. 从演化密码到量子人工智能密码综述[J]. 计算机研究与发展, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
    Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao. From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography[J]. Journal of Computer Research and Development, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
    Citation: Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao. From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography[J]. Journal of Computer Research and Development, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374

    从演化密码到量子人工智能密码综述

    From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography

    • 摘要: 如何采用人工智能设计出高强度密码和使密码设计自动化是人们长期追求的目标.中国学者将密码学与演化计算结合,借鉴生物进化的思想独立提出演化密码的概念和用演化计算设计密码的方法,得到可变渐强的密码,减少攻击所需搜索空间的量级.国内外研究表明:演化密码已经在对称密码、非对称密码领域、侧信道攻击以及后量子密码等领域均取得了实际成果:可在1min内设计出一百多个好S盒(8×8),其中一些密码学指标达到最佳值;对于典型的后量子密码NTRU密码体制,演化密码攻击有望降低密钥搜索空间2~3个数量级;部分ECC安全曲线产生基域范围超过NIST现已公布的曲线;并在NIST现已公布的曲线范围内又发现了新的曲线.演化密码已具备人工智能密码的一些特征,进一步结合量子人工智能,不仅取得了目前国际上量子计算破译RSA最好实验指标,超过了最新IBM Q系统,如果运行Shor算法的理论最大值,也超过了洛克希德马丁公司采用量子退火破译RSA的最大规模;提出了量子计算机设计密码的原创性理论成果,完成了国际上首次D-Wave 2000Q真实量子计算机密码设计,有望快速产生一系列亚优解,达到一次一密码算法的作用,增强密码系统安全性.

       

      Abstract: How to use artificial intelligence to design high-intensity cryptography and make crypto-graphy design automation is a long-term goal. Chinese scholars combine cryptography with evolutionary computing, independently put forward the concept of evolutionary cryptography and evolutionary computing method for cryptography design based on the idea of biological evolution, to obtain variable gradual cryptography that reduces the magnitude of search space required for attacks. Research shows that evolutionary cryptography has achieved practical results in symmetric cryptography, asymmetric cryptography, side channel attacks, and post-quantum cryptography: more than one hundred good S-boxes (8×8) can be designed in one minute, and some of the cryptography indexes reach the best value. For typical post-quantum cryptography NTRU, evolutionary cryptography attacks are expected to reduce the key search space by 2~3 orders of magnitude. ECC security curve produces a base range that exceeds the curve published by NIST, and new curves have been found in the range of curve published by NIST. Evolution cryptography has some characteristics of artificial intelligence cryptography. Further combining with quantum artificial intelligence, it has not only obtained the best index of quantum computing for deciphering RSA, but also exceeded the theoretical maximum of IBM Q System OneTM with Shor’s algorithm and the maximum scale of Lockheed Martin with quantum annealing to decipher RSA. In addition, the original research on the cryptography design was proposed, and the original research on the cryptography design based on D-Wave 2000Q systems was completed, which is expected to quickly produce a series of suboptimal solutions, achieve the function of one-time one encryption algorithm, enhance the security of cryptography system.

       

    /

    返回文章
    返回