ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2019, Vol. 56 ›› Issue (10): 2112-2134.doi: 10.7544/issn1000-1239.2019.20190374

所属专题: 2019密码学与智能安全研究专题

• 综述 • 上一篇    下一篇

从演化密码到量子人工智能密码综述

王宝楠1,2,胡风1,2,张焕国4,王潮1,2,3   

  1. 1(特种光纤与光接入网重点实验室,特种光纤与先进通信国际合作联合实验室,上海先进通信与数据科学研究院,上海大学 上海 200444);2(密码科学技术国家重点实验室 北京 100878);3(鹏城实验室量子计算中心 广东深圳 518000);4(武汉大学国家网络安全学院 武汉 430079) (wbn_shu0099@163.com)
  • 出版日期: 2019-10-16
  • 基金资助: 
    国家自然科学基金项目(61572304,61272096);国家自然科学基金重点项目(61332019);密码科学技术国家重点实验室开放课题

From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography

Wang Baonan1,2, Hu Feng1,2, Zhang Huanguo4, Wang Chao1,2,3   

  1. 1(Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444);2(State Key Laboratory of Cryptology, Beijing 100878);3(Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen Guangdong 518000);4(School of Cyber Science and Engineering,Wuhan University, Wuhan 430079)
  • Online: 2019-10-16

摘要: 如何采用人工智能设计出高强度密码和使密码设计自动化是人们长期追求的目标.中国学者将密码学与演化计算结合,借鉴生物进化的思想独立提出演化密码的概念和用演化计算设计密码的方法,得到可变渐强的密码,减少攻击所需搜索空间的量级.国内外研究表明:演化密码已经在对称密码、非对称密码领域、侧信道攻击以及后量子密码等领域均取得了实际成果:可在1min内设计出一百多个好S盒(8×8),其中一些密码学指标达到最佳值;对于典型的后量子密码NTRU密码体制,演化密码攻击有望降低密钥搜索空间2~3个数量级;部分ECC安全曲线产生基域范围超过NIST现已公布的曲线;并在NIST现已公布的曲线范围内又发现了新的曲线.演化密码已具备人工智能密码的一些特征,进一步结合量子人工智能,不仅取得了目前国际上量子计算破译RSA最好实验指标,超过了最新IBM Q系统,如果运行Shor算法的理论最大值,也超过了洛克希德马丁公司采用量子退火破译RSA的最大规模;提出了量子计算机设计密码的原创性理论成果,完成了国际上首次D-Wave 2000Q真实量子计算机密码设计,有望快速产生一系列亚优解,达到一次一密码算法的作用,增强密码系统安全性.

关键词: 演化计算, 演化密码, 量子计算, 密码, 量子人工智能密码

Abstract: How to use artificial intelligence to design high-intensity cryptography and make crypto-graphy design automation is a long-term goal. Chinese scholars combine cryptography with evolutionary computing, independently put forward the concept of evolutionary cryptography and evolutionary computing method for cryptography design based on the idea of biological evolution, to obtain variable gradual cryptography that reduces the magnitude of search space required for attacks. Research shows that evolutionary cryptography has achieved practical results in symmetric cryptography, asymmetric cryptography, side channel attacks, and post-quantum cryptography: more than one hundred good S-boxes (8×8) can be designed in one minute, and some of the cryptography indexes reach the best value. For typical post-quantum cryptography NTRU, evolutionary cryptography attacks are expected to reduce the key search space by 2~3 orders of magnitude. ECC security curve produces a base range that exceeds the curve published by NIST, and new curves have been found in the range of curve published by NIST. Evolution cryptography has some characteristics of artificial intelligence cryptography. Further combining with quantum artificial intelligence, it has not only obtained the best index of quantum computing for deciphering RSA, but also exceeded the theoretical maximum of IBM Q System OneTM with Shor’s algorithm and the maximum scale of Lockheed Martin with quantum annealing to decipher RSA. In addition, the original research on the cryptography design was proposed, and the original research on the cryptography design based on D-Wave 2000Q systems was completed, which is expected to quickly produce a series of suboptimal solutions, achieve the function of one-time one encryption algorithm, enhance the security of cryptography system.

Key words: evolutionary computing, evolutionary cryptography, quantum computing, cryptography, quantum artificial intelligent cryptography

中图分类号: