ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (10): 2112-2134.doi: 10.7544/issn1000-1239.2019.20190374

Special Issue: 2019密码学与智能安全研究专题

Previous Articles     Next Articles

From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography

Wang Baonan1,2, Hu Feng1,2, Zhang Huanguo4, Wang Chao1,2,3   

  1. 1(Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444);2(State Key Laboratory of Cryptology, Beijing 100878);3(Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen Guangdong 518000);4(School of Cyber Science and Engineering,Wuhan University, Wuhan 430079)
  • Online:2019-10-16

Abstract: How to use artificial intelligence to design high-intensity cryptography and make crypto-graphy design automation is a long-term goal. Chinese scholars combine cryptography with evolutionary computing, independently put forward the concept of evolutionary cryptography and evolutionary computing method for cryptography design based on the idea of biological evolution, to obtain variable gradual cryptography that reduces the magnitude of search space required for attacks. Research shows that evolutionary cryptography has achieved practical results in symmetric cryptography, asymmetric cryptography, side channel attacks, and post-quantum cryptography: more than one hundred good S-boxes (8×8) can be designed in one minute, and some of the cryptography indexes reach the best value. For typical post-quantum cryptography NTRU, evolutionary cryptography attacks are expected to reduce the key search space by 2~3 orders of magnitude. ECC security curve produces a base range that exceeds the curve published by NIST, and new curves have been found in the range of curve published by NIST. Evolution cryptography has some characteristics of artificial intelligence cryptography. Further combining with quantum artificial intelligence, it has not only obtained the best index of quantum computing for deciphering RSA, but also exceeded the theoretical maximum of IBM Q System OneTM with Shor’s algorithm and the maximum scale of Lockheed Martin with quantum annealing to decipher RSA. In addition, the original research on the cryptography design was proposed, and the original research on the cryptography design based on D-Wave 2000Q systems was completed, which is expected to quickly produce a series of suboptimal solutions, achieve the function of one-time one encryption algorithm, enhance the security of cryptography system.

Key words: evolutionary computing, evolutionary cryptography, quantum computing, cryptography, quantum artificial intelligent cryptography

CLC Number: