• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao. From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography[J]. Journal of Computer Research and Development, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
Citation: Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao. From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography[J]. Journal of Computer Research and Development, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374

From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography

More Information
  • Published Date: September 30, 2019
  • How to use artificial intelligence to design high-intensity cryptography and make crypto-graphy design automation is a long-term goal. Chinese scholars combine cryptography with evolutionary computing, independently put forward the concept of evolutionary cryptography and evolutionary computing method for cryptography design based on the idea of biological evolution, to obtain variable gradual cryptography that reduces the magnitude of search space required for attacks. Research shows that evolutionary cryptography has achieved practical results in symmetric cryptography, asymmetric cryptography, side channel attacks, and post-quantum cryptography: more than one hundred good S-boxes (8×8) can be designed in one minute, and some of the cryptography indexes reach the best value. For typical post-quantum cryptography NTRU, evolutionary cryptography attacks are expected to reduce the key search space by 2~3 orders of magnitude. ECC security curve produces a base range that exceeds the curve published by NIST, and new curves have been found in the range of curve published by NIST. Evolution cryptography has some characteristics of artificial intelligence cryptography. Further combining with quantum artificial intelligence, it has not only obtained the best index of quantum computing for deciphering RSA, but also exceeded the theoretical maximum of IBM Q System OneTM with Shor’s algorithm and the maximum scale of Lockheed Martin with quantum annealing to decipher RSA. In addition, the original research on the cryptography design was proposed, and the original research on the cryptography design based on D-Wave 2000Q systems was completed, which is expected to quickly produce a series of suboptimal solutions, achieve the function of one-time one encryption algorithm, enhance the security of cryptography system.
  • Related Articles

    [1]Lu Shaoshuai, Chen Long, Lu Guangyue, Guan Ziyu, Xie Fei. Weakly-Supervised Contrastive Learning Framework for Few-Shot Sentiment Classification Tasks[J]. Journal of Computer Research and Development, 2022, 59(9): 2003-2014. DOI: 10.7544/issn1000-1239.20210699
    [2]Jia Xibin, Jin Ya, Chen Juncheng. Domain Alignment Based on Multi-Viewpoint Domain-Shared Feature for Cross-Domain Sentiment Classification[J]. Journal of Computer Research and Development, 2018, 55(11): 2439-2451. DOI: 10.7544/issn1000-1239.2018.20170496
    [3]Chen Long, Guan Ziyu, He Jinhong, Peng Jinye. A Survey on Sentiment Classification[J]. Journal of Computer Research and Development, 2017, 54(6): 1150-1170. DOI: 10.7544/issn1000-1239.2017.20160807
    [4]Zhang Zhifei, Miao Duoqian, Nie Jianyun, Yue Xiaodong. Sentiment Uncertainty Measure and Classification of Negative Sentences[J]. Journal of Computer Research and Development, 2015, 52(8): 1806-1816. DOI: 10.7544/issn1000-1239.2015.20150253
    [5]Zhao Chuanjun, Wang Suge, Li Deyu, Li Xin. Cross-Domain Text Sentiment Classification Based on Grouping-AdaBoost Ensemble[J]. Journal of Computer Research and Development, 2015, 52(3): 629-638. DOI: 10.7544/issn1000-1239.2015.20140156
    [6]Hou Yongshuai, Zhang Yaoyun, Wang Xiaolong, Chen Qingcai, Wang Yuliang, and Hu Baotian. Recognition and Retrieval of Time-sensitive Question in Chinese QA System[J]. Journal of Computer Research and Development, 2013, 50(12): 2612-2620.
    [7]Li Suke and Jiang Yanbing. Semi-Supervised Sentiment Classification Based on Sentiment Feature Clustering[J]. Journal of Computer Research and Development, 2013, 50(12): 2570-2577.
    [8]Wu Qiong, Liu Yue, Shen Huawei, Zhang Jin, Xu Hongbo, and Cheng Xueqi. A Unified Framework for Cross-Domain Sentiment Classification[J]. Journal of Computer Research and Development, 2013, 50(8): 1683-1689.
    [9]Lin Zheng, Tan Songbo, Cheng Xueqi. Sentiment Classification Analysis Based on Extraction of Sentiment Key Sentence[J]. Journal of Computer Research and Development, 2012, 49(11): 2376-2382.
    [10]Hu Yi, Lu Ruzhan, Li Xuening, Duan Jianyong, ChenYuquan. Research on Language Modeling Based Sentiment Classification of Text[J]. Journal of Computer Research and Development, 2007, 44(9): 1469-1475.
  • Cited by

    Periodical cited type(8)

    1. 杨小东,周航,任宁宁,袁森,王彩芬. 支持多密文等值测试的无线体域网聚合签密方案. 计算机研究与发展. 2023(02): 341-350 . 本站查看
    2. 杨蒙蒙,江昆,温拓朴,陈会仙,黄晋,张浩,黄健强,唐雪薇,杨殿阁. 自动驾驶高精度地图众源更新技术现状与挑战. 中国公路学报. 2023(05): 244-259 .
    3. 王妍,白洪亮,蒋方正,张英伟. 露天矿无人驾驶运输关键技术研究. 现代矿业. 2023(10): 178-181 .
    4. 丁晓晖,曹素珍,窦凤鸽,马佳佳,王彩芬. 基于无证书聚合签名的导航信息更新方案. 计算机技术与发展. 2022(06): 112-119 .
    5. 杜田,李欣,赖成喆,郑东. 面向无人驾驶地图更新的安全信任管理方案. 计算机工程. 2022(06): 154-166 .
    6. 李月华. 基于自动驾驶众包地图更新技术方法. 北京测绘. 2022(05): 629-635 .
    7. 陈虹,侯宇婷,郭鹏飞,周沫,赵菊芳,肖成龙. 可公开验证的高效无证书聚合签密方案. 计算机工程. 2022(10): 146-157 .
    8. 陶永才,李哲,石磊,卫琳,杨淑博. 一种可信的车联网区块链数据共享模型. 小型微型计算机系统. 2021(10): 2131-2139 .

    Other cited types(5)

Catalog

    Article views (1953) PDF downloads (1337) Cited by(13)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return