More and more significant award breakthroughs emerged the in key technologies of quantum computers in the last three years. The quantum circuit successful implement the von Neumann architecture and quantum Fourier transform in the UC Santa Barbara, and famous RSA Cryptography can be attacked easily。We should pay attention to the impact of the Quantum Computing Algorithm on Cryptography. But Current quantum computing attacks only for a class of public key cryptography,and the ability of Quantum Computing attack is limited to the constraints of quantum devices such as quantum bit(Qubit); and Quantum Computing Algorithm was not considered for the cryptography design...The Canada Quantum Computer with 128Qubit chips announcing the world's first commercial quantum computer come out and be applied in Lockheed Martin weapons design, and Google Image Search。Which Lead us to concerns to the Superior capabilities of the exhaustive search and optimization capabilities of quantum computing, which can be introduced as the Optimization of the Evolutionary Cryptography invented by chinese scholar,On this basis, then refining the formation of the new theory of Quantum Evolutionary Cryptography, one purpose is to develop a new side channel attacks method combined with Grover algorithm for EC Cryptography,and Expand quantum computing algorithm to have the ability to effectively attack the typical public key cryptography。Another purpose is that introduce the quantum evolution algorithm to construct a Boolean function , and then verify the feasibility of quantum computing can be serve as a new method for cryptography design...In this project,new theory of Quantum Evolutionary Cryptography was developed based on the existing quantum computing features. and will be helpful to expand the existing quantum computing cryptanalysis design capabilities. Quantum Evolutionary Cryptography will combined with and enrich the modern cryptography methods, and There is hope to overcome the above shortcomings of quantum computing, include the expansion of the scope of the quantum computing, attack, reduction of the quantum device requirements, and serve as a new method for cryptography design;and then Explore the Boolean functions designing with the nature of the algebraic immunity and non-linearity Cryptography property balanced, and will be helpful to assess the quantum calculation of the impact on existing public-key cryptosystem.
近三年量子计算机关键技术屡获突破,加州圣芭芭拉分校成功实现冯诺依曼结构和量子傅立叶变换的量子电路,使得破译RSA等公钥密码走向现实,需重视量子计算对密码学的影响。当前量子计算有效攻击仅针对一类公钥密码,攻击能力受到量子位等器件制约;且未考虑用于密码设计。.加拿大128量子位商用量子计算机成功用于洛克马丁武器设计和谷歌图像搜索,引发对量子计算穷尽搜索和优化能力的关注,藉此优化中国学者提出的演化密码理论,形成量子演化密码理论。并通过 Grover算法结合侧信道攻击,验证量子计算对公钥密码攻击普适性;引入量子演化算法构造布尔函数,验证量子计算密码设计的可行性。.量子演化密码的研究,立足现有量子计算特点,结合并丰富现代密码方法,解决量子计算上述三个问题:拓展攻击范围,降低器件要求,尝试量子密码设计。探索代数免疫和非线性度等多密码性质均衡等难题解决。为评估量子计算对现有公钥密码系统的影响提供支持。
在国际上首次探索了量子计算机用于密码设计的可行性;探索了Shor算法之外的量子计算用于密码攻击的可行性;提出了具有创新意义的计算方法,主要成果有:. 1)提出量子蚁群算法用于密码设计,进而拓展到探索商业化的加拿大512量子位商用量子计算机用于多安全指标8元布尔函数密码设计的可行性,巧妙发挥量子退火算法的物理特性,有效地解决同时抗代数攻击和非线性攻击的计算困难问题,部分实验成果超过IEEE Trans. On IT 2014年的进展。. 2)探索了加拿大商用量子计算机可以用于抗侧信道攻击等密码部件设计的可行性。在抗ECC差分功耗攻击的门级防御系统WDDL中,量子退火算法进一步扩大差分功耗曲线的尖峰值范围,优化WDDL的附加单元结构,节提高系统的抗攻击能力。. 3)在拓展量子计算的密码攻击能力方面,考虑到Grover量子算法对于无序数据库中特定目标的搜索有平方加速作用,将Grover算法与故障攻击相结合,加速密钥位的搜索。并针对Grover算法存在搜索失败的问题,采用基于两次相位翻转零失败率Grover算法的对ECC电压毛刺攻击算法进行优化,攻击的计算复杂度大大降低。. 4)进而借助于隐马尔科夫模型思想,提出了一种针对椭圆曲线数字签名体系的一种计时攻击方法。并对美国国家标准与技术研究院公布的二进制域上的5条Koblitz安全曲线进行了攻击仿真实验,成功地攻击了除K-571以外的其它4条Koblitz安全曲线。. 在本次基金研究之前,量子计算用于密码学领域只有Shor算法破译公钥密码。量子演化密码的研究,旨在探索量子计算应用与密码学的三个问题:拓展攻击范围,降低器件要求,尝试量子密码设计。得到项目支持发表的期刊论文14篇,会议论文1篇;申请发明专利5项,其中授权1项。. 项目执行期间,王潮于2015年获得中国电子学会第二届全国优秀科技工作者称号。.
{{i.achievement_title}}
数据更新时间:2023-05-31
演化经济地理学视角下的产业结构演替与分叉研究评述
1例脊肌萎缩症伴脊柱侧凸患儿后路脊柱矫形术的麻醉护理配合
拥堵路网交通流均衡分配模型
低轨卫星通信信道分配策略
青藏高原狮泉河-拉果错-永珠-嘉黎蛇绿混杂岩带时空结构与构造演化
量子密码基本协议理论研究
多方多级量子密码协议理论研究
量子网络与量子公钥密码理论研究
与设备无关量子密码的理论研究