信息网络安全 ›› 2017, Vol. 17 ›› Issue (4): 53-60.doi: 10.3969/j.issn.1671-1122.2017.04.008

• • 上一篇    下一篇

一类抗量子计算的公钥密码算法研究

游伟青(), 陈小明, 齐健   

  1. 北京电子科技学院,北京 100070
  • 收稿日期:2017-03-01 出版日期:2017-04-20 发布日期:2020-05-12
  • 作者简介:

    作者简介: 游伟青(1994—),男,安徽,硕士研究生,主要研究方向为密码算法设计与分析、代数学;陈小明(1964—),男,湖南,教授,博士,主要研究方向为密码学与信息安全、理论计算机科学;齐健(1992—),男,安徽,硕士研究生,主要研究方向为信息安全与密码应用。

  • 基金资助:
    国家重点研发计划[SQ2016YFGX110124]

Research on a Kind of Anti-quantum Computing Public Key Cryptosystem

Weiqing YOU(), Xiaoming CHEN, Jian QI   

  1. Beijing Electronic Science & Technology Institute, Beijing 100070, China
  • Received:2017-03-01 Online:2017-04-20 Published:2020-05-12

摘要:

密码技术是保障信息安全的核心技术,密码体制的安全依赖于密钥,管理密钥是一大难题。利用密钥协商技术能够实现密钥分配的任务,保障用户安全建立共享密钥。目前应用的密钥协商技术安全性设计大都建立在有限域下离散对数问题上,该问题在量子计算机上已经有成熟的攻击方法,在量子计算机成功研制之前需要探索能够抵抗量子攻击的密钥交换技术。经典公钥密码系统的弱点随着量子技术的快速发展表现越来越突出。文章分析了RSA算法的安全性设计,介绍了一种经典的量子算法对经典公钥密码算法的攻击方法及其工作原理,总结了成熟的量子计算攻击特性,指出了寻找抵抗量子攻击的必要性及能够抵抗量子攻击的公钥密码实现平台要求。文章提出了一种强化的随机函数构造方法,给出了一种辫群上改进的密钥交换协议算法,并从设计安全性与实现效率两个方面对改进后的算法进行了相对全面的分析。

关键词: 量子计算, 量子攻击, 辫群, 密钥交换, Shor算法

Abstract:

Cryptography is the core technology of information security. Password system security depends on the key, and manage key is a big problem. The key agreement technology can be used to achieve the task of key distribution, and to ensure the safety of users to establish a shared key. At present, the security design of the key agreement technology is mostly based on the discrete logarithm problem in a finite field. The problem has a mature attack method on the quantum computer. Before the quantum computer is successfully developed, it needs to explore the key that can resist the quantum attack exchange technology. The weakness of the classical public key cryptosystem is becoming more and more prominent in the face of the rapid development of quantum technology. This paper analyzes the security of RSA algorithm, and introduces the method and principle of typical quantum algorithm to attack the classical public key cryptography algorithm. At the same time, this paper summarizes the characteristics of mature quantum computing attack, and points out the necessity of finding the resistance to quantum attack and the requirement of the public key cryptography to resist the quantum attack. This paper proposes a more random and an improved key exchange protocol algorithm. At last, this paper analyses the advantages of the algorithm from design security and implementation efficiency.

Key words: quantum computation, quantum attack, graid group, key exchange, Shor algorithm

中图分类号: