Netinfo Security ›› 2017, Vol. 17 ›› Issue (4): 53-60.doi: 10.3969/j.issn.1671-1122.2017.04.008

• Orginal Article • Previous Articles     Next Articles

Research on a Kind of Anti-quantum Computing Public Key Cryptosystem

Weiqing YOU(), Xiaoming CHEN, Jian QI   

  1. Beijing Electronic Science & Technology Institute, Beijing 100070, China
  • Received:2017-03-01 Online:2017-04-20 Published:2020-05-12

Abstract:

Cryptography is the core technology of information security. Password system security depends on the key, and manage key is a big problem. The key agreement technology can be used to achieve the task of key distribution, and to ensure the safety of users to establish a shared key. At present, the security design of the key agreement technology is mostly based on the discrete logarithm problem in a finite field. The problem has a mature attack method on the quantum computer. Before the quantum computer is successfully developed, it needs to explore the key that can resist the quantum attack exchange technology. The weakness of the classical public key cryptosystem is becoming more and more prominent in the face of the rapid development of quantum technology. This paper analyzes the security of RSA algorithm, and introduces the method and principle of typical quantum algorithm to attack the classical public key cryptography algorithm. At the same time, this paper summarizes the characteristics of mature quantum computing attack, and points out the necessity of finding the resistance to quantum attack and the requirement of the public key cryptography to resist the quantum attack. This paper proposes a more random and an improved key exchange protocol algorithm. At last, this paper analyses the advantages of the algorithm from design security and implementation efficiency.

Key words: quantum computation, quantum attack, graid group, key exchange, Shor algorithm

CLC Number: