Chapter 32: Quantum-Resistant Cryptography

Seeing that none of them spoke, Yan An was afraid that they would misunderstand and hurriedly added, "I mean I can handle the quantum-resistant code." ”

"How long will it take?" Yuan Zhongguo subconsciously picked up the conversation and asked.

Yan An tilted his head slightly and thought about it seriously, anti-quantum cryptography refers to all mathematical cryptography that can resist the attack of quantum computers, which belongs to a general concept.

In general, quantum-resistant cryptography can be divided into four categories, namely C-based coding-based C-type algorithms, M-based multivariable polynomial encryption-based algorithms, S-based S-based algorithms based on secure hash functions, and lattice-based encryption L-class algorithms.

Although he has not seen how many quantum-resistant ciphers there are in the BT database, he can be sure that the encryption algorithms that can be classified into these four categories must be the most.

After all, cryptography is ultimately an application of mathematics, and in this regard, mathematics, as the language of God, is common to all civilizations.

Yan An does not plan to learn quantum-resistant codes outside of these four categories, which means that he will only be the only one in the whole process from scratch from concept to design to refinement.

It would be easier if he was willing to wait for a while, until the new concept was accepted and used by everyone before coming up with a complete set of algorithms, but the problem was that he was not willing to wait.

Rather than taking the time or effort to adopt quantum-resistant cryptography outside of the four categories, it is better to choose between these four categories.

However, the differences between the four types of algorithms are here, and the length of time required to learn them is also different, and he cannot give an accurate time.

"Probably, not for long. Maybe half a month? Yan An said uncertainly.

There are two main reasons why these four types of algorithms can be named quantum-resistant cryptography:

First, the mathematically difficult problems they rely on have nothing to do with the kind of difficult problems that the first generation of public-key cryptography algorithms relied on and were solved by the Shor algorithm. In other words, Shor's algorithm doesn't work for any of them.

Second, there is little correlation between the mathematically difficult problems on which they depend. Eggs are not put in one basket, i.e. there is no such risk.

In the future, if one of the difficult problems can be solved, then the "Nine Families", just like the first generation of public key cryptography, the RSA algorithm, the ECC algorithm, and the DH algorithm have all been solved by the Shor cracking algorithm.

In other words, what he wants to learn is not necessarily an algorithm that is more complex than the RSA encryption algorithm in terms of encryption principles, and even its principles may be simpler.

Because the reason why it remains uncracked is not because of how complex the problem is, but because it can neither be cracked by existing ordinary computers nor by the shor algorithm.

Even if this algorithm is first proposed and a new set of quantum algorithms is invented the next day, it doesn't matter, at least on the day it is proposed, it is a quantum-resistant code.

"However, the quantum-resistant cipher has been hyped for so long, and I haven't seen anyone come up with it, are you sure that you can solve it in half a month?" Yuan Zhongguo looked at Yan An suspiciously, not very confident in his self-confidence.

Although the Ordnance Group does not engage in cryptography research, he has long heard of this concept, and every year at the meeting, someone comes to the stage with a PPT to draw a big pie for them, hoping that they can smash out a heavy research fund with a big wave of their hands.

His distrust is justified.

These cryptographic algorithms were invented on the planet at different times, such as the coding-based C-type algorithm, which can be traced back to the 70s of the last century, when the first generation of public key cryptography was invented.

It's just that the encryption performance of the C-type algorithm at that time was much slower than that of the first-generation public-key cryptography algorithm, because it did not attract much attention.

The M-class algorithm based on multivariate polynomial encryption was born in the mid-80s of the last century, and has undergone many transformations since then.

The most typical example of S-type algorithms based on secure hash functions is SHA-3, which was born relatively late, and did not become a national standard until 2015.

As for the lattice encryption L-class algorithm, it is the most concerned type of algorithm at present, which was first produced in 1994 and was born at the same time as the shor algorithm that cracked the first generation of public key cryptography. With the development of time, the L-class algorithm has branched out and derived many branches, including the now popular fully homomorphic encryption algorithm, the basic principle of which also belongs to the L-class algorithm.

These algorithms have advanced over the years, but so far they have not yet reached the point where they can be commercially outlawed with RSA encryption. The reason why it has not been developed is that there are various drawbacks compared to the first generation of public-key cryptography algorithms, such as their general inefficiency, or the large size of the key, or the slow decryption speed.

Although the RSA encryption algorithm has similar shortcomings, on the basis of ensuring the security of the RSA system, the improved and optimized SMM algorithm based on the characteristics of multiplication congruence symmetry, the 2K base method, and the sliding window idemation method can be used to improve the efficiency of the algorithm.

It has irreplaceable advantages over unoptimized and fragmented quantum-resistant cryptography.

If the existing quantum-resistant encryption algorithms are put into today's Internet, it will bring a huge reduction in operational efficiency. Even if you have the fastest broadband at home, you still have to wait hours to verify that an official software is trustworthy before deciding whether you need to download the latest patch.

If even the verification has to wait for so long, it will obviously not be accepted by users, and operators would rather risk being cracked and attacked, rather than let the Internet go back to 20 years.

In addition, all four types of ciphers have a common flaw - none of them can "encrypt, sign, and authenticate in one", which is precisely one of the great advantages of the previous generation of public-key cryptography algorithms.

Only by solving these problems can Yan An come up with a set of encryption algorithms that can be applied and implemented, as for how to make full-time software and hardware developers follow the same standard system, that is another matter.

For half a month, Yuan Zhongguo really couldn't figure out where his confidence was.

"Do you already have an idea? What kind of algorithm should be improved? I'll find a professional to help you right away. "The Han military and civilians reacted the fastest.

The balance of victory has already fallen in his favor, and today Yan An must go back with him to make an anti-quantum code, not to mention Yuan Zhongguo, even if Jesus comes, he can't stop it.

"I haven't thought about it yet, but it shouldn't take long."

Yan An didn't even have any ideas and could be so confident, which made Yuan Zhongguo extremely surprised, "You dare to say that it only took half a month to get it done without an idea?" Can you tell us why? ”

"I'm not like you, I'm a little smarter, so it's easier for me."

He gestured with his hand, making a gesture of pinching something.

Three: "......"

Co-authoring is to turn around and say that we are not smart.

And that gesture, is that a little bit? If you zoom in, you'll definitely find a universe!

Knowing that they definitely didn't understand this, Yan An also came up with a stronger case to prove it, "It only took me twelve days to get the neural network deep restoration reading technology." And the previous ......"

He was about to continue, but was stopped by the eyes of the Han military and civilians, not to mention that the factorization algorithm could not let Yuan Zhongguo know, and without permission, even the RSA effective search algorithm could not reveal half a word.

"Then after the development of the anti-quantum cipher is completed...... it is obviously not Yuan Zhongguo's style to give up like this, and tentatively mentioned Yan An's plan after that, if Han Junmin does not plan to continue to squeeze, he will have to start.

"Of course, there are other jobs after that, and there is no leisure time to play." Han Junmin replied unceremoniously, saying that going to him to promote brainwave reading technology was an idle matter, leaving no chance.

But I couldn't bear Yan An's own thoughts, this incident had made him realize that it was unreliable to simply make research contributions, and only by taking the right to speak into his own hands could he pretend to fake a cough, and said cheekily, "Ahem, why can't you change your thinking." Isn't it good for the three of us to work together? We all have common needs, so we don't have to worry about you and me. ”

Gao Shenghan: "......"

I don't know why, he feels like he's heard the classic lines of a certain TV series.

"I want to set up a group with me as the core, and I can directly carry out scientific research projects in any field."

It would not be a problem to lead a large research project directly according to his contributions, but the prominent area he has shown so far is algorithms.

Algorithm research is a bit special, this thing is not infrastructure, the more people in the project team the better, on the contrary, there are usually not many people in the algorithm research project, this is like mathematical research, not the more people you spend on it, the more time you spend on it, the more results can be achieved.

In Yan An's case, because he was really "going too fast" and ahead of everyone, it seemed that the project team was of little help to him, which was dispensable.

"You mean - both projects? A two-pronged approach? Yuan Zhongguo was the first to understand what he meant, and then found that this young man's appetite was a bit big.

"It's not just these two projects, I can't always work on encryption and decryption or artificial intelligence algorithms, and in the future, I will inevitably involve different research projects like this one.

I don't want to be 'under the fence' next time like today, and my project team, or I, have to be at the heart of the project. ”

"Then the researchers you bring now, I asked Director Zhu to release them, and they will follow you in the future? The rest of the personnel will be slowly replenished later. ”

Han Junmin quickly accepted Yan An's request, although this kind of request was troublesome, but it was normal and reasonable for Yan An, who had real materials and had already shown strong muscles, and he could completely follow the special arrangements to give Yan An corresponding convenience.

Yan An also did not give feedback on the steps he proposed to expand based on the existing project team members.

"That's a multi-party cooperation...... How about I draw some researchers from the 202 Institute and let them follow you in the future? In addition, an additional scientific research fund was sponsored by the project team. ”

Yuan Zhongguo hasn't done this kind of work for a long time, but there is no way, who will make him greedy.