搜索文章:
期刊:
主题:
论著 · Article

量子计算对现有加密体系的颠覆性挑战

The disruptive challenge of quantum computing to existing encryption systems


作者:陈数维,吴简*
成都理工大学数理学院  四川 成都
*通信作者:吴简,单位:成都理工大学数理学院 四川 成都
数字经济与管理, 2023, 1(1), 0-0;
提交日期 : 2023年03月20日 丨 录用日期 : 2023年05月12日 丨 出版日期 : 2023年06月07日
课题资助:自筹经费,无利益冲突需要说明
引用本文
摘 要:
随着量子计算的快速发展,其对现有加密体系构成了严峻的挑战。传统的加密技术,如RSA和ECC,依赖于大数分解和椭圆曲线离散对数问题的计算困难性。然而,量子计算机通过Shor算法能在多项式时间内解决这些问题,从而威胁到这些加密系统的安全性。本研究首先回顾了量子计算的基本原理及其在加密领域的潜在应用。接着,通过模拟量子攻击,评估了量子计算对现有加密算法的破坏力。结果显示,量子计算机能够在极短的时间内破解多种标准加密技术。据此,本文进一步探讨了量子安全加密(如量子密钥分发)及其实现机制,为实现抗量子加密提供了理论基础和实际方案。研究表明,推动量子抗性加密技术的发展是应对量子计算挑战的关键。研究意义:本研究不仅揭示了量子计算对现有加密体系的颠覆性挑战,也为未来加密技术的改进和发展提供了方向。这对保护信息安全、促进安全通信具有重要的理论和实践意义。
关键词:量子计算;加密体系;Shor算法;量子安全加密
 
Abstract: 
With the rapid development of quantum computing, it poses a severe challenge to the existing encryption systems. Traditional encryption techniques, such as RSA and ECC, rely on the computational difficulty of large number factorization and elliptic curve discrete logarithm problems. However, quantum computers can solve these problems in polynomial time through the Shor algorithm, thereby threatening the security of these encryption systems. This study first reviews the basic principles of quantum computing and its potential applications in the field of encryption. Then, by simulating quantum attacks, the destructive power of quantum computing on existing encryption algorithms was evaluated. The results show that quantum computers can crack multiple standard encryption techniques in an extremely short time. Based on this, this paper further explores quantum-secure encryption (such as quantum key distribution) and its implementation mechanism, providing a theoretical basis and practical solution for achieving quantum-resistant encryption. Research shows that promoting the development of quantum-resistant encryption technology is the key to addressing the challenges of quantum computing. Research significance: This study not only reveals the disruptive challenges that quantum computing poses to existing encryption systems, but also provides a direction for the improvement and development of future encryption technologies. This has important theoretical and practical significance for protecting information security and promoting secure communication.
Keywords: Quantum computing;Encryption system;Shor algorithm;Quantum secure encryption
 
--
正文内容 / Content:
可下载并阅读全文PDF,请按照本文版权许可使用。
Download the full text PDF for viewing and using it according to the license of this paper.

参考文献 / References: 
  1. Nayana DasGoutam Paul.提高“无加密测量设备独立量子通信”的安全性[J].科学通报:英文版,2020,65(24):2048-2049.
      
  2. 喻文韬.典型抗量子公钥加密算法实现[J].网络安全技术与应用,2022,(09):31-33.
  3. 闫玲.基于仿射变换的量子图像加密算法[J].信息工程大学学报,2020,21(06):752-761.
  4. 李丹,燕婷,郭瑞.基于交替量子漫步的量子彩色图像加密算法[J].信息网络安全,2021,(06):45-51.
  5. 刘安航,李浩昱,关佳,张志华,方恺,赫丽,沈军.基于量子计算原理的Shor算法优越性验证[J].物理实验,2022,42(04):7-12.
  6. 曹元,陆旭,吴彦泽,谢浩东,乔云凯,姚恩义,陈帅,叶靖.后量子加密算法的硬件实现综述[J].信息安全学报,2021,6(06):1-16.
  7. 徐胜峰李祥学.基于LPN困难问题的后量子安全公钥加密[J].西安邮电大学学报,2021,26(05):47-61.
  8. 李晓峰,焦洪双,王妍玮.基于量子计算的医疗敏感信息智能加密算法[J].吉林大学学报:信息科学版,2020,38(06):694-701.
  9. 王东,李春平,张淑荣.量子计算时代的安全加密算法研究[J].电脑与电信,2022,(04):85-88.
  10. 陈冰儿,王帮海,劳南新.基于DPoS扩展的量子加密区块链[J].广东工业大学学报,2021,38(02):34-38.
由此登陆,开启投稿之旅: