Keywords: Cryptography Turing Cyberspace Security Information Security
From the early days as a practical technology to today as a rigorous discipline, the history of cryptography has gathered the wisdom of human civilization. Focusing on the two essential issues of how to use passwords to achieve security and privacy protection and how to use passwords safely, the design and analysis of passwords are interdependent and mutually reinforcing, which makes the research on passwords develop continuously.
In the process of development, alan turing, the father of computer science, made many essential contributions, which had a far-reaching impact on the maturity of cryptography. Firstly, Turing's computability theory and its invented (universal) Turing machine played an important role in the modeling of cryptographic security definition. For example, we know that in modern cryptography, designers first need to prove that their proposed cryptographic algorithm or protocol can resist all known and unknown attacks. However, there are many cryptographic algorithms or protocols that can't prove their security, but they can't find security holes. In this case, the designer can't find the correct proof method? Or is this cryptographic algorithm or protocol itself unprovable? Turing's provability theory gives the answers to these questions, that is, many cryptographic algorithms or protocols that we can't prove or falsify are not because the designers lack correct proof methods, but because the cryptographic algorithms or protocols themselves can't be proved in limited steps. This requires designers to constantly modify their own cryptographic algorithms or protocols so that they can be proved. In addition, the (universal) Turing machine invented by Turing is also widely used to model the adversary in cryptographic algorithms or protocol adversary models, thus transforming the operational time constraint on the adversary into the computational step constraint on the algorithm. At present, the universal composability widely accepted in cryptography is to simulate the opponent with polynomial time universal Turing machine.
In this issue, experts and scholars in related fields are invited to deeply discuss Turing's far-reaching influence on the development of cryptography and the frontier progress of cryptography. * * * Arranged six articles, covering two components of cryptography, namely, password design and password analysis, taking both breadth and depth into consideration.
The first article is "Universal Turing Machine and Its Influence on Modern Cryptographic Security Modeling", written by Zhang Bingsheng, an assistant professor at Lancaster University in the UK, and Qin Zhan, a researcher at Zhejiang University. Based on the calculation theory of (universal) Turing machine, this paper analyzes the profound influence of (universal) Turing machine on the security definition of basic cryptographic algorithm tools and the security modeling of cryptographic protocols in a simple way. The author introduces how the encryption algorithm in cryptography has gradually evolved from AES era to the definition of provable security and the role of Turing machine in it. In addition, through decades of research and discussion, the author combs how cryptographic protocols such as security modeling and secure multi-party computing definition have evolved into today's universal composable security model, and focuses on the basic role of interactive Turing machine in the whole framework of universal composable security model.
The second article is "From Turing's Cracking Enigma to Modern Cryptanalysis" written by Professor Wang Meiqin of Shandong University. It introduces the working principle of Enigma ciphertext and Turing's cracking of Engima ciphertext, and analyzes the influence of cracking Enigma ciphertext on modern cryptanalysis. The author also illustrates the importance of modern cryptanalysis to the design of secure cryptographic algorithms by taking cracking hash function as an example.
The third article is "Review and Progress of Cryptographic Hash Function" written by Lei Hu, a researcher at Institute of Information Engineering, Chinese Academy of Sciences, and Song Ling, an associate researcher. It introduces a key cryptographic function-cryptographic hash function (also known as hash function, hash function, etc. ) is used to achieve integrity and authentication in cryptography research. This paper expounds the nature and specific application of cryptographic hash function, combs the development of cryptographic hash function, summarizes the influence of cryptographic analysis on the standardization of cryptographic hash function, and introduces NIST hash function standard SHA-3 and its latest analysis progress.
The fourth article is "The Theory and Practice of Secure Multi-party Computing" co-authored by Wang Cong, an associate professor at City University of Hong Kong, and Wang Qian, a professor at Wuhan University. In this paper, the secure multi-party computing is deeply analyzed from the perspectives of theory and practice. Starting with vivid practical problems, the author introduces the system model, security model and theoretical general solution of secure multi-party computing. At the same time, the paper also combs the frontier progress of secure multi-party computing in practical application, summarizes the current situation of secure multi-party computing application, and points out the future research direction of secure multi-party computing.
The fifth article is "Research Progress of Anti-Backdoor in New Generation Cryptography" written by Tang Qiang, Assistant Professor of New Jersey Institute of Technology, and Moti Rong, Professor of Columbia University. It systematically summarizes the general backdoor attacks in cryptography and introduces the frontier progress of anti-backdoor stealing. At first, the author expounds the scientific principle behind the backdoor of cryptography, and answers how to consider this possible backdoor attack at the beginning of design. Then, the author introduces how to bridge the gap between the theoretical design and practical implementation of cryptography by Cliptography, and puts forward new suggestions on the theoretical basis and cryptographic standards of the new generation of cryptography.
The sixth article is Artificial Intelligence in Bypass Analysis, written by Zhang Fan, an associate professor at Zhejiang University, and Gu Dawu, a professor at Shanghai Jiaotong University. This paper introduces the research status of artificial intelligence technology in the field of password bypass analysis, combs the development course of machine learning algorithm in the field of password bypass analysis, analyzes the reasons for the achievements of artificial intelligence technology in the field of password bypass analysis, and points out the research direction of combining artificial intelligence technology with bypass analysis.
I hope this topic can inspire more scholars and security practitioners to participate in the research of cyberspace security and information security, design and analyze new cryptographic algorithms and protocols, and open up new research directions and fields.
Brief introduction of the author
Renkui
CCF professional member. Director of Cyberspace Security Research Center of Zhejiang University, distinguished professor of National Thousand Talents Program. The main research directions are data security, cloud security, artificial intelligence security and Internet of Things security. kuiren@zju.edu.cn
CCF suggestion
Boutique article
Click "Read the original" to enter the relevant column of CCF digital map.