New Advanced Computing Architecture For Cryptography Design and Analysis by D-Wave Quantum Annealer
New Advanced Computing Architecture For Cryptography Design and Analysis by D-Wave Quantum Annealer
Xiangmin Ji, Baonan Wang , Feng Hu, Chao Wang, and Huanguo Zhang
Abstract: Universal quantum computers are far from achieving practical applications. The D-Wave quantum computer
is initially designed for combinatorial optimizations. Therefore, exploring the potential applications of the D-Wave
device in the field of cryptography is of great importance. First, although we optimize the general quantum Hamiltonian
on the basis of the structure of the multiplication table (factor up to 1 005 973), this study attempts to explore the
simplification of Hamiltonian derived from the binary structure of the integers to be factored. A simple factorization
on 143 with four qubits is provided to verify the potential of further advancing the integer-factoring ability of the
D-Wave device. Second, by using the quantum computing cryptography based on the D-Wave 2000Q system, this
research further constructs a simple version of quantum-classical computing architecture and a Quantum-Inspired
Simulated Annealing (QISA) framework. Good functions and a high-performance platform are introduced, and
additional balanced Boolean functions with high nonlinearity and optimal algebraic immunity can be found. Further
comparison between QISA and Quantum Annealing (QA) on six-variable bent functions not only shows the potential
speedup of QA, but also suggests the potential of architecture to be a scalable way of D-Wave annealer toward a
practical cryptography design.
Key words: Quantum Annealing (QA); factorization; Boolean functions; brain-inspired cognition
considered a unique and powerful quantum algorithm quantum algorithm for the cryptanalysis of RSA.
for the cryptanalysis of RSA. Thus, the threats of Therefore, the current state of post-quantum
Shor’s algorithm attract increasing attention as universal cryptography research exclusively refers to the
quantum computers develop. However, universal potential threats of Shor’s algorithm. However, the
quantum computers are not good enough for code physical implementations of Shor’s algorithm can
cracking[8] . Thus, further attention should be paid to only achieve up to factorization on 85[23] . In 2008,
the cryptographic applications of the special-purpose Adiabatic Quantum Computing (AQC) was first
quantum computer, D-Wave quantum annealer[9] . introduced to factor 21 in a three-qubit NMR quantum
The D-Wave device, collaborated with Lockheed processor[24] . Special properties of certain integers help
Martin Corporation and Google, has been initially used advance the developments of factorizations by AQC
for image processing, combinatorial optimization, and (quantum factorization on 56 153 with only four qubits,
software verification[4, 10] . The machine is built on the high-fidelity adiabatic quantum computation using the
basis of the adiabatic theorem[11–13] , different from the intrinsic Hamiltonian of a spin system, application to
gate-model universal ones. Quantum annealing (QA), the experimental factorization on 291 311). However,
as the core principle, can work for finding the ground the scalability of these methods cannot be guaranteed.
state of Hamiltonian characterized by the manufactured In 2018, Jiang et al.[21] proposed a generalized
spins[14] of the Ising models. Quadratic Unconstrained Binary Optimization (QUBO)
In principle, QA can utilize the quantum mechanics model to embed the multiplication table for prime
and quantum tunneling effects to find approximate number factorization into the D-Wave quantum
answers to certain important problems with exponential computer. Peng et al.[17] and Wang[18] advanced it by
levels in computer science. These problems can only introducing the extra limitations given by the object
be truly solved by exhaustively trying every possible values in the multiplication table.
solution. Meanwhile, the quantum spin models, for The present study regards QA as a second way,
example, the Ising model, comprise spins that may stay different from Shor’s algorithm, for attacking RSA and
in either up or down aligned with a preferred axis[15] . It further analyzes the feasibility of optimizing the original
can be given as follows: quantum spin models for factorizations with a simple
N N
X X example of factoring 143. It suggests that the special
HIsing D hi iz C Ji;j iz jz (1)
0–1 distributions (binary structures) of the integers to be
i D1 i;j D1
where izis the Pauli spin matrix with two values ˙1, factored in have great potentials of simplifying the final
Spin i and Spin j are coupled by Jij , and hi is the quantum spin models.
local field. During the QA procedure, another kinetic 1.2 Cryptography design
term exists in the x axis to utilize the quantum tunneling
The existing traditional cryptography design has
effects, so that, on the basis of the adiabatic theorem[11] ,
made some progress[25–28] . Currently, the post-
the system can evolve from the ground state of the initial
quantum cryptography against quantum attacks attracts
Hamiltonian to the ground state of HIsing if the annealing
increasing attention[29] , whereas the capacity of quantum
progresses slowly.
computing to design cryptography is neglected. The
Thus, the theoretical speedup potentials of QA,
most advanced quantum computers, including the D-
along with the feasibility of characterizing problems
Wave machine and the universal ones, have nothing to
by Ising models, allow for the wide applications of the
do with cryptography design.
D-Wave machine in various areas[16–22] . Furthermore,
Hu et al.[30, 31] proposed a novel way of characterizing
the capacity of QA for factorizations needs further
the Boolean functions by using Ising models. The
exploration for improving the deciphering ability of
principle-of-proof experiments verified the capacity
the D-Wave machine in the condition of limited qubit
of D-Wave annealer for designing the cryptographic
resource and hardware connectivity. However, almost
components of traditional cryptography, which is called
no one pays attention to the capacity of D-Wave for
quantum computing cryptography.
cryptography design[3] .
However, the current hardware connectivity of the
1.1 Cryptography analysis D-Wave machine limits the scalability and accuracy
Shor’s algorithm is considered a unique and powerful of generating Boolean functions, which should be
Xiangmin Ji et al.: New Advanced Computing Architecture for Cryptography Design and Analysis . . . 753
constructed via the quantum spin models. Thus, this Table 1 Multiplication table for 143=11 13 in binary.
study further explores the potentials of quantum-assisted
Variavble 27 26 25 24 23 22 21 20
cryptography design with a simplified verification on p 1 p2 p1 1
the basis of the hybrid computing architecture, inspired q 1 q2 q1 1
by quantum computing, classical computing, and brain- 1 p2 p1
inspired cognition. The new architecture explores the q1 p2 q1 p1 q1 q1
Binary-multiplication
potentials of D-Wave annealer acting as a classical q2 p2 q2 p1 q2 q2
accelerator on a large-scale cryptography design with the 1 p2 p1 1
directional searching provided by brain-like methods. It Carry c4 c3 c2 c1
is expected to be a scalable way for the D-Wave quantum Target value 1 0 0 0 1 1 1 1
computer toward a practical cryptography design in the Note: In the row of “Binary-multiplication”, the three parts
future. are denoted as Column1 , Column2 , and Column3 form right
to left.
2 Large Number Factorization by QA
f D.2p2 C2p1 q1 C2q2 8c2 4c1 Cp1 Cq1 3/2C
Prime number factorization problem refers to finding .2q1 C2p2 q2 C2p1 C2c2 8c4 4c3 Cp2 q1C
two unique prime numbers factored by large numbers p1 q2 Cc1 C1/2 C.q2 Cp2 Cc3 C2c4 2/2 (2)
where the best-known algorithm, general number field
Each part in Eq. (2) corresponds to the relationships
sieve method[32] , grows exponentially in the number
given in Column1 Column3 . If and only if all the
of operations. Performing Shor’s algorithm to factor
conditions are satisfied (the energies in each part achieve
an n-bit number still requires at least 2n logical
zero), fp1 ; p2 ; q1 ; q2 g can be used for generating two
qubits[33] . In such a condition, deciphering a 1024-bit
primes p and q to be the prime factors of 143.
RSA cryptosystem requires approximately 2048 logical
However, the qubit weights and coupler strengths
qubits, which is far larger than the capacity of the known
vary too much that they can cause inaccurate QA and
quantum chips.
fail in achieving the ground state of the Hamiltonian
Although Peng et al.[17] verified the superiority of the
(energy functions). As a result, the models cost more
D-Wave machine to Shor’s algorithm that can factor
qubit resources and more time to solve large-scale
up to 1 005 973, the limitations on the topological
factorizations than usual.
connectivity of the Chimera graph and the accuracy of
To analyze it in theory, the complexity of models and
characterizing the integer problems remain challenging.
the failure of QA lie in the dividing columns with carries.
Therefore, a theoretical analysis is conducted on the
Given that the main multiplying part is fixed, if the target
further simplification of constructing QUBO models for
values in the last row can help eliminate some carries
factoring large integers.
first before constructing the final Hamiltonian, then the
Assuming that integer N is to be factored
aforesaid challenges can be relieved.
by two prime factors p and q, they can be
Take Table 1 as an example. We first refer to Column1 ,
represented by p D .1pk1 1 pk1 2 : : : 1/2 and
which is given as follows:
q D .1qk2 1 qk2 2 : : : 1/2 ; pi and qj 2 f0; 1g; i D
1; 2; : : : ; k1 ; j D 1; 2; : : : ; k2 , where k1 D blog2 .p/c p1 C q1 C 2.p2 C q2 C p1 q1 / D 3 C 4c1 C 8c2 (3)
and k2 D blog2 .q/c ,which denote the lengths of p and If the object values are considered, then p1 C q1 D 1;
q, respectively. Here each bit represented by pi or qj hence, p1 q1 D 0. With the above conditions to simplify
can be seen as a qubit in the QUBO model. Eq. (3), it becomes 2.p2 C q2 / D 2 C 4c1 C 8c2 . Then,
Taking the factorization on 143 as an example, the we can obtain c1 D c2 D 0 and p2 C q2 D 1. In this
multiplication table based on the work of Jiang et al.[21] way, the condition given in Column1 can be transformed
is presented. as p1 C q1 D 1 and p2 C q2 D 1.
As presented in Table 1, the construction can be To employ it further in Column2 , we can obtain
provided on the basis of the three columns with the p2 q1 C p1 q2 C 4 D 1 C 4c3 C 8c4 . Then, c3 D 1 and
carries before or next to themselves. The energy function c4 D 0 can be obtained while the conditions provided in
can be given as follows: Column2 can be given as p2 q1 C p1 q2 D 1.
754 Tsinghua Science and Technology, August 2022, 27(4): 751–759
With the above conditions, the relationships in computing with the brain-inspired approach.
Column3 must be satisfied. In this way, the complex 3.1 Quantum-Inspired Simulated Annealing
Eq. (3) can be simplified as p1 C q1 D 1, p2 C q2 D 1, (QISA)
and p2 q1 C p1 q2 D 1. Only four qubits without extra
carries are enough to characterize the factorization on QA is expected to solve the problems without a sufficient
143 as follows: theoretical basis, which is also intractable for computer
science[34] . We utilize the D-Wave 2000Q platform to
f D .p1 Cq1 1/2 C.p2 Cq2 1/2 C.p2 q1 Cp1 q2 1/2
design small-scale Boolean functions with a potential
(4)
speedup advantage to the classical ones[30] . From the
Note that the term p1 p2 q1 q2 is eliminated due to
aspect of cognitive science, QA still suffers from a
p1 p2 D 0 and q1 q2 D 0. Thus, the final simplified
lack of cognitive capacity that various experiments are
energy function only contains single qubits and two-
required for finding exact solutions, especially for large-
qubit couplers. That is, no further reduction for k-
scale cases. That is, if QA is further combined with
coupler (k > 2) is required and only four qubits are
brain-inspired computing architecture, where the brain-
required to factor 143, whereas Peng et al.[17] required
like cognition provides directional searching guidance
five qubits.
for quantum computing[35] , then the new architecture
Obviously, this kind of reductions based on the binary
is expected to maximize the potentials of quantum
structure of the integers can be generalized further, and
computing and classical computing. For example, if
some of the values represented by the qubits can be fixed,
an improved Boolean function can be delivered to the
especially for the carries. In this way, the sufficiency and
quantum annealer as the initialized state, then QA can
accuracy of QA can be improved.
work well, because the initial state may be closer to the
Briefly speaking, this study proposes an optimized
ground state than a random initialization.
strategy of further considering the relationships between
To verify the potentials of the new architecture, a
the target values and the divided columns that certain
simplified version of QISA is proposed for designing
properties of the integers can be used to fix certain values
large-scale Boolean functions with multiple criteria.
in the multiplication table. Then, the complexity of the
In different cryptographic scenarios, high nonlinearity
final Hamiltonian can be reduced directly. This study
is required to withstand the best affine approximation
takes the factorization on 143 as an example, and the
and fast correlation attack, high algebraic immunity is
result indicates that if the target values in the first column
required to resist algebraic attack, and the state of being
are given as “1 1”, then at least four conditions can be
balanced is required to avoid statistical dependence
used to simplify the multiplication table first, namely,
between the plaintext and the ciphertext[36] . This study
p1 C q1 D 0, p2 C q2 D 0, c1 D 0, and c2 D 0.
aims at these three important criteria.
To sum up, a new simple verification of the feasibility
Before constructing the models for QISA, several
of the optimizations on the factorization problem is
assumptions and key points should be given first as
proposed. Moreover, the simplification derived from
follows:
the binary structure of integers provides an important
(1) As a simplified version, the criteria are given by
optimized way on the basis of the combination of
the classical algorithm directly without the mapping to
classical optimization and quantum computing. It can
the spin models.
be seen as a novel quantum-classical hybrid computing
(2) Inspired by the QA principle[14] , extra kinetic
architecture, and the generalized structure combined
terms and a simplified annealing schedule are introduced
with previous work[17] for large-scale factorizations
to simulate the annealing procedure toward the
should be further explored.
“tunneling-like effect”.
3 Boolean Functions Designed by Quantum (3) To approximate the real quantum evolution, the
Inspired Algorithm cooling strategy and metropolis criterion are required to
simulate the QA.
The last part shows the potential of quantum computing Note that due to some different properties between
on cryptography analysis. This part also explores the even-variable Boolean functions and odd-variable ones,
feasibility of devising Boolean functions based on the all the Boolean functions referred to in this paper are
advanced computing architecture, combining quantum even-variable Boolean functions, which mean n is an
Xiangmin Ji et al.: New Advanced Computing Architecture for Cryptography Design and Analysis . . . 755
level space may be presented. In addition, evolving in specialized problems, such as the bent function design.
low temperature likely refers to activating “tunneling- Thus, we expect that the real quantum annealer
like effects” in accordance with the quantum annealer, may provide a potential advantage in the small-scale
which requires low-temperature environments to realize case, similar to the six-variable Boolean function
quantum effects. design. Meanwhile, quantum computing or quantum-
To further simulate the QA algorithm, a high- inspired methods can be embedded as a part of the
performance computer is introduced to provide a high- advanced computing architecture, which can be well
precision computing capacity and advance the 8-variable collaborated with brain-inspired cognition to maximize
cases to 10- and 12-variable cases. To further investigate the potentials of quantum-classical hybrid computing.
the advantage of the new computing architecture, as In this way, the directional searching capacity can be
a simplified pattern of a brain-inspired approach, we further combined with the national quantum evolutionary
introduce the relatively better Boolean functions[37] as properties toward robust global searching algorithms,
the initial functions. whereas the brain-inspired cognition can provide explicit
The results are given in Table 3. On the basis of the physical meanings characterized by the quantum spin
optimizations for Ising spin glasses, 10- and 12-variable models.
Boolean functions with high nonlinearity (478 and 1970,
respectively) can be obtained. Furthermore, the balanced 4 Discussion and Conclusion
10- and 12-variable Boolean functions with nonlinearity Quantum computing provides powerful potential for
respectively being 476 and 1968 can be found, where solving intractable problems. However, as for the
the nonlinearity is optimized. cryptography design and analysis, universal quantum
The definitions of the parameters can refer to the ones computers and special-purpose ones are still in fancy. In
in Table 2. the 6th ETSI/IQC Quantum Safe Workshop (November
From the aspect of high-performance computing 2018), some experts shared great interests in the proposal
architecture, it offers an improved scalability to high- of factorization by D-Wave annealer[17] and analyzed
variable cases solved by powerful calculations. Although the reason for neglecting the attacks from the D-Wave
our simulations are based on the simplified quantum- machine in the post-quantum cryptography research that
inspired model and basic optimized methods, good the D-Wave, purchased by Lockheed Martin and Google,
initializations inspired by brain-inspired cognition can has been initially used for image processing, machine
help accelerate the optimizations of Boolean functions, learning, combinatorial optimization, and software
which can enable QA to realize directional searching verification.
with cognitive ability and interpretability. The D-Wave machine provides a new (second) way,
We consider that quantum computing cryptography completely different from Shor’s algorithm, and may
can derive six-variable bent functions whose nonlinearity be closer to cracking practical RSA codes than Shor’s
achieves the maximal. This study further utilizes the algorithm. We verify the optimized version[21] for
QISA framework to design Boolean functions with factoring 20-bit integers[17] with superiority to the latest
single criterion nonlinearity. Although six-variable bent IBM Q System OneTM (January 8, 2019), which can
functions can be found, it requires a certain amount only factor up to 10-bit integers via Shor’s algorithm.
of computing time and carefully designed annealing The present study further explores the introduction of
parameters. That is, to embed the QPU of the D- extra limitations for simplifying the Hamiltonian to be
Wave into the classical computing architecture, many solved. It shows the potential to further improve the
computing resources are expectedly saved further for real factoring capacity of the D-Wave machine with
superiority to other quantum platforms.
Table 3 Construction of 10- and 12-variable Boolean
functions.
Furthermore, due to the fact that most scholars
Experiment n 0 T0 . ıC/ Ecop ( ıC) D AI N consider Shor’s algorithm as a unique and powerful
1 10 1 100 0.001 30 5 478 quantum algorithm for the cryptanalysis of RSA, the
2 10 1 100 0.001 80 5 478 current state of post-quantum cryptography research
3 12 1 100 0.010 30 6 1968 exclusively refers to the potential threats of Shor’s
4 12 1 100 0.001 30 6 1970 algorithm. Thus, post-quantum cryptography research
Xiangmin Ji et al.: New Advanced Computing Architecture for Cryptography Design and Analysis . . . 757
should further consider the potentials of the D- annealing of the traveling-salesman problem, Phys. Rev.
Wave quantum computer for deciphering the RSA E, vol. 70, no. 5, p. 057701, 2004.
[6] A. Cho, DOE pushes for useful quantum computing,
cryptosystem in the future.
Science, vol. 359, no. 6372, pp. 141–142, 2018.
From the aspect of cryptography design, this study [7] J. Brainard, What’s coming up in 2018, Science, vol. 359,
attempts to construct a simple but effective advanced no. 6371, pp. 10–12, 2018.
computing architecture combining quantum computing [8] E. Gibney, Physics: Quantum computer quest, Nature, vol.
516, no. 7529, pp. 24–26, 2014.
with an intelligent pattern on devising Boolean functions,
[9] B. N. Wang, F. Hu, H. N. Yao, and C. Wang, Prime
which satisfy multiple criteria. Through the combination factorization algorithm based on parameter optimization
of classical simulation and specialized initial points, of Ising model, Scientific Reports, vol. 10, p. 7106, 2020.
a high-performance computer can effectively improve [10] H. Neven, V. S. Denchev, M. Drew-Brook, J. Y.
certain criteria via the annealing schedule, compared Zhang, W. G. Macready, and G. Rose, NIPS 2009
demonstration: Binary classification using hardware
with the ones given by mathematics. The model used
implementation of quantum annealing, Quantum, https://
in the simulations can be seen as a simplified advanced www.mendeley.com/catalogue/1a199e97-f0c3-35c1-ae5f-
computing architecture, which is expected to utilize the db23280f06a9/, 2009.
quantum effects for constructing a high-security and [11] E. Farhi, J. Goldstone, S. Gutmann, J. Lapan, A. Lundgren,
one-time-pad cryptosystem. and D. Preda, A quantum adiabatic evolution algorithm
applied to random instances of an NP-complete problem,
Further analyzed through the comparison to the real
Science, vol. 292, no. 5516, pp. 472–475, 2001.
quantum computing experiments, QA shows a potential [12] B. N. Wang, F. Hu, and C. Wang, Optimization of quantum
speed up in the Boolean function design problems. computing models inspired by D-Wave quantum annealing,
Thus, the new advanced quantum computing architecture Tsinghua Science and Technology, vol. 25, no. 4, pp. 508–
shows powerful potentials for cryptography design with 515, 2020.
[13] N. Wang, G. G. Guo, B. N. Wang, and C. Wang, Traffic
the introduction of brain-inspired cognition. Further
clustering algorithm of urban data brain based on a
attention and efforts are required for the new computing hybrid-augmented architecture of quantum annealing and
architecture and its applications. brain-inspired cognitive computing, Tsinghua Science and
Technology, vol. 25, no. 6, pp. 813–825, 2020.
Acknowledgment [14] M. W. Johnson, M. H. S. Amin, S. Gildert, T. Lanting, F.
This study was supported by the Special Zone Project of Hamze, N. Dickson, R. Harris, A. J. Berkley, J. Johansson,
National Defense Innovation, the National Natural Science P. Bunyk, et al., Quantum annealing with manufactured
spins, Nature, vol. 473, no. 7346, pp. 194–198, 2011.
Foundation of China (Nos. 61572304 and 61272096), the [15] O. Titiloye and A. Crispin, Quantum annealing of the graph
Key Program of the National Natural Science Foundation coloring problem, Discrete Optimization, vol. 8, no. 2, pp.
of China (No. 61332019), the Shanghai Sailing Plan 376–384, 2011.
of “Science and Technology Innovation Action Plan” [16] F. Neukart, G. Compostella, C. Seidel, D. von Dollen, S.
(No. 21YF1415100), Fujian Provincial Natural Science Yarkoni, and B. Parney, Traffic flow optimization using a
Foundation Project (No. 2021J01129), and Open Research quantum annealer, Frontiers in ICT, vol. 4, p. 29, 2017.
[17] W. C. Peng, B. N. Wang, F. Hu, Y. J. Wang, X. J. Fang, X.
Fund of State Key Laboratory of Cryptology.
Y. Chen, and C. Wang, Factoring larger integers with fewer
References qubits via quantum annealing with optimized parameters,
Sci. China Phys. Mech. Astron., vol. 62, no. 6, p. 60311,
[1] K. R. Brown, Quantum technologies and the National 2019.
Quantum Initiative, Quantum Engineering, vol. 1, no. 1, [18] X. M. Wang, Quest towards “factoring larger integers with
p. e7, 2019. commercial D-Wave quantum annealing machines”, Sci.
[2] J. Mlynek, The European quantum technology flagship: China Phys. Mech. Astron., vol. 62, no. 6, p. 960331, 2019.
Paving the way for the second quantum revolution, Quantum [19] A. D. King, J. Carrasquilla, J. Raymond, I. Ozfidan, E.
Engineering, vol. 1, no. 1, p. e5, 2019. Andriyash, A. Berkley, M. Reis, T. Lanting, R. Harris, F.
[3] C. Wang and H. G. Zhang, Impact of commercial quantum Altomare, et al., Observation of topological phenomena in
computer on cryptography, (in Chinese), Information a programmable lattice of 1800 qubits, Nature, vol. 560, no.
Security and Communications Privacy, no. 2, pp. 31– 7719, pp. 456–460, 2018.
32&35, 2012. [20] R. Harris, Y. Sato, A. J. Berkley, M. Reis, F. Altomare, M.
[4] A. Perdomo-Ortiz, N. Dickson, M. Drew-Brook, G. Rose, H. Amin, K. Boothby, P. Bunyk, C. Deng, C. Enderud,
and A. Aspuru-Guzik, Finding low-energy conformations et al., Phase transitions in a programmable quantum spin
of lattice protein models by quantum annealing, Scientific glass simulator, Science, vol. 361, no. 6398, pp. 162–165,
Reports, vol. 2, p. 571, 2012. 2018.
[5] R. Martonák, G. E. Santoro, and E. Tosatti, Quantum [21] S. X. Jiang, K. A. Britt, A. J. McCaskey, T. S. Humble,
758 Tsinghua Science and Technology, August 2022, 27(4): 751–759
and S. Kais, Quantum annealing for prime factorization, [30] F. Hu, L. Lamata, M. Sanz, X. Chen, X. Y. Chen, C. Wang,
Scientific Reports, vol. 8, p. 17667, 2018. and E. Solano, Quantum computing cryptography: Finding
[22] B. N. Wang, F. Hu, H. G. Zhang, and C. Wang, From cryptographic Boolean functions with quantum annealing
evolutionary cryptography to quantum artificial intelligent by a 2000 qubit D-Wave quantum computer, arXiv preprint
cryptography, (in Chinese), Journal of Computer Research arXiv: 1806.08706, 2020.
and Development, vol. 56, no. 10, pp. 2112–2134, 2019. [31] F. Hu, L. Lamata, M. Sanz, X. Chen, X. Y. Chen, C. Wang,
[23] M. R. Geller and Z. Y. Zhou, Factoring 51 and 85 with 8 and E. Solano, Quantum computing cryptography: Finding
qubits, Scientific Reports, vol. 3, p. 3023, 2013. cryptographic Boolean functions with quantum annealing
[24] X. H. Peng, Z. Y. Liao, N. Y. Xu, G. Qin, X. Y. Zhou, by a 2000 qubit D-Wave quantum computer, Physics Letters
D. Suter, and J. F. Du, Quantum adiabatic algorithm for A, vol. 384, p. 126214, 2020.
factorization and its experimental implementation, Phys. [32] A. K. Lenstra, H. W. Lenstra, M. S. Manasse, and J. M.
Rev. Lett., vol. 101, no. 22, p. 220405, 2008. Pollard, The number field sieve, in Proc. 22nd Annu. ACM
[25] J. H. Chen, C. H. Tan, and X. Y. Li, Practical cryptanalysis Symp. Theory of Computing, Baltimore, MD, USA, 1990,
of a public key cryptosystem based on the Morphism of pp. 564–572.
polynomials problem, Tsinghua Science and Technology, [33] C. Gidney, Factoring with n C 2 clean qubits and n 1 dirty
vol. 23, no. 6, pp. 671–679, 2018. qubits, arXiv preprint arXiv: 1706.07884v2, 2018.
[26] C. Wang, F. Hu, H. G. Zhang, and J. Wu, Evolutionary [34] C. Wang, Y. J. Wang, and F. Hu, Shaping the future
cryptography theory-based generating method for secure of commercial quantum computer and the challenge for
ECs, Tsinghua Science and Technology, vol. 22, no. 5, pp. information security, (in Chinese), Chinese Journal of
499–510, 2017. Network and Information Security, vol. 2, no. 3, pp. 17–
[27] H. Z. Wang, H. G. Zhang, S. W. Mao, W. Q. Wu, and 27, 2016.
L. Q. Zhang, New public-key cryptosystem based on the [35] H. P. Liu, D. Guo, F. C. Sun, W. Q. Yang, S. Furber, and
morphism of polynomials problem, Tsinghua Science and T. C. Sun, Embodied tactile perception and learning, Brain
Technology, vol. 21, no. 3, pp. 302–311, 2016. Science Advances, vol. 6, no. 2, pp.132–158, 2020.
[28] D. Połap and M. Woźniak, Voice recognition by neuro- [36] D. Tang, Recent progress in (fast) algebraic immunity of
heuristic method, Tsinghua Science and Technology, vol. Boolean functions, (in Chinese), Journal of Cryptologic
24, no. 1, pp. 9–17, 2019. Research, vol. 4, no. 3, pp. 262–272, 2017.
[29] D. J. Bernstein, Introduction to post-quantum cryptography, [37] W. G. Zhang and E. Pasalic, Constructions of resilient S-
in Post-Quantum Cryptography, D. J. Bernstein, boxes with strictly almost optimal nonlinearity through
J. Buchmann, and E. Dahmen, eds. Berlin, Germany: disjoint linear codes, IEEE Transactions on Information
Springer, 2009, pp. 1–14. Theory, vol. 60, no. 3, pp. 1638–1651, 2014.
Xiangmin Ji received the MEng degree (principle) for the first time in the world to provide an effective
from the Graduate School of Chinese way to design a cryptographic function with a Canadian quantum
Academy of Sciences, China in 2005. computer and optimize the existing cryptographic results. His
He is currently a PhD candidate at the current research interests include artificial intelligence, network
School of Cyber Science and Engineering, information security, and quantum computing cryptography.
Wuhan University, he is also an associate
professor at the College of Computer
Baonan Wang received the MEng degree
Information Science, Fujian Agriculture
from Anhui University of Science and
and Forestry University. His current research interests include
Technology, China in 2016, and the
information security, trusted computing, and quantum computing
PhD degree from Shanghai University,
cryptography.
China in 2020. She is currently a
lecturer at Shanghai University of Electric
Chao Wang received the MEng degree Power. Her current research interests
from Xidian University, China in 1995, and include information security and quantum
the PhD degree from Tongji University, computing cryptography.
China in 1999. He is currently a professor
and doctoral supervisor at Shanghai Feng Hu received the PhD degree from
University. He is also the vice chair of Shanghai University, China in 2019.
IEEE China Council. In recent years, he has He is currently an engineer at the
conducted the first exploratory experiment Joint International Research Laboratory
of the D-Wave quantum computer (principle) to decipher RSA of Specialty Fiber Optics and Advanced
public key cryptography in China, obtained the best indicators Communication, Shanghai University, and
of quantum computing attack on public key cryptography in the also at State Key Laboratory of Cryptology,
world. Specifically, he performed the exploratory experiment Beijing. His research interests include
of designing a cryptographic function with a quantum computer information security and quantum computing cryptography.
Xiangmin Ji et al.: New Advanced Computing Architecture for Cryptography Design and Analysis . . . 759