Skip to main content

Design and Implementation of Key Extension and Interface Module Based on Quantum Circuit

  • Conference paper
  • First Online:
Artificial Intelligence Algorithms and Applications (ISICA 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1205))

Included in the following conference series:

  • 2326 Accesses

Abstract

Encryption technology that based on quantum circuit is an important technology in the field of information security and the encryption system designed by this technology can improve the encryption effect, and its anti-attack ability is (\( 2^{\text{n}} \) − 1)! times of the traditional method. In order to increase the complexity of the key that belongs to the encryption system, we propose a method of constructing the algorithm of key extension based on quantum circuit and finish the design of the key extension module, in the method, we transform the nonlinear transformation into linear transformation which can be constructed by quantum circuit easily, and complete the transformation of operation in quantum logic which can simplify the generation process while maintaining the same performance. In order to increase the practicability of encryption system based on quantum circuit, we analyze the characteristics of the encryption system and complete the design of the interface module. What’s more, the key extension module and the interface module are tested under the environment of QUARTUS and real object, and the validity and correctness of the two modules are verified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, L., Jiang, C., Wang, J.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)

    Article  Google Scholar 

  2. Natalia, M., Alexander, T.: Internet of Things: information security challenges and solutions. Cluster Comput. 22, 103–106 (2018)

    Google Scholar 

  3. Chen, J., Guan, Z., Chen, X.: Design and hardware implementation of quantum reversible logic encryption algorithms. J. PLA Univ. Sci. Technol. (Nat. Sci. Ed.) 0(0), 1–3 (2018)

    Google Scholar 

  4. Liu, Y., Zhu, F.: Quantum circuit implementation of S-Box transform in AES. Inf. Secur. Commun. Secrecy 5, 92–94 (2008)

    Google Scholar 

  5. Liang, M.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14(8), 2749–2754 (2015)

    Article  MathSciNet  Google Scholar 

  6. Datta, K., Sengupta, I.: Applications of reversible Logic in cryptography and coding theory. In: International Conference on Vlsi Design and International Conference on Embedded Systems, pp. lxvi–lxvii. IEEE Computer Society. Washington DC (2013)

    Google Scholar 

  7. Zhang, Z., Guan, Z., Zhan, H.: A method of synthesis and optimization for linear nearest neighbor quantum circuits by parallel processing. Quantum Inf. Comput. 18(13), 1095–1114 (2018)

    MathSciNet  Google Scholar 

  8. Li, Z., Chen, S., Song, X.: Quantum Circuit synthesis using a new quantum logic gate library of NCV quantum gates. Int. J. Theor. Phys. 56(4), 1023–1038 (2017)

    Article  MathSciNet  Google Scholar 

  9. Du, Z., Xu, Q., Zhang, J.: The design of a key extension algorithm based on dynamic dislocation counts. In: 11th International Conference on Computational Intelligence and Security (CIS), pp. 345–349. IEEE, Shenzhen (2015)

    Google Scholar 

  10. Guan, Z., Chen, J., Chen, X.: Implementation method of quantum byte replacement hardware module for AES hardware encryption system: CN108322305A[P], 24 July 2018

    Google Scholar 

  11. Nayak, A., Sen, P.: Invertible Quantum Operations and Perfect Encryption of Quantum States. Quantum Inf. Comput. 7(1–2), 103–110 (2012)

    MATH  Google Scholar 

  12. Bossuet, L., Datta, N., Mancillas-Lopez, C.: ELmD: a pipelineable authenticated encryption and its hardware implementation. IEEE Trans. Comput. 65(11), 3318–3329 (2016)

    Article  MathSciNet  Google Scholar 

  13. Wei, P., Zhang, C., Huang, X.: Design of a high-performance and dynamic reconfigurable SPI IP core with master and slave mode. Appl. Electron. Tech. 44(3), 15–18 (2018)

    Google Scholar 

  14. Xie, Z.: A design of PCI target interface based on FPGA. Adv. Mat. Res. 186, 342–347 (2011)

    Google Scholar 

Download references

Acknowledgements

This work was partially supported by National Natural Science Foundation of China (NO. 61402244), Natural Science Foundation of Jiangsu Province (NO. BK20151274) and Next Generation Project of Technology Innovation for CERNET Internet (NO. NGII20180310).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuehua Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Sun, J., Guan, Z., Chen, J., Li, Y. (2020). Design and Implementation of Key Extension and Interface Module Based on Quantum Circuit. In: Li, K., Li, W., Wang, H., Liu, Y. (eds) Artificial Intelligence Algorithms and Applications. ISICA 2019. Communications in Computer and Information Science, vol 1205. Springer, Singapore. https://doi.org/10.1007/978-981-15-5577-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5577-0_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5576-3

  • Online ISBN: 978-981-15-5577-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics