Information Security Needs to be Prioritized in the Era of Artificial Intelligence

How to guarantee information security in the era of artificial intelligence? From August 24 to 25, the Chongqing Global Scientists Summit was held in Chongqing in 2019. Nineteen Nobel, Turing and Fields Prize winners and seven academicians from the Chinese Academy of Sciences, the Chinese Academy of Engineering and the International Academy of Eurasian Sciences gathered in the mountain city to launch a top-level intellectual collision. As one of the important activities of the 2nd China International Intelligent Industry Expo, these “strongest brains” put forward their own suggestions on the current development of AI and digital industry.
Information security has always been the focus of attention, and the technology to ensure security has been in the process of challenge and development.
“At present, with the development of Internet of Things and other technologies, cryptography has been challenged greatly.” Whitfield Diffey, the father of public key cryptography and the winner of the Turing Prize in 2015, gave a speech on Future Cryptography at the conference, saying that because the Internet of Things connects billions of devices, encryption becomes more difficult and energy consumption increases; secondly, how to prove that encryption is 100% reliable and difficult to use mathematics? Algorithms prove that, in addition, there is a threat of quantum computing, because if billions of devices are micro-energy-consuming or nanotechnology used, encryption will be more difficult. “There is no problem in solving the problems of the 1950s with some 21st century technologies that we are using now, but it is difficult to solve the problems faced by the Internet of Things.”
In Duffy’s view, there will be three opportunities for cryptography in the future: one is homomorphic encryption, i.e., encryption in the cloud, for example, people now store a lot of private information on smart terminals such as mobile phones, while private information will be stored in the cloud through encryption technology, which will be safer than storage in the terminal; the other is block chains, such as block chains. Bitcoin; third, new public key technology. He said that with the advent of 5G era and the development of big data and artificial intelligence, cryptography will be more widely used in the future.
Martin Herman, founder of block chain cryptography and winner of Turing Prize in 2015, introduced that asymmetric encryption has two keys: public key and private key. Private keys are known only by themselves and can never be disclosed. Public keys are public. By means of “public key encryption, private key decryption” or “private key encryption, public key decryption”, asymmetric encryption has helped US $5 trillion transactions and ensured the security of data transmission.
“With the world becoming more and more interconnected, information security has become a public issue, the top priority.” Martin Herman said that the Internet security problem was rooted in the absence of security considerations when it was created. Now the consideration of information security can no longer be made up. To bring security into the design of artificial intelligence, the information security problem of intelligent city must be put in the first place, and the security problem must be planned from the beginning.
For quantum computing encryption technology, Herman said that quantum encryption is absolutely safe in theory, but in practice it may not achieve absolute quantum security in theory, and it is unlikely to become a threat to current cryptography in at least 50 years.
Alessio Figari, the winner of the Fields Prize in 2018, is engaged in basic mathematics research. His research on optimal transportation theory has been increasingly used in artificial intelligence. He said that in recent years, artificial intelligence technology has attracted much attention, but artificial intelligence is far from perfect. Mathematics, as a basic subject, can find deep-seated rules for the development of artificial intelligence, and further improve it. He suggested that researchers and workers in the field of artificial intelligence should attach importance to mathematics, strengthen interdisciplinary integration, and let mathematics play a more far-reaching role in the development of artificial intelligence.
The Chongqing Science and Technology Bureau and the Chongqing Liangjiang New District Management Committee signed a cooperation framework agreement with Professor Duffy’s team and the American Encryption Laboratory team on May 25. The three parties will form the Chongqing Institute of Cryptographic Block Chain Technology in 2019. In the next five years, top scientists and research teams at home and abroad will carry out research work in many key fields, such as cryptography, block chain technology, network security, artificial intelligence, cloud security, and strive to build Chongqing into a national and even global research highland in the field of cryptography.
The responsible person of Chongqing Science and Technology Bureau said: “Chongqing is speeding up the implementation of innovation-driven development strategic action plan led by intellectualization of big data, and the landing of encryption laboratory team is an important layout in the field of digital economy for Chongqing.”

Leave a Reply

Your email address will not be published. Required fields are marked *