[์ปดํ“จํ„ฐ ๋ณด์•ˆ] ํƒ€์›๊ณก์„  DSA ๋””์ง€ํ„ธ ์„œ๋ช… ์„ค๋ช… ๋ฐ ๊ตฌํ˜„์ฝ”๋“œ
์ปดํ“จํ„ฐ๊ณผํ•™ (CS)/Computer Security 2020. 7. 4. 14:54

ํƒ€์›๊ณก์„  DSA ๋””์ง€ํ„ธ ์„œ๋ช… ์ž๋ฃŒ์กฐ์‚ฌ DSA๋ž€? ๋””์ง€ํ„ธ ์„œ๋ช… ์•Œ๊ณ ๋ฆฌ์ฆ˜(Digital Signature Algorithm, DSA)์€ ๋””์ง€ํ„ธ ์„œ๋ช…์„ ์œ„ํ•œ ํ‘œ์ค€์ด๋‹ค. NIST๊ฐ€ 1991๋…„ 8์›” DSS๋ผ๋Š” ๋ฏธ๊ตญ ์ „์ž์„œ๋ช… ํ‘œ์ค€์—์„œ ์ด์šฉํ•˜๊ธฐ ์œ„ํ•ด ์ •๋ถ€์šฉ ์ „์ž์„œ๋ช… ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ฐœํ‘œํ–ˆ์œผ๋ฉฐ, ํ˜„์žฌ๋Š” DSA์™€ ํ•จ๊ป˜ ECDSA, RSA๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ๋””์ง€ํ„ธ ์„œ๋ช… ์ธ์ฆ ๋ฐฉ์‹ ์ „์ž์„œ๋ช…(๋””์ง€ํ„ธ ์„œ๋ช…)์€ ๋ฌด๊ฒฐ์„ฑ, ์ธ์ฆ, ๋ถ€์ธ๋ฐฉ์ง€๋ฅผ ๋งŒ์กฑํ•ด์•ผํ•œ๋‹ค. ์ „์ž์„œ๋ช…์—๋Š” ๊ณต๊ฐœํ‚ค ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์“ฐ์ด๋ฉฐ ํฌ๊ฒŒ 3๊ฐ€์ง€ ์ข…๋ฅ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์žˆ๋‹ค. ํ•ฉ์„ฑ์ˆ˜์˜ ์†Œ์ธ์ˆ˜๋ถ„ํ•ด๋ฌธ์ œ๊ฐ€ ์–ด๋ ต๋‹ค๋Š” ๋ฐ์— ๊ธฐ์ดˆํ•œ RSAํ˜• ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์œ ํ•œ์ฒด์˜ ์ด์‚ฐ๋Œ€์ˆ˜ ๋ฌธ์ œ๊ฐ€ ์–ด๋ ต๋‹ค๋Š” ๋ฐ์— ๊ธฐ์ดˆํ•œ ElGamalํ˜• ์•Œ๊ณ ๋ฆฌ์ฆ˜ ํƒ€์›๊ณก์„ ์„ ์ด์šฉํ•œ EC-DSA, EC-KCDSA DSA๋Š” ์ด ์ค‘ E..

[์ปดํ“จํ„ฐ ๋ณด์•ˆ] ๊ทผ๋Œ€ ์•”ํ˜ธ๋ฐฉ์‹ (SEED, SSL, RSA) ์ •๋ฆฌ
์ปดํ“จํ„ฐ๊ณผํ•™ (CS)/Computer Security 2020. 4. 12. 19:38

SEED ARIA์™€ ํ•จ๊ป˜ ๋Œ€ํ•œ๋ฏผ๊ตญ ๊ตญ๊ฐ€ ํ‘œ์ค€ ์•”ํ˜ธ๋ฐฉ์‹ ์ฐธ๊ณ  : https://ojava.tistory.com/103 ํŠน์ง• 1999๋…„ 2์›” ํ•œ๊ตญ์ •๋ณด๋ณดํ˜ธ์ง„ํฅ์›์ด ๊ฐœ๋ฐœํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ DES์™€ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๊ตฌ์กฐ๊ฐ€ ๊ธฐ์ˆ ์ ์œผ๋กœ ๋น„์Šทํ•จ feistel ๊ตฌ์กฐ ์‚ฌ์šฉ ์ธํ„ฐ๋„ท ๋ฑ…ํ‚น, ์‡ผํ•‘ ํ™˜๊ฒฝ์—์„œ ์ฃผ๋กœ ์“ฐ์ž„ ActiveX๋กœ ๋ฐฐํฌ๋จ => ์›น ํ˜ธํ™˜์„ฑ ๋ฌธ์ œ ์›น ์‚ฌ์ดํŠธ๊ฐ€ ์›น ํ‘œ์ค€์„ ์–ด๊ธฐ๊ณ  MS์‚ฌ์˜ IE์—์„œ๋งŒ ์ž‘๋™๋˜๋Š” ๋น„ํ‘œ์ค€ ๊ธฐ์ˆ ์„ ๋‚จ์šฉํ•˜๋Š” ๊ฒƒ 2000๋…„๋Œ€ ์ดํ›„ SSL์ด ๊ตญ์ œ ํ‘œ์ค€์œผ๋กœ ์ธ์ •๋˜์—ˆ์œผ๋‚˜ ๋Œ€ํ•œ๋ฏผ๊ตญ์€ ๊ณ„์† SEED๋ฅผ ์‚ฌ์šฉํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค. ISO/IEC ๊ตญ์ œ ๋ธ”๋ก์•”ํ˜ธ์•Œ๊ณ ๋ฆฌ์ฆ˜, IETF ํ‘œ์ค€์œผ๋กœ ์ œ์ • ๋ฐฉ์‹ 128bit / 256bit ๋Œ€์นญ ํ‚ค ๋ธ”๋ก ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜ 128bit๋Š” ๊ตญ์ œ ํ‘œ์ค€์— ๋“ฑ์žฌ๋˜์–ด ์žˆ์ง€๋งŒ 256bit๋Š” ์•„์ง ๋“ฑ์žฌ๋˜์ง€ ์•Š์Œ D..

[์ปดํ“จํ„ฐ ๋ณด์•ˆ] ํ•ด์‹œํ•จ์ˆ˜ (์ •์˜, ํšจ๊ณผ, ์šฉ๋„, ์ข…๋ฅ˜, ๊ตฌํ˜„, ์•ฝ์ )
์ปดํ“จํ„ฐ๊ณผํ•™ (CS)/Computer Security 2020. 4. 8. 08:20

์ผ๋ฐฉํ–ฅ ํ•ด์‹œํ•จ์ˆ˜ ์ •์˜ ํ•ด์‹œํ•จ์ˆ˜ ์ค‘ ์—ญ์ƒ์ €ํ•ญ์„ฑ, ์ œ2์—ญ์ƒ์ €ํ•ญ์„ฑ, ์ถฉ๋Œ์ €ํ•ญ์„ฑ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ํ•จ์ˆ˜ ํ•ด์‹œํ•จ์ˆ˜ : ์ž„์˜ ๊ธธ์ด์˜ ๋ฉ”์„ธ์ง€๋ฅผ ์ผ์ • ๊ณ ์ • ๊ธธ์ด์˜ ํ•ด์‰ฌ ๊ฐ’์œผ๋กœ ๋ณ€ํ™˜์‹œ์ผœ์ฃผ๋Š” ๋‹จ๋ฐฉํ–ฅ์„ฑ ํ•จ์ˆ˜/์•Œ๊ณ ๋ฆฌ์ฆ˜ ์—ญ์ƒ ์ €ํ•ญ์„ฑ(preimage resistance) : ์ œ 1 ์—ญ์ƒ ๊ณต๊ฒฉ์— ๋Œ€ํ•˜์—ฌ ์•ˆ์ „ํ•œ ๊ฒƒ ์ œ 1 ์—ญ์ƒ ๊ณต๊ฒฉ : ํ•ด์‹œ๊ฐ’์ด ์ฃผ์–ด์กŒ์„ ๋•Œ, ๊ทธ ํ•ด์‹œ๊ฐ’์„ ์ถœ๋ ฅํ•˜๋Š” ์ž…๋ ฅ๊ฐ’์„ ์ฐพ๋Š” ๊ณต๊ฒฉ ๋‹จ๋ฐฉํ–ฅ ์•”ํ˜ธํ™”์™€ ๊ด€๋ จ ์žˆ์Œ ๋‹จ๋ฐฉํ–ฅ ์•”ํ˜ธํ™” : A => f => B (์•”ํ˜ธํ™”) A

[์ปดํ“จํ„ฐ ๋ณด์•ˆ] ์น˜ํ™˜ ์•”ํ˜ธ vs ์ „์น˜ ์•”ํ˜ธ :: ์ฃผ์ƒ์ „์น˜์•”ํ˜ธ
์ปดํ“จํ„ฐ๊ณผํ•™ (CS)/Computer Security 2020. 4. 8. 08:18

์ฃผ์ƒ์ „์น˜์•”ํ˜ธ ์ „์น˜ ์•”ํ˜ธ๋ž€? ์น˜ํ™˜ ์•”ํ˜ธ๊ฐ€ ํ‰๋ฌธ ๋ฌธ์ž๋ฅผ ๋‹ค๋ฅธ ๋ฌธ์ž๋กœ ์–ด๋– ํ•œ ๊ทœ์น™์— ๋”ฐ๋ผ ๋Œ€์‘์‹œ์ผœ ์•”ํ˜ธํ™”ํ•˜๋Š” ๋ฐฉ์‹์ด๋ผ๋ฉด, ์ „์น˜ ์•”ํ˜ธ๋Š” ํ‰๋ฌธ ๋ฌธ์ž์˜ ์ž๋ฆฌ๋ฅผ ๋ฐ”๊พธ๋Š” ๊ทœ์น™์ด๋‹ค. ์ฆ‰, ์น˜ํ™˜ ์•”ํ˜ธ๋Š” ํ‰๋ฌธ ๋ฌธ์ž์—์„œ ์‚ฌ์šฉํ•˜๋Š” ๋ฌธ์ž ์ง‘ํ•ฉ๊ณผ ์•”ํ˜ธ๋ฌธ์˜ ๋ฌธ์ž ์ง‘ํ•ฉ์ด ๋‹ค๋ฅผ ์ˆ˜ ์žˆ์ง€๋งŒ, ์ „์น˜ ์•”ํ˜ธ์—์„œ๋Š” ๊ฐ™๋‹ค. ๋˜ํ•œ ๋ฌธ์ž๊ฐ€ ๋ฌธ์ž๋กœ ๋Œ€์‘๋˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ํ•ด๋‹น ๋ฌธ์ž์˜ ์œ„์น˜๊ฐ€ ์œ„์น˜๋กœ ๋Œ€์‘๋œ๋‹ค. ์ „์น˜ ์•”ํ˜ธ ์ข…๋ฅ˜ ๋‹จ์ˆœ ์ „์น˜ ์•”ํ˜ธ ๊ธฐ์กด ํ‰๋ฌธ์„ ์ฃผ์–ด์ง„ ํ‚ค ๊ฐ’(๋ฌธ์žฅ์˜ ๊ธธ์ด์— ํ•ด๋‹นํ•˜๋Š” ์ˆœ์—ด)๋กœ ์•”ํ˜ธํ™” ํ•œ๋‹ค. ์•”ํ˜ธํ™”ํ•  ๋•Œ ์‚ฌ์šฉํ•œ ์•”ํ˜ธํ™” ํ‚ค๋กœ ๋ณตํ˜ธํ™” ํ‚ค๋ฅผ ์•Œ์•„๋‚ด์„œ ๋ณตํ˜ธํ™”์— ์‚ฌ์šฉํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๋น„๋ฐ€ ํ‚ค ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•ด์•ผํ•œ๋‹ค. ๋ณตํ•ฉ ์ „์น˜ ์•”ํ˜ธ ์˜ˆ๋ฅผ ๋“ค์–ด "I AM HEEEUN I AM SENIOR"๋ผ๋Š” ๋ฌธ์žฅ์„ ์ „์น˜ ์•”ํ˜ธ๋กœ ์•”ํ˜ธํ™” ์‹œํ‚ฌ ๋•Œ, ์ฃผ์–ด์ง„ ๋ฌธ์ž ์ง‘ํ•ฉ์— ..