[์ปดํ“จํ„ฐ ๋ณด์•ˆ] ํƒ€์›๊ณก์„  DSA ๋””์ง€ํ„ธ ์„œ๋ช… ์„ค๋ช… ๋ฐ ๊ตฌํ˜„์ฝ”๋“œ
์ปดํ“จํ„ฐ๊ณผํ•™ (CS)/Computer Security 2020. 7. 4. 14:54

ํƒ€์›๊ณก์„  DSA ๋””์ง€ํ„ธ ์„œ๋ช… ์ž๋ฃŒ์กฐ์‚ฌ DSA๋ž€? ๋””์ง€ํ„ธ ์„œ๋ช… ์•Œ๊ณ ๋ฆฌ์ฆ˜(Digital Signature Algorithm, DSA)์€ ๋””์ง€ํ„ธ ์„œ๋ช…์„ ์œ„ํ•œ ํ‘œ์ค€์ด๋‹ค. NIST๊ฐ€ 1991๋…„ 8์›” DSS๋ผ๋Š” ๋ฏธ๊ตญ ์ „์ž์„œ๋ช… ํ‘œ์ค€์—์„œ ์ด์šฉํ•˜๊ธฐ ์œ„ํ•ด ์ •๋ถ€์šฉ ์ „์ž์„œ๋ช… ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ฐœํ‘œํ–ˆ์œผ๋ฉฐ, ํ˜„์žฌ๋Š” DSA์™€ ํ•จ๊ป˜ ECDSA, RSA๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ๋””์ง€ํ„ธ ์„œ๋ช… ์ธ์ฆ ๋ฐฉ์‹ ์ „์ž์„œ๋ช…(๋””์ง€ํ„ธ ์„œ๋ช…)์€ ๋ฌด๊ฒฐ์„ฑ, ์ธ์ฆ, ๋ถ€์ธ๋ฐฉ์ง€๋ฅผ ๋งŒ์กฑํ•ด์•ผํ•œ๋‹ค. ์ „์ž์„œ๋ช…์—๋Š” ๊ณต๊ฐœํ‚ค ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์“ฐ์ด๋ฉฐ ํฌ๊ฒŒ 3๊ฐ€์ง€ ์ข…๋ฅ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์žˆ๋‹ค. ํ•ฉ์„ฑ์ˆ˜์˜ ์†Œ์ธ์ˆ˜๋ถ„ํ•ด๋ฌธ์ œ๊ฐ€ ์–ด๋ ต๋‹ค๋Š” ๋ฐ์— ๊ธฐ์ดˆํ•œ RSAํ˜• ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์œ ํ•œ์ฒด์˜ ์ด์‚ฐ๋Œ€์ˆ˜ ๋ฌธ์ œ๊ฐ€ ์–ด๋ ต๋‹ค๋Š” ๋ฐ์— ๊ธฐ์ดˆํ•œ ElGamalํ˜• ์•Œ๊ณ ๋ฆฌ์ฆ˜ ํƒ€์›๊ณก์„ ์„ ์ด์šฉํ•œ EC-DSA, EC-KCDSA DSA๋Š” ์ด ์ค‘ E..