Home > Àüü±â»ç

Çѱ¹ °³¹ß °æ·® ºí·Ï ¾ÏÈ£ LEA, ±¹Á¦Ç¥ÁØ ¼±Á¤ ¿¹Á¤

ÀÔ·Â : 2018-01-02 11:45
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â
ISO/IEC JTC 1/SC 27/WG2 ¾ÏÈ£±â¼úÀÇ 2017³â ¼º°ú¿Í 2018³â ÇâÈÄ Àü¸Á
°æ·® ºí·Ï, ÀÏ¹Ý ºí·Ï, Çüź¸Á¸ ¾ÏÈ£, Å° ¼³Á¤ ±â¹ý Ç¥ÁØÈ­ µî ÃßÁø
±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼­ °³¹ßÇÑ °æ·® Ç¥ÁØ ºí·Ï ¾ÏÈ£ LEA, ÇâÈÄ Ç¥ÁØÈ­ ¿¹»ó


[º¸¾È´º½º= ¼ÛÁ¤È¯ ISO/IEC JTC 1/SC 27/WG2 ±×·ìÀå] ISO/IECÀÇ WG2(Working Group 2)´Â ¾ÏÈ£ ¾Ë°í¸®Áò µî ´Ù¾çÇÑ º¸¾È±â¼ú ¹× ±¸Çö ¸ÞÄ¿´ÏÁò¿¡ °ü·ÃµÈ Ç¥ÁØÀ» °³¹ßÇϱâ À§ÇÑ ÀÛ¾÷ ±×·ìÀÌ´Ù. ¿À·£ ±â°£ Áö¼ÓÀûÀ¸·Î WG2¿¡¼­ È°µ¿ÇÑ °á°ú Çѱ¹ÀÌ °³¹ßÇÑ ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò SEED, HIGHT°¡ ÀÏ¹Ý ºí·Ï ¾ÏÈ£¸¦ ´Ù·ç°í ÀÖ´Â ISO/IEC 18033-3 ±¹Á¦Ç¥ÁØ¿¡ ¹Ý¿µÇßÀ¸¸ç, ÃÖ±Ù Çѱ¹ÀÇ °æ·® ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò LEA(Lightweight Encryption Algorithm)ÀÇ °æ¿ì ISO/IEC 29192-2 ±¹Á¦Ç¥ÁØ ¹Ý¿µÀ» ÃßÁøÇÏ´Â µî ¿Õ¼ºÇÑ Ç¥ÁØÈ­ È°µ¿À» ÇÏ°í ÀÖ´Ù.

[À̹ÌÁö=¾ÆÀÌŬ¸¯¾ÆÆ®]


1. °æ·® ºí·Ï ¾ÏÈ£ Ç¥ÁØÈ­
°æ·® ºí·Ï ¾ÏÈ£¸¦ ´Ù·ç´Â ISO/IEC 29192-2¿¡¼­´Â ¹Ì±¹ÀÇ SIMON/SPECK°ú Çѱ¹ÀÇ LEA°¡ ¼­·Î º°µµ·Î µÎ °³ÀÇ ¹®¼­(Amendment, ÀÌÇÏ AMD)·Î Ç¥ÁØÈ­°¡ ÁøÇàµÇ°í ÀÖ´Ù. ¹Ì±¹ÀÇ SIMON/SPECKÀº 2016³â 53Â÷(10¿ù UAE ¾ÆºÎ´Ùºñ)°ú 2017³â 54Â÷(4¿ù ´ºÁú·£µå ÇعÐÅÏ), 55Â÷(11¿ù µ¶ÀÏ º£¸¦¸°) µÎ Â÷·ÊÀÇ ISO/IEC SC27 ȸÀǸ¦ ÅëÇؼ­ ¼¼ ¹ø° PDAM(Proposed Draft Amendment)À¸·Î ÁøÇàÀÌ Áö¿¬µÇ°í ÀÖ´Ù.

º§±â¿¡, À̽º¶ó¿¤ µî ¸î °³ ±¹°¡¿¡¼­ SIMON/SPECK ¼³°è»ç»óÀ» °ø°³Ç϶ó´Â ÀÇ°ßÀ» Á¦½ÃÇÔ¿¡ µû¶ó ¹Ì±¹ ±¹°¡¾Èº¸±¹(NSA: National Security Agency)¿¡¼­´Â ¼³°è»ç»ó°ú 128ºñÆ® ¹Ì¸¸ÀÇ Æò¹®/¾ÏÈ£¹®À» ó¸®ÇÏ´Â ±Ô°ÝµéÀ» Ç¥ÁØÈ­ ÁøÇà °úÁ¤¿¡¼­ öȸÇßÀ¸³ª, À§ µÎ ±¹°¡¿¡¼­´Â NSA¿¡ ´ëÇÑ ¸·¿¬ÇÑ ÀǽÉÀ» Áö¼ÓÀûÀ¸·Î Á¦±âÇÏ°í ÀÖ´Ù.

¹Ý¸é, Çѱ¹ ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼­ °³¹ßÇÑ °æ·® Ç¥ÁØ ºí·Ï ¾ÏÈ£ LEA´Â 54Â÷ ȸÀÇ¿¡¼­ ¼øÁ¶·Ó°Ô WD(Working Draft) ´Ü°è·Î ÁøÇàµÇ¾ú°í, 55Â÷ ȸÀÇ¿¡¼­´Â ¹Ý´ë ¾øÀÌ ¸¸ÀåÀÏÄ¡·Î LEA°¡ PDAM ´Ü°è·Î ÁøÇàµÆ´Ù. LEA¿¡ ´ëÇÑ Ç¥ÁØÈ­ ÁøÇàÀº ±¹¹Î´ëÇб³ ±èµ¿Âù ±³¼ö°¡ ¿¡µðÅÍ ¿ªÇÒÀ» ÇÏ°í ÀÖÀ¸¸ç, 2018³â ¸» ȤÀº 2019³â ÃÊ¿¡ ISO Ç¥ÁØÀ¸·Î ¼øÁ¶·Ó°Ô È®Á¤µÉ °ÍÀ¸·Î ¿¹»óµÈ´Ù.

2. ÀÏ¹Ý ºí·Ï ¾ÏÈ£ Ç¥ÁØÈ­
ÀÏ¹Ý ºí·Ï ¾ÏÈ£¸¦ Ç¥ÁØÈ­ÇÏ°í ÀÖ´Â ISO/IEC 18033-3¿¡¼­´Â °æ·® ºí·Ï ¾ÏÈ£ 29192-2¿¡¼­ ÁøÇàµÇ°í ÀÖ´Â °Í°ú °°ÀÌ ¼­·Î ´Ù¸¥ µÎ °³ÀÇ ºí·Ï ¾ÏÈ£ÀÎ ·¯½Ã¾ÆÀÇ Kuznechik°ú Áß±¹ÀÇ SM4°¡ Ç¥ÁØÈ­ ÀÛ¾÷À» ÁøÇà ÁßÀÌ´Ù. ·¯½Ã¾Æ ¿¬¹æÇ¥ÁØ ºí·Ï ¾ÏÈ£ KuznyechikÀº 54Â÷ ȸÀÇ¿¡¼­ Ưº°ÇÑ ¹Ý´ë ¾øÀÌ PDAM ´Ü°è·Î ÁøÇàµÆ°í, 55Â÷ ȸÀÇ¿¡¼­ DAM(Draft Amendment) ´Ü°è·Î ÃßÁøµÆ´Ù.

SM4´Â Áß±¹ÀÇ Ç¥ÁØ ¹«¼±·£ WAPI(Wired Authentication and Privacy Infrastructure)¿¡ »ç¿ëµÇ´Â SMS4¿¡¼­ À̸§À» º¯°æÇÑ ºí·Ï ¾ÏÈ£ÀÌ´Ù. WAPI´Â Áß±¹ÀÇ ¹«¼±·£ ½ÃÀå¿¡¼­ ²ÙÁØÈ÷ ¾²¿©¿Â ±â¼úÀ̸ç, 2006³â ISO/IEC SC31(ÀÚµ¿½Äº° ¹× µ¥ÀÌÅÍ È¹µæ)¿¡¼­ SMS4·Î Ç¥ÁØÈ­ ½Ãµµ¸¦ ÇßÁö¸¸ ½ÇÆÐÇß´Ù. ±×·¯´Ù 2016³â ISO/IEC SC27À» ÅëÇØ Ç¥ÁØÈ­°¡ ½ÃÀ۵ƴÙ.

SM4´Â ¹Ì±¹ Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST)¿¡¼­ Á¦Á¤ÇÑ AES(Advanced Encryption Standard)¿Í ºñ±³ÇØ ¼º´É ¿ì¼ö¼ºÀÌ ¾ø´Ù°í Æò°¡µÈ´Ù. ƯÈ÷, SM4°¡ ÀϺΠÇ÷§Æû¿¡¼­ AES ´ëºñ 60%ÀÇ ¼Óµµ°¡ ³ª¿À´Â µî(CRYPTO++ ¶óÀ̺귯¸®, PC) AES ´ëºñ ¼º´É ¿ì¼ö¼º Áõ°Å°¡ ¹ÌÈíÇÏ´Ù´Â ³»¿ëÀ» 54Â÷ ȸÀÇ Àü¿¡ Çѱ¹¿¡¼­ ÁöÀûÇß´Ù.

±×·¯³ª SM4°¡ Áß±¹ »ê¾÷ Àü¹Ý¿¡ ¸¹ÀÌ »ç¿ëµÇ°í ÀÖ°í, Áß±¹ Ãø¿¡¼­ AES ´ëºñ ¼º´É ÃøÁ¤ °á°ú¿¡ ´ëÇÑ Áõ°ÅÀڷḦ Ãß°¡·Î Á¦½ÃÇßÀ¸¸ç, SM4°¡ 18033-1ÀÇ ºí·Ï ¾ÏÈ£ ÀÚ°ÝÁ¶°ÇÀ» ¸¸Á·ÇÑ´Ù´Â Á¡À» ÁÖÀåÇß´Ù. 54Â÷ ȸÀǸ¦ ÅëÇؼ­ SM4¿¡ °üÇÑ ¿¬±¸±â°£(Study Period, ÀÌÇÏ SP)À» Á¾·áÇÏ°í, AMD2ÀÇ Ã¹ ¹ø° WD·Î Ç¥ÁØÈ­ ÁøÇàÀÌ °áÁ¤µÆ´Ù. ±×¸®°í 55Â÷ ȸÀÇ¿¡¼­ PDAM ´Ü°è·Î ÁøÇàµÆ´Ù.

3. Çüź¸Á¸ ¾ÏÈ£ Ç¥ÁØÈ­
Çüź¸Á¸ ¾ÏÈ£ FPE(Format Preserving Encryption)Àº ¾ÏÈ£¹®°ú Æò¹®ÀÇ ÇüÅÂ(format)¸¦ º¸Á¸Çϱâ À§ÇÑ ¾ÏÈ£±â¼úÀ̸ç, »ê¾÷°è(ƯÈ÷ DB ¾Ïȣȭ) È°¿ëÀ» ¸ñÀûÀ¸·Î ÇÏ´Â ºí·Ï ¾ÏÈ£ÀÇ ÇÑ Á¾·ù´Ù. 2015³â Çѱ¹¿¡¼­ SC27 Roadmap¿¡ Çüź¸Á¸ ¾ÏÈ£¿¡ °üÇÑ ÀÇ°ßÀ» Á¦½ÃÇßÀ¸³ª, ´ç½Ã Çѱ¹¿¡¼­ °³¹ßÇÑ Çüź¸Á¸ ¾ÏÈ£ÀÎ FEA(Format-Preserving Encryption Algorithm, 2015³â ICISC¿¡¼­ ¹ßÇ¥)°¡ ¹ßÇ¥µÈ Áö 3³âÀÌ Áö³ªÁö ¾Ê¾Ò±â ¶§¹®¿¡ Àû±Ø ÁøÇàµÇÁö ¸øÇß´Ù.

Áö³­ÇØ 55Â÷ ȸÀÇ¿¡¼­ SP ¡®State-of—the-art of symmetric key primitives and related modes of operation¡¯¿¡ ´ëÇÑ ÀÇ°ß¼ö·Å °á°ú, Çѱ¹ Ãø¿¡¼­ ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼­ °³¹ßÇÏ°í Çѱ¹ÀÇ TTA ´ÜüǥÁØÀ¸·Î Á¦Á¤µÈ FEA°¡ ¾ð±ÞµÆ´Ù. ÀÌ¿¡ µû¶ó SP ¡®Suitability of standardization of format-preserving encryption schemes in ISO/IEC standards¡¯·Î Çüź¸Á¸ ¾ÏÈ£ÀÇ Ç¥ÁØÈ­ ÀûÇÕ¼º ÆÇ´ÜÀ» ¿ì¼± ½ÃÀÛÇÏ°Ô µÆ´Ù. ÇöÀç Çѱ¹ Ãø¿¡¼­ Rapporteur·Î ¼±Á¤µÇ¾î Çѱ¹¿¡¼­ ÁÖµµÀûÀ¸·Î Çüź¸Á¸ ¾ÏÈ£¿¡ °üÇÑ Ç¥ÁØÈ­°¡ ÁøÇàµÇ¸®¶ó ±â´ëÇÏ°í ÀÖ´Ù.

4. Å° ¼³Á¤ ±â¹ý Ç¥ÁØÈ­
ISO/IEC 11770-4´Â weak secret¿¡ ±â¹ÝÇÑ Å° ¼³Á¤ ±â¹ý¿¡ °üÇÑ Ç¥ÁØÈ­ÀÌ´Ù. 2016³â 53Â÷ ȸÀÇ¿¡¼­ SP ¡®Key establishment mechanisms between parties with unbalanced security requirement¡¯·Î ½ÃÀ۵ưí Áö³­ÇØ 54Â÷ ȸÀÇ¿¡¼­´Â »ï¼ºSDS¿Í ETRI °³¹ß Å° °øÀ¯ ÇÁ·ÎÅäÄÝ UPAKA-IBC(Unbalanced Password-Authenticated key Agreement with Identity-Based Cryptosystem)À» ISO/IEC 11770-4ÀÇ AMD1 ¹®¼­·Î ÁøÇàÇϱâ·Î °áÁ¤ÇØ ÇöÀç WD ´Ü°è·Î Çѱ¹ÀÇ ÀÌÇÊÁß ±³¼ö°¡ ¿¡µðÅ͸¦ ¸Ã¾Æ¼­ ÁøÇàÇÏ°í ÀÖ´Ù. ÀÌ È¸ÀÇ¿¡¼­ AMD1°ú º°µµ·Î 11770-4 AMD2¸¦ ¸ñÇ¥·Î ÀϺ»¿¡¼­ °³¹ßµÈ LRP-AKE¿Í RSA-AKE2°¡ Á¦¾ÈµÇ¾î SP·Î ½ÃÀ۵ƴÙ.

ÀÌ¿Í °°ÀÌ Çѱ¹Àº ISO/IEC JTC 1/SC 27/WG2(¾ÏÈ£±â¼ú) ºÐ¾ß¿¡¼­ ÁÖµµÀûÀ¸·Î Ç¥ÁØÈ­ È°µ¿À» ¼öÇàÇÏ°í ÀÖÀ¸¸ç, ÇâÈÄ¿¡µµ ±¹¸³ÀüÆÄ¿¬±¸¿øÀÇ Àü¹®À§¿øȸ µîÀ» ÅëÇÑ Ã¼°èÀû ´ëÀÀÀ¸·Î ¾ÏÈ£±â¼ú ºÐ¾ß ±¹Á¦Ç¥ÁØÈ­¸¦ ¼±µµÇØ ³ª°¥ °ÍÀ¸·Î º»´Ù.
[±Û_ ¼ÛÁ¤È¯ WG2 ±×·ìÀå/ÇѾç´ëÇб³ ±³¼ö(camp123@hanyang.ac.kr)]

<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(www.boannews.com) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>

  •  
  • 5
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö À§Áîµð¿£¿¡½º 2018
¼³¹®Á¶»ç
³»³â ȸ»ç¿¡ ²À µµÀÔÇÏ°í ½ÍÀº º¸¾È ¼Ö·ç¼Ç ¶Ç´Â Ç÷§ÆûÀº ¹«¾ùÀΰ¡¿ä?
XDR
EDR
AI º¸¾È
Á¦·ÎÆ®·¯½ºÆ®
°ø±Þ¸Á º¸¾È ü°è(SBOM)
Ŭ¶ó¿ìµå º¸¾È ¼Ö·ç¼Ç
±âŸ(´ñ±Û·Î)