°æ·® ºí·Ï, ÀÏ¹Ý ºí·Ï, Çüź¸Á¸ ¾ÏÈ£, Å° ¼³Á¤ ±â¹ý Ç¥ÁØÈ µî ÃßÁø
±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼ °³¹ßÇÑ °æ·® Ç¥ÁØ ºí·Ï ¾ÏÈ£ LEA, ÇâÈÄ Ç¥ÁØÈ ¿¹»ó
[º¸¾È´º½º= ¼ÛÁ¤È¯ ISO/IEC JTC 1/SC 27/WG2 ±×·ìÀå] ISO/IECÀÇ WG2(Working Group 2)´Â ¾ÏÈ£ ¾Ë°í¸®Áò µî ´Ù¾çÇÑ º¸¾È±â¼ú ¹× ±¸Çö ¸ÞÄ¿´ÏÁò¿¡ °ü·ÃµÈ Ç¥ÁØÀ» °³¹ßÇϱâ À§ÇÑ ÀÛ¾÷ ±×·ìÀÌ´Ù. ¿À·£ ±â°£ Áö¼ÓÀûÀ¸·Î WG2¿¡¼ È°µ¿ÇÑ °á°ú Çѱ¹ÀÌ °³¹ßÇÑ ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò SEED, HIGHT°¡ ÀÏ¹Ý ºí·Ï ¾ÏÈ£¸¦ ´Ù·ç°í ÀÖ´Â ISO/IEC 18033-3 ±¹Á¦Ç¥ÁØ¿¡ ¹Ý¿µÇßÀ¸¸ç, ÃÖ±Ù Çѱ¹ÀÇ °æ·® ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò LEA(Lightweight Encryption Algorithm)ÀÇ °æ¿ì ISO/IEC 29192-2 ±¹Á¦Ç¥ÁØ ¹Ý¿µÀ» ÃßÁøÇÏ´Â µî ¿Õ¼ºÇÑ Ç¥ÁØÈ È°µ¿À» ÇÏ°í ÀÖ´Ù.
[À̹ÌÁö=¾ÆÀÌŬ¸¯¾ÆÆ®]
1. °æ·® ºí·Ï ¾ÏÈ£ Ç¥ÁØÈ
°æ·® ºí·Ï ¾ÏÈ£¸¦ ´Ù·ç´Â ISO/IEC 29192-2¿¡¼´Â ¹Ì±¹ÀÇ SIMON/SPECK°ú Çѱ¹ÀÇ LEA°¡ ¼·Î º°µµ·Î µÎ °³ÀÇ ¹®¼(Amendment, ÀÌÇÏ AMD)·Î Ç¥ÁØÈ°¡ ÁøÇàµÇ°í ÀÖ´Ù. ¹Ì±¹ÀÇ SIMON/SPECKÀº 2016³â 53Â÷(10¿ù UAE ¾ÆºÎ´Ùºñ)°ú 2017³â 54Â÷(4¿ù ´ºÁú·£µå ÇعÐÅÏ), 55Â÷(11¿ù µ¶ÀÏ º£¸¦¸°) µÎ Â÷·ÊÀÇ ISO/IEC SC27 ȸÀǸ¦ ÅëÇؼ ¼¼ ¹ø° PDAM(Proposed Draft Amendment)À¸·Î ÁøÇàÀÌ Áö¿¬µÇ°í ÀÖ´Ù.
º§±â¿¡, À̽º¶ó¿¤ µî ¸î °³ ±¹°¡¿¡¼ SIMON/SPECK ¼³°è»ç»óÀ» °ø°³Ç϶ó´Â ÀÇ°ßÀ» Á¦½ÃÇÔ¿¡ µû¶ó ¹Ì±¹ ±¹°¡¾Èº¸±¹(NSA: National Security Agency)¿¡¼´Â ¼³°è»ç»ó°ú 128ºñÆ® ¹Ì¸¸ÀÇ Æò¹®/¾ÏÈ£¹®À» ó¸®ÇÏ´Â ±Ô°ÝµéÀ» Ç¥ÁØÈ ÁøÇà °úÁ¤¿¡¼ öȸÇßÀ¸³ª, À§ µÎ ±¹°¡¿¡¼´Â NSA¿¡ ´ëÇÑ ¸·¿¬ÇÑ ÀǽÉÀ» Áö¼ÓÀûÀ¸·Î Á¦±âÇÏ°í ÀÖ´Ù.
¹Ý¸é, Çѱ¹ ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼ °³¹ßÇÑ °æ·® Ç¥ÁØ ºí·Ï ¾ÏÈ£ LEA´Â 54Â÷ ȸÀÇ¿¡¼ ¼øÁ¶·Ó°Ô WD(Working Draft) ´Ü°è·Î ÁøÇàµÇ¾ú°í, 55Â÷ ȸÀÇ¿¡¼´Â ¹Ý´ë ¾øÀÌ ¸¸ÀåÀÏÄ¡·Î LEA°¡ PDAM ´Ü°è·Î ÁøÇàµÆ´Ù. LEA¿¡ ´ëÇÑ Ç¥ÁØÈ ÁøÇàÀº ±¹¹Î´ëÇб³ ±èµ¿Âù ±³¼ö°¡ ¿¡µðÅÍ ¿ªÇÒÀ» ÇÏ°í ÀÖÀ¸¸ç, 2018³â ¸» ȤÀº 2019³â ÃÊ¿¡ ISO Ç¥ÁØÀ¸·Î ¼øÁ¶·Ó°Ô È®Á¤µÉ °ÍÀ¸·Î ¿¹»óµÈ´Ù.
2. ÀÏ¹Ý ºí·Ï ¾ÏÈ£ Ç¥ÁØÈ
ÀÏ¹Ý ºí·Ï ¾ÏÈ£¸¦ Ç¥ÁØÈÇÏ°í ÀÖ´Â ISO/IEC 18033-3¿¡¼´Â °æ·® ºí·Ï ¾ÏÈ£ 29192-2¿¡¼ ÁøÇàµÇ°í ÀÖ´Â °Í°ú °°ÀÌ ¼·Î ´Ù¸¥ µÎ °³ÀÇ ºí·Ï ¾ÏÈ£ÀÎ ·¯½Ã¾ÆÀÇ Kuznechik°ú Áß±¹ÀÇ SM4°¡ Ç¥ÁØÈ ÀÛ¾÷À» ÁøÇà ÁßÀÌ´Ù. ·¯½Ã¾Æ ¿¬¹æÇ¥ÁØ ºí·Ï ¾ÏÈ£ KuznyechikÀº 54Â÷ ȸÀÇ¿¡¼ Ưº°ÇÑ ¹Ý´ë ¾øÀÌ PDAM ´Ü°è·Î ÁøÇàµÆ°í, 55Â÷ ȸÀÇ¿¡¼ DAM(Draft Amendment) ´Ü°è·Î ÃßÁøµÆ´Ù.
SM4´Â Áß±¹ÀÇ Ç¥ÁØ ¹«¼±·£ WAPI(Wired Authentication and Privacy Infrastructure)¿¡ »ç¿ëµÇ´Â SMS4¿¡¼ À̸§À» º¯°æÇÑ ºí·Ï ¾ÏÈ£ÀÌ´Ù. WAPI´Â Áß±¹ÀÇ ¹«¼±·£ ½ÃÀå¿¡¼ ²ÙÁØÈ÷ ¾²¿©¿Â ±â¼úÀ̸ç, 2006³â ISO/IEC SC31(ÀÚµ¿½Äº° ¹× µ¥ÀÌÅÍ È¹µæ)¿¡¼ SMS4·Î Ç¥ÁØÈ ½Ãµµ¸¦ ÇßÁö¸¸ ½ÇÆÐÇß´Ù. ±×·¯´Ù 2016³â ISO/IEC SC27À» ÅëÇØ Ç¥ÁØÈ°¡ ½ÃÀ۵ƴÙ.
SM4´Â ¹Ì±¹ Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST)¿¡¼ Á¦Á¤ÇÑ AES(Advanced Encryption Standard)¿Í ºñ±³ÇØ ¼º´É ¿ì¼ö¼ºÀÌ ¾ø´Ù°í Æò°¡µÈ´Ù. ƯÈ÷, SM4°¡ ÀϺΠÇ÷§Æû¿¡¼ AES ´ëºñ 60%ÀÇ ¼Óµµ°¡ ³ª¿À´Â µî(CRYPTO++ ¶óÀ̺귯¸®, PC) AES ´ëºñ ¼º´É ¿ì¼ö¼º Áõ°Å°¡ ¹ÌÈíÇÏ´Ù´Â ³»¿ëÀ» 54Â÷ ȸÀÇ Àü¿¡ Çѱ¹¿¡¼ ÁöÀûÇß´Ù.
±×·¯³ª SM4°¡ Áß±¹ »ê¾÷ Àü¹Ý¿¡ ¸¹ÀÌ »ç¿ëµÇ°í ÀÖ°í, Áß±¹ Ãø¿¡¼ AES ´ëºñ ¼º´É ÃøÁ¤ °á°ú¿¡ ´ëÇÑ Áõ°ÅÀڷḦ Ãß°¡·Î Á¦½ÃÇßÀ¸¸ç, SM4°¡ 18033-1ÀÇ ºí·Ï ¾ÏÈ£ ÀÚ°ÝÁ¶°ÇÀ» ¸¸Á·ÇÑ´Ù´Â Á¡À» ÁÖÀåÇß´Ù. 54Â÷ ȸÀǸ¦ ÅëÇؼ SM4¿¡ °üÇÑ ¿¬±¸±â°£(Study Period, ÀÌÇÏ SP)À» Á¾·áÇÏ°í, AMD2ÀÇ Ã¹ ¹ø° WD·Î Ç¥ÁØÈ ÁøÇàÀÌ °áÁ¤µÆ´Ù. ±×¸®°í 55Â÷ ȸÀÇ¿¡¼ PDAM ´Ü°è·Î ÁøÇàµÆ´Ù.
3. Çüź¸Á¸ ¾ÏÈ£ Ç¥ÁØÈ
Çüź¸Á¸ ¾ÏÈ£ FPE(Format Preserving Encryption)Àº ¾ÏÈ£¹®°ú Æò¹®ÀÇ ÇüÅÂ(format)¸¦ º¸Á¸Çϱâ À§ÇÑ ¾ÏÈ£±â¼úÀ̸ç, »ê¾÷°è(ƯÈ÷ DB ¾ÏÈ£È) È°¿ëÀ» ¸ñÀûÀ¸·Î ÇÏ´Â ºí·Ï ¾ÏÈ£ÀÇ ÇÑ Á¾·ù´Ù. 2015³â Çѱ¹¿¡¼ SC27 Roadmap¿¡ Çüź¸Á¸ ¾ÏÈ£¿¡ °üÇÑ ÀÇ°ßÀ» Á¦½ÃÇßÀ¸³ª, ´ç½Ã Çѱ¹¿¡¼ °³¹ßÇÑ Çüź¸Á¸ ¾ÏÈ£ÀÎ FEA(Format-Preserving Encryption Algorithm, 2015³â ICISC¿¡¼ ¹ßÇ¥)°¡ ¹ßÇ¥µÈ Áö 3³âÀÌ Áö³ªÁö ¾Ê¾Ò±â ¶§¹®¿¡ Àû±Ø ÁøÇàµÇÁö ¸øÇß´Ù.
Áö³ÇØ 55Â÷ ȸÀÇ¿¡¼ SP ¡®State-of—the-art of symmetric key primitives and related modes of operation¡¯¿¡ ´ëÇÑ ÀÇ°ß¼ö·Å °á°ú, Çѱ¹ Ãø¿¡¼ ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò¿¡¼ °³¹ßÇÏ°í Çѱ¹ÀÇ TTA ´ÜüǥÁØÀ¸·Î Á¦Á¤µÈ FEA°¡ ¾ð±ÞµÆ´Ù. ÀÌ¿¡ µû¶ó SP ¡®Suitability of standardization of format-preserving encryption schemes in ISO/IEC standards¡¯·Î Çüź¸Á¸ ¾ÏÈ£ÀÇ Ç¥ÁØÈ ÀûÇÕ¼º ÆÇ´ÜÀ» ¿ì¼± ½ÃÀÛÇÏ°Ô µÆ´Ù. ÇöÀç Çѱ¹ Ãø¿¡¼ Rapporteur·Î ¼±Á¤µÇ¾î Çѱ¹¿¡¼ ÁÖµµÀûÀ¸·Î Çüź¸Á¸ ¾ÏÈ£¿¡ °üÇÑ Ç¥ÁØÈ°¡ ÁøÇàµÇ¸®¶ó ±â´ëÇÏ°í ÀÖ´Ù.
4. Å° ¼³Á¤ ±â¹ý Ç¥ÁØÈ
ISO/IEC 11770-4´Â weak secret¿¡ ±â¹ÝÇÑ Å° ¼³Á¤ ±â¹ý¿¡ °üÇÑ Ç¥ÁØÈÀÌ´Ù. 2016³â 53Â÷ ȸÀÇ¿¡¼ SP ¡®Key establishment mechanisms between parties with unbalanced security requirement¡¯·Î ½ÃÀ۵ưí Áö³ÇØ 54Â÷ ȸÀÇ¿¡¼´Â »ï¼ºSDS¿Í ETRI °³¹ß Å° °øÀ¯ ÇÁ·ÎÅäÄÝ UPAKA-IBC(Unbalanced Password-Authenticated key Agreement with Identity-Based Cryptosystem)À» ISO/IEC 11770-4ÀÇ AMD1 ¹®¼·Î ÁøÇàÇϱâ·Î °áÁ¤ÇØ ÇöÀç WD ´Ü°è·Î Çѱ¹ÀÇ ÀÌÇÊÁß ±³¼ö°¡ ¿¡µðÅ͸¦ ¸Ã¾Æ¼ ÁøÇàÇÏ°í ÀÖ´Ù. ÀÌ È¸ÀÇ¿¡¼ AMD1°ú º°µµ·Î 11770-4 AMD2¸¦ ¸ñÇ¥·Î ÀϺ»¿¡¼ °³¹ßµÈ LRP-AKE¿Í RSA-AKE2°¡ Á¦¾ÈµÇ¾î SP·Î ½ÃÀ۵ƴÙ.
ÀÌ¿Í °°ÀÌ Çѱ¹Àº ISO/IEC JTC 1/SC 27/WG2(¾ÏÈ£±â¼ú) ºÐ¾ß¿¡¼ ÁÖµµÀûÀ¸·Î Ç¥ÁØÈ È°µ¿À» ¼öÇàÇÏ°í ÀÖÀ¸¸ç, ÇâÈÄ¿¡µµ ±¹¸³ÀüÆÄ¿¬±¸¿øÀÇ Àü¹®À§¿øȸ µîÀ» ÅëÇÑ Ã¼°èÀû ´ëÀÀÀ¸·Î ¾ÏÈ£±â¼ú ºÐ¾ß ±¹Á¦Ç¥ÁØȸ¦ ¼±µµÇØ ³ª°¥ °ÍÀ¸·Î º»´Ù.
[±Û_ ¼ÛÁ¤È¯ WG2 ±×·ìÀå/ÇѾç´ëÇб³ ±³¼ö(camp123@hanyang.ac.kr)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(www.boannews.com) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>