Ȩ > Ç¥ÁØÈ Âü¿© > TTA°£Ç๰ > ICT Standard Weekly
[Á¤º¸º¸È£] ºí·Ï¾ÏÈ£¾Ë°í¸®Áò ±¹Á¦Ç¥ÁØÈ ÇöȲ
ISO/IEC JTC1/SC27 WG2 (Cryptography and Security Mechanisms) ¼Ò°³
ISO¿Í IEC°¡ °øµ¿À¸·Î ¸¸µé¾î 1987³âºÎÅÍ ¿î¿µÇϰí ÀÖ´Â JTC1(Joint Technical Committee 1)Àº IT(Information Technology)À» ´Ù·ç°í ÀÖ°í, °°Àº ½Ã±â¿¡ SC20 (Sub-Committee 20 - Data cryptographic techniques)À» ¸¸µé¾úÀ¸³ª, 1989³â 6¿ù JTC1 ÃÑȸ¿¡¼ º¸´Ù ³ÐÀº ¹üÀ§ÀÇ º¸¾È Ç¥ÁØÈ¸¦ À§ÇÏ¿© SC27 (IT security techniques)·Î È®´ë °³ÆíÀ» °áÁ¤ÇÏ¿© 1990³â 4¿ùºÎÅÍ 3°³ÀÇ WG(Working Group)À¸·Î ½ÃÀÛÇÏ¿´´Ù°¡ 2006³â 5¿ùºÎÅÍ 2°³¸¦ ´õÇØ ÇöÀç 5°³ÀÇ WG¸¦ ¿î¿µÇϰí ÀÖ´Ù. ±× Áß ISO/IEC JTC1/SC27 WG2(ÀÌÇÏ WG2)´Â Cryptography and Security Mechanisms¶ó´Â Á¦¸ñÀ¸·Î ¿ø·¡ÀÇ SC20°ú °ÅÀÇ °°Àº ¸ñÀûÀ» °®°í ÀÖ´Ù.
ISO/IEC 9979 (Procedures for the registration of cryptographic algorithms)
¿ø·¡ ¾ÏÈ£¾Ë°í¸®ÁòÀº Ç¥ÁØÈÀÇ ´ë»ó¿¡¼ Á¦¿ÜµÇ¾ú¾ú´Ù. ±×·¡¼ WG2¿¡¼´Â Ç¥ÁØÈÀÇ ´ë¾ÈÀ¸·Î ´ÜÁö µî·Ï¸¸ Çϱâ·Î ÇØ¼ µî·Ï ÀýÂ÷¿¡ ´ëÇÑ Ç¥ÁØÀ» 1999³â 4¿ù ISO/IEC 9979 (Procedures for the registration of cryptographic algorithms)·Î ¸¸µé¾ú´Ù. ±×·¡¼ Çѵ¿¾È ¿µ±¹ÀÇ BSI(British Standards Institution)¿¡¼ ¸Ã¾Æ µî·ÏÇØ ¿À´Ù°¡, ÇüÆí¾øÀÌ ³ª»Û ¾ÏÈ£¾Ë°í¸®Áòµµ µî·ÏµÇ´Â µî, º°·Î È¿°úµµ ¾ø°í, ¶ÇÇÑ ±¹Á¦ÀûÀ¸·Î ¾ÏÈ£¾Ë°í¸®ÁòÀÌ Ç¥ÁØÈµÉ Çʿ信 °ø°¨ÇÏ¿© ISO/IEC 18033 (Encryption algorithms)À» Ç¥ÁØÈÇÑ ÀÌÈÄ¿¡ ISO/IEC 9979´Â 2005³â 6¿ù öȸµÇ¾ú´Ù
ISO/IEC 18033 (Encryption algorithms)
ISO/IEC 18033´Â 1999³â 10¿ù ¹Ì±¹ ȸÀÇ¿¡¼ GBÀÇ Á¦¾ÈÀ¸·Î NWI(New Work Item) ProposalÀ» ³»¼ Åë°úµÈ °úÁ¦·Î Part 1: General (1sted 2005³â 08¿ù, 2nded 2015³â 08¿ù), Part 2: Asymmetric ciphers (1sted 2006³â 05¿ù, AMD1(Amendment 1) ÀÛ¾÷ Áß), Part 3: Block ciphers (¾Æ·¡¿¡ »ó¼¼ ¼³¸í), Part 4: Stream ciphers (1sted 2005³â 07¿ù, 2nded 2011³â 12¿ù)ÀÇ 4°³ÀÇ part·Î ½ÃÀ۵Ǿú´Ù°¡, 2011³â 04¿ù ½ÃÀÛµÈ Part 5: Identity-based ciphers (1sted 2015³â 12¿ù)°ú 2014³â 4¿ù ½ÃÀÛµÈ Part 6: Homomorphic encryption(¾ÆÁ÷ WD(working draft)»óÅÂ)¸¦ Ãß°¡ÇÏ¿´´Ù.
ISO/IEC 18033-3 (Encryption algorithms - Block ciphers) – 1st edition
ISO/IEC 18033-3 (Encryption algorithms - Block ciphers)´Â °¡Àå ¸¹Àº °ü½ÉÀ» ¹ÞÀº °úÁ¦¿´´Ù. ƯÈ÷ ¹Ì±¹¿¡¼ 1976³â DES (Data Encryption Standard)¸¦ ¼±ÅÃÇßÀ» ¶§¿Í ´Þ¸® 1997³â¿¡ ½ÃÀÛÇÏ¿© 2000³â±îÁö ÁøÇàµÈ AES (Advanced Encryption Standard) ¼±Åà °úÁ¤Àº Àü ¼¼°è¸¦ ´ë»óÀ¸·Î Çß°í, º¸´Ù openµÈ ºÐÀ§±â¿´±â ¶§¹®¿¡, WG2¿¡¼µµ ¸¹Àº NB(National Body, NBÀÇ À̸§Àº ISO 3166-1-alpha-2 code·Î Ç¥½Ã)µéÀÌ °ü½ÉÀ» º¸À̸ç ÀÚ±¹ÀÇ ¾ÏÈ£¾Ë°í¸®ÁòÀ» ±¹Á¦Ç¥ÁØÈ ÇÏ·Á°í ³ë·ÂÇß´Ù. 2000³â 3¿ù CA´Â CAST-128À», JP´Â CIPHERUNICORN-A, MARS, MISTY1, Hierocrypt, MULTI-S01, Camellia¸¦, KRÀº SEED¸¦, NO´Â AES¸¦, US´Â MARS, RC6, Rijndael(=AES), Serpent, Twofish¸¦ Æ÷ÇÔ½Ã۱⸦ ¿øÇÏ´Â NB Contributions ¹®¼ N2530¸¦ ³Â´Ù. ±× ÀÌÈÄ »ó´çÈ÷ ¿À·£ ±â°£ÀÇ ³íÀǸ¦ °ÅÃÄ 64-bit block cipher·Î´Â TDEA(Triple Data Encryption Algorithm, Àϸí 3DES), MISTY1, CAST-128ÀÌ, 128-bit block cipher·Î´Â Rijndael(=AES), Camellia, SEED°¡ ¼±ÅõǾî 2005³â 07¿ù¿¡ 1stedÀÌ ÃâÆÇµÇ¾ú´Ù. 1998³â¿¡ °³¹ßµÈ KRÀÇ SEED¸¦ ISO/IEC 18033-3¿¡ Æ÷ÇÔ½ÃŲ µ¥¿¡´Â KISAÀÇ Àü¹®°¡µé°ú ƯÈ÷ ´ç½Ã Çѱ¹ WG2 À§¿øÀåÀ» ¸Ã°í ÀÖ´ø °æµ¿´ëÀÇ Àåû·æ ±³¼ö°¡ ¸¹Àº ³ë·ÂÀ» Çß´Ù. ±× ÈÄ SEEDÀÇ Ç¥Çö¿¡ ¿À·ù°¡ ¹ß°ßµÇ¾î, º»ÀÎÀÌ Editor°¡ µÇ¾î COR2(Corrigendum 2) ¸¦ 2007³â 09¿ù¿¡ ÃâÆÇÇß´Ù.
ISO/IEC 18033-3 (Encryption algorithms - Block ciphers) – 2nd edition
ÇÑÆí 2003³â¿¡ ±¹³»¿¡¼ °³¹ßµÈ ARIA´Â AES¿¡ ºñÇØ »ç¼ÒÇÑ ÀåÁ¡¸¸À» °¡Áö°í ÀÖ¾ú±â ¶§¹®¿¡, ISO/IEC 18033-3¿¡ Æ÷Ç﵃ timingÀ» ³õÃÆ´Ù. ±×·¯³ª 2005³â¿¡ °³¹ßµÈ HIGHT¸¦ ±¹Á¦Ç¥ÁØÈ ½ÃŰ°í ½Í¾ú´Âµ¥, 2006³â 5¿ù JTC1ÀÇ ¿äûÀ¸·Î Low Power EncryptionÀ̶ó´Â Á¦¸ñÀ¸·Î WG2_SP(Study Period)¸¦ ½ÃÀÛÇß´Ù°¡ 2007³â 10¿ù Lightweight cryptography ·Î Á¦¸ñÀ» ¹Ù²Ù°í 2009³â 5¿ù¿¡¼¾ß NWI ProposalÀ» ³»¼ Åë°úµÈ ISO/IEC 20192°¡ ¹æÇâÀ» ÀâÁö ¸øÇÏ°í ½Ã°£À» ²ô´Â µ¿¾È, 2008³â 8¿ù FRÀÌ present¸¦ Æ÷ÇÔ½Ã۱â À§ÇØ Á¦ÃâÇÑ ÀÚ·á¿¡ HIGHT°¡ 3000 GE(Gate Equivalent)¶ó´Â ÀÛÀº space·Î ±¸ÇöÇßÀ» ¶§, AES¿¡ ºñÇØ ¾à 500¹èÀÇ ThroughputÀ» º¸Àδٴ ÀåÁ¡À» ºÎ°¢½ÃÄ×´Ù. ±×·¡¼ KRÀº 2008³â 10¿ù ISO/IEC 18033-3ÀÇ periodic pre-review¿¡ 3°ÇÀÇ CORµµ ÀÖÀ¸´Ï, HIGHT¸¦ Æ÷ÇÔ½ÃÄÑ revisionÀ» ³»ÀÚ°í ÁÖÀåÇß°í, Åë°úµÇ¾î º»ÀÎ editor°¡ µÇ¾î ´Ü 1¹ø¾¿ÀÇ, WD, CD (Committee Draft), FCD (Final CD), FDIS(Final Draft International Standard)¸¦ °ÅÃÄ 2010³â 12¿ù¿¡ 2ndedÀÌ ÃâÆÇµÇ¾ú´Ù. ÇÑÆí 2009³â 5¿ù RU°¡ ¡°GOST R 34.11-2012¡±¸¦ ISO/IEC 18033-3ÀÇ AMD1À¸·Î ³ÖÀÚ°í ÁÖÀåÇÏ¿© ÀÏ´Ü ±×·¸°Ô Çϱâ·Î °áÁ¤µÇ¾ú´Ù°¡ NBµéÀÇ ½ÉÇÑ ¹Ý´ë¿¡ 1stWD±îÁö¸¸ ³» ³õ°í NB Letter BallotÀ» °ÅÃÄ AMD¸¦ ÁßÁöÇϰí ÃßÈÄ ´Ù½Ã ³íÀÇÇÏÀÚ°í °áÁ¤µÇ¾ú´Ù.
RussiaÀÇ Kuznyechik Ãß°¡ ¿äû
±×·±µ¥ ISO/IEC 18033-3ÀÇ 2nded¿¡ ´ëÇÑ 2016³â ÃÊÀÇ systematic review¿¡ RU´Â 2013³â¿¡ ¹ßÇ¥µÇ¾î 2015³â¿¡ RUÀÇ ±¹³» Ç¥ÁØ ¡°GOST R 34.12-2015¡±ÀÌ µÈ Kuznyechik¸¦ ISO/IEC 18033-3¿¡ AMDÇÏÀÚ°í ÁÖÀåÇß´Ù. ȸÀÇ µµÁß ¹Ì¸® ¹èÆ÷µÇÁö´Â ¾ÊÀº TP¸¦ º¸¿©ÁÖ¸ç 128-bit block, 256-bit key (key schedule 32 round Feistel), 8-bit S-box same as GOST R 34.11-2012, XSL-cipher, MDS linear mapping by LFSR, 9.5 rounds, security margin > 30%, ~336 MB/s (9.8 cpb) on Intel (R) Core (TM) i5-6500 CPU A@ 3.2 GHz ÀÇ implementation result°¡ ÀÖ´Ù°í Çß°í, Known Cryptanalyses·Î´Â IEICE Trans¿¡ ¹ßÇ¥µÈ 5 round¿¡ ´ëÇÑ Meet in the Middle Attack°ú CTCrypt 2015¿¡ Fault analysis¿¡ ´ëÇÑ ³í¹®°ú, °°Àº °÷¿¡ ¹ßÇ¥µÈ °£Á¢ÀûÀ¸·Î °ü·ÃµÈ ³í¹®, µµÇÕ 3°³¸¸À» º¸¿´´Ù. CTCryptology(Current Trends in Cryptology)¶ó´Â annual conference´Â 2012³â¿¡ ½ÃÀÛÇÑ, paper´Â ¿µ¾î·Î ¾²°í, official language´Â ¿µ¾î¿Í ·¯½Ã¾Æ¾îÀÎ, ÁØ ±¹Á¦ conferenceÀÌ´Ù. 2014³â±îÁö´Â PC chair´Â ¹°·Ð PC membersµµ Àü¿ø RUÀÎÀ̾ú°í, 2015³â¿¡´Â 13¸í Áß ¿Ü±¹ÀÎ PC member¸¦ 2¸í, 2016³â¿¡´Â 19¸í Áß 4¸íÀ¸·Î Á¶±ÝÀº ´õ ±¹Á¦È¸¦ ÇØ ³ª°¡´Â µí. (http://tc26.ru/CTCrypt/2015/) ¿ö³« ¹Ì¸® ¾òÀ» ¼ö ¾ø¾ú´ø Á¤º¸¿´±â¿¡ ÁÂÁß¿¡¼ ³ª¿Â Áú¹®Àº Ưº°ÇÑ °ÍÀº ¾ø¾ú°í, WG2_SP 'Inclusion of the block cipher Kuznyechik in ISO/IEC 18033-3'¸¦ establishÇϰí, Call for ContributionÀ» ³»´Â °ÍÀ» °áÁ¤Çϰí ȸÀǸ¦ ¸¶ÃÆ´Ù.
°á·Ð - Çѱ¹ÀÇ LEA Ãß°¡ÀÇ ¹Ý¸é±³»ç·Î
º»ÀÎÀÇ °ßÇØ·Î´Â Kuznyechik¶ó´Â Cipher ÀÚü¿¡ ´ëÇÑ Á¤º¸µµ ÃæºÐÇÏÁö ¾Ê°í, ºÐ¼® ³í¹®µµ ÃæºÐÇÏÁö ¾Ê°í, WG2¿¡¼´Â RUÀÇ ±¹³»Ç¥ÁØÀ» ±¹Á¦Ç¥ÁØÈ ÇÏ´Â µ¥¿¡ º°·Î È£ÀÇÀûÀÌÁö ¾Ê¾Ò´ø Àü·Ê°¡ ÀÖ´ø ¹Ù, KuznyechikÀÌ ISO/IEC 18033-3¿¡ Ãß°¡µÉ °¡´É¼ºÀº º°·Î ¾ø´Ù°í »ý°¢µÈ´Ù. Çѱ¹¿¡¼ LEA¸¦ ISO/IEC 29192-2(Lightweight cryptography – Block Cipher)¿¡ Ãß°¡½ÃŰ°í ½Í¾îÇϴµ¥ KuznyechikÀÇ °æ¿ì¸¦ ÁÁÀº ¹Ý¸é±³»ç·Î »ïÀ» ¼ö ÀÖÀ» °Í °°´Ù.