Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¾çÀÚ³»¼º¾ÏÈ£¸¦ È°¿ëÇÑ °æ·® º¸¾È ÇÁ·ÎÅäÄÝ ¼³°è |
¿µ¹®Á¦¸ñ(English Title) |
Design of a Lightweight Security Protocol Using Post Quantum Cryptography |
ÀúÀÚ(Author) |
Kyung Bae Jang
Min Joo Sim
Hwa Jeong Seo
Àå°æ¹è
½É¹ÎÁÖ
¼ÈÁ¤
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 09 NO. 08 PP. 0165 ~ 0170 (2020. 08) |
Çѱ۳»¿ë (Korean Abstract) |
IoT (Internet of Things) ½Ã´ë°¡ È°¼ºÈµÇ¸é¼ °³ÀÎÁ¤º¸¸¦ Æ÷ÇÔÇÑ ¸¹Àº Á¤º¸µéÀÌ IoT µð¹ÙÀ̽ºµéÀ» ÅëÇØ Àü´ÞµÇ°í ÀÖ´Ù. Á¤º¸º¸È£¸¦ À§ÇØ µð¹ÙÀ̽º³¢¸® »óÈ£ ¾ÏÈ£ÈÇÏ¿© Åë½ÅÇÏ´Â °ÍÀÌ Áß¿äÇϸç IoT µð¹ÙÀ̽º Ư¼º»ó, ¼º´ÉÀÇ Á¦ÇÑÀ¸·Î ÀÎÇØ °æ·® º¸¾È ÇÁ·ÎÅäÄÝ »ç¿ëÀÌ ¿ä±¸µÈ´Ù. ÇöÀç º¸¾È ÇÁ·ÎÅäÄÝ¿¡¼ »ç¿ëÇÏ´Â ¾ÏÈ£ ±â¹ýµéÀº ´ëºÎºÐ RSA, ECC (Elliptic Curve Cryptography)¸¦ »ç¿ëÇÏ°í ÀÖ´Ù. ÇÏÁö¸¸ °í»ç¾çÀÇ ¾çÀÚ ÄÄÇ»ÅÍ°¡ °³¹ßµÇ°í ¼î¾î ¾Ë°í¸®ÁòÀ» È°¿ëÇÑ´Ù¸é ¾Õ¼± RSA¿Í ECC°¡ ±Ù°ÅÇÏ´Â ¾ÈÁ¤¼ºÀÇ ¹®Á¦¸¦ ½±°Ô ÇØ°áÇÒ ¼ö Àֱ⠶§¹®¿¡ ´õ ÀÌ»ó »ç¿ëÇÒ ¼ö ¾ø´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼´Â ¾çÀÚ ÄÄÇ»ÅÍÀÇ °è»ê´É·Â¿¡ ³»¼ºÀ» °¡Áö´Â º¸¾È ÇÁ·ÎÅäÄÝÀ» ¼³°èÇÏ¿´´Ù. ¹Ì±¹ NIST (National Institute of Standards and Technology) ¾çÀÚ³»¼º¾ÏÈ£ Ç¥ÁØÈ °ø¸ðÀüÀ» ÁøÇàÁßÀÎ ÄÚµå±â¹Ý¾ÏÈ£ ROLLO¸¦ »ç¿ëÇÏ¿´À¸¸ç, IoT µð¹ÙÀ̽º³¢¸®ÀÇ »óÈ£ Åë½ÅÀ» À§ÇØ ¿¬»ê ¼Ò¸ð°¡ ÀûÀº ÇؽÃ, XOR¿¬»êÀ» È°¿ëÇÏ¿´´Ù. ¸¶Áö¸·À¸·Î Á¦¾ÈÇÏ´Â ÇÁ·ÎÅäÄÝ°ú ±âÁ¸ ÇÁ·ÎÅäÄÝÀÇ ºñ±³ ºÐ¼® ¹× ¾ÈÀü¼º ºÐ¼®À» ½Ç½ÃÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.
|
Å°¿öµå(Keyword) |
IoT
Information Protection
Á¤º¸º¸È£
Lightweight Security Protocol
RSA
ECC
Quantum Computer
Standardization
NIST Post Quantum Cryptography
Code-Based Cryptography
ROLLO
°æ·® º¸¾È ÇÁ·ÎÅäÄÝ
¾çÀÚ ÄÄÇ»ÅÍ
NIST ¾çÀÚ³»¼º¾ÏÈ£ Ç¥ÁØÈ °ø¸ðÀü
ÄÚµå±â¹Ý¾ÏÈ£
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|