• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¾çÀÚ³»¼º¾ÏÈ£¸¦ È°¿ëÇÑ °æ·® º¸¾È ÇÁ·ÎÅäÄÝ ¼³°è
¿µ¹®Á¦¸ñ(English Title) Design of a Lightweight Security Protocol Using Post Quantum Cryptography
ÀúÀÚ(Author) Kyung Bae Jang   Min Joo Sim   Hwa Jeong Seo   Àå°æ¹è   ½É¹ÎÁÖ   ¼­È­Á¤  
¿ø¹®¼ö·Ïó(Citation) VOL 09 NO. 08 PP. 0165 ~ 0170 (2020. 08)
Çѱ۳»¿ë
(Korean Abstract)
IoT (Internet of Things) ½Ã´ë°¡ È°¼ºÈ­µÇ¸é¼­ °³ÀÎÁ¤º¸¸¦ Æ÷ÇÔÇÑ ¸¹Àº Á¤º¸µéÀÌ IoT µð¹ÙÀ̽ºµéÀ» ÅëÇØ Àü´ÞµÇ°í ÀÖ´Ù. Á¤º¸º¸È£¸¦ À§ÇØ µð¹ÙÀ̽º³¢¸® »óÈ£ ¾ÏȣȭÇÏ¿© Åë½ÅÇÏ´Â °ÍÀÌ Áß¿äÇϸç IoT µð¹ÙÀ̽º Ư¼º»ó, ¼º´ÉÀÇ Á¦ÇÑÀ¸·Î ÀÎÇØ °æ·® º¸¾È ÇÁ·ÎÅäÄÝ »ç¿ëÀÌ ¿ä±¸µÈ´Ù. ÇöÀç º¸¾È ÇÁ·ÎÅäÄÝ¿¡¼­ »ç¿ëÇÏ´Â ¾ÏÈ£ ±â¹ýµéÀº ´ëºÎºÐ RSA, ECC (Elliptic Curve Cryptography)¸¦ »ç¿ëÇÏ°í ÀÖ´Ù. ÇÏÁö¸¸ °í»ç¾çÀÇ ¾çÀÚ ÄÄÇ»ÅÍ°¡ °³¹ßµÇ°í ¼î¾î ¾Ë°í¸®ÁòÀ» È°¿ëÇÑ´Ù¸é ¾Õ¼± RSA¿Í ECC°¡ ±Ù°ÅÇÏ´Â ¾ÈÁ¤¼ºÀÇ ¹®Á¦¸¦ ½±°Ô ÇØ°áÇÒ ¼ö Àֱ⠶§¹®¿¡ ´õ ÀÌ»ó »ç¿ëÇÒ ¼ö ¾ø´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â ¾çÀÚ ÄÄÇ»ÅÍÀÇ °è»ê´É·Â¿¡ ³»¼ºÀ» °¡Áö´Â º¸¾È ÇÁ·ÎÅäÄÝÀ» ¼³°èÇÏ¿´´Ù. ¹Ì±¹ NIST (National Institute of Standards and Technology) ¾çÀÚ³»¼º¾ÏÈ£ Ç¥ÁØÈ­ °ø¸ðÀüÀ» ÁøÇàÁßÀÎ ÄÚµå±â¹Ý¾ÏÈ£ ROLLO¸¦ »ç¿ëÇÏ¿´À¸¸ç, IoT µð¹ÙÀ̽º³¢¸®ÀÇ »óÈ£ Åë½ÅÀ» À§ÇØ ¿¬»ê ¼Ò¸ð°¡ ÀûÀº ÇؽÃ, XOR¿¬»êÀ» È°¿ëÇÏ¿´´Ù. ¸¶Áö¸·À¸·Î Á¦¾ÈÇÏ´Â ÇÁ·ÎÅäÄÝ°ú ±âÁ¸ ÇÁ·ÎÅäÄÝÀÇ ºñ±³ ºÐ¼® ¹× ¾ÈÀü¼º ºÐ¼®À» ½Ç½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.
Å°¿öµå(Keyword) IoT   Information Protection   Á¤º¸º¸È£   Lightweight Security Protocol   RSA   ECC   Quantum Computer   Standardization   NIST Post Quantum Cryptography   Code-Based Cryptography   ROLLO   °æ·® º¸¾È ÇÁ·ÎÅäÄÝ   ¾çÀÚ ÄÄÇ»ÅÍ   NIST ¾çÀÚ³»¼º¾ÏÈ£ Ç¥ÁØÈ­ °ø¸ðÀü   ÄÚµå±â¹Ý¾ÏÈ£  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå