chapter 6 contemporary symmetric ciphers

39
Chapter 6 Contemporary Symmetric Ciphers

Upload: xantha-dennis

Post on 04-Jan-2016

65 views

Category:

Documents


1 download

DESCRIPTION

Chapter 6 Contemporary Symmetric Ciphers. Overview. 1.Double DES 2.Triple DES(Two Key and Three Key) 3.Block Cipher Modes of Operation 4. RC5. 1. Doublie DES. Triple DES Brute-frorce ๊ณต๊ฒฉ์— DES ์˜ ์ž ์žฌ์ ์ธ ์ทจ์•ฝ์ ์œผ๋กœ ์ธํ•ด ๊ทธ ๋Œ€์•ˆ์„ ์ฐพ๋Š” ๊ฒƒ์ด ๊ณ ๋ ค๋จ . ์™„์ „ํžˆ ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์„ค๊ณ„ DES ์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ Key ๋ฅผ ์—ฌ๋Ÿฌ ๋ฒˆ ์‚ฌ์šฉ Double DES - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 6 Contemporary Symmetric Ciphers

Chapter 6Contemporary Symmetric Ciphers

Page 2: Chapter 6 Contemporary Symmetric Ciphers

2Network & Information Security LabNetwork & Information Security Lab

Overview

1.Double DES 2.Triple DES(Two Key and Three Key) 3.Block Cipher Modes of Operation 4. RC5

Page 3: Chapter 6 Contemporary Symmetric Ciphers

3Network & Information Security LabNetwork & Information Security Lab

Triple DES Brute-frorce ๊ณต๊ฒฉ์— DES ์˜ ์ž ์žฌ์ ์ธ ์ทจ์•ฝ์ ์œผ๋กœ ์ธํ•ด ๊ทธ ๋Œ€์•ˆ์„

์ฐพ๋Š” ๊ฒƒ์ด ๊ณ ๋ ค๋จ . ์™„์ „ํžˆ ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์„ค๊ณ„ DES ์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ Key ๋ฅผ ์—ฌ๋Ÿฌ ๋ฒˆ ์‚ฌ์šฉ

Double DES ๋ณต์ˆ˜ ์•”ํ˜ธํ™”์˜ ๊ฐ€์žฅ ๋‹จ์ˆœํ•œ ๋ฐฉ๋ฒ•์€ ๋‘๋ฒˆ์˜ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•๊ณผ ๋‘๊ฐœ์˜

ํ‚ค๋ฅผ ๊ฐ€์ง€๋Š” ๊ฒƒ . Encryption

C = Ek2[Ek1[P]]

Ciphertext plaintext

Key

1. Doublie DES

Page 4: Chapter 6 Contemporary Symmetric Ciphers

4Network & Information Security LabNetwork & Information Security Lab

Double DES ์˜ ํ˜•ํƒœ

1. Doublie DES

Page 5: Chapter 6 Contemporary Symmetric Ciphers

5Network & Information Security LabNetwork & Information Security Lab

2. Triple DES

Page 6: Chapter 6 Contemporary Symmetric Ciphers

6Network & Information Security LabNetwork & Information Security Lab

Reduction to a Single Stage 2 ๊ฐœ์˜ ํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜๋Š” DES ์˜ ๊ฒฝ์šฐ 56Bit Key ๊ฐ’์„ ๊ฐ€์ง€๋Š” ๋‘ Key K1 ๊ณผ K2 ๊ฐ€

์ฃผ์–ด์ง„๋‹ค๋ฉด ๊ฐ„๋‹จํ•˜๊ฒŒ K3 ์˜ Key ๋ฅผ ์ฐพ์„ ์ˆ˜ ์žˆ์Œ

์ด๋Ÿฌํ•œ ์†์„ฑ ๋•Œ๋ฌธ์— , ์ด์ค‘ ์•”ํ˜ธํ™” ๊ฒฝ์šฐ ๊ทธ ๊ฒฐ๊ณผ๊ฐ€ 56Bit Key ๋ฅผ ๊ฐ€์ง„ ๋‹จ์ผ ์•”ํ˜ธํ™”์™€ ์•”ํ˜ธ๋ฌธ์˜ ๊ฐ•๋„๊ฐ€ ๊ฐ™๊ธฐ ๋•Œ๋ฌธ์— ํšจ๊ณผ์ ์ด์ง€ ๋ชปํ•จ

2 1 3[ [ ]] [ ]K K KE E P E P

2. Triple DES

Page 7: Chapter 6 Contemporary Symmetric Ciphers

7Network & Information Security LabNetwork & Information Security Lab

Meet-in-the-Middle Attack DIFF77 ์— ์˜ํ•˜์—ฌ ์ฒ˜์Œ ์•Œ๋ ค์กŒ์œผ๋ฉฐ , (P,C) ์™€ ๊ฐ™์€ ์•Œ๋ ค์ง„ ํ‰๋ฌธ๊ณผ ์•”ํ˜ธ๋ฌธ์ด ์Œ์œผ๋กœ ์ฃผ์–ด์ง„๋‹ค๋ฉด ์•„๋ž˜์™€ ๊ฐ™์€

๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅ

ํ‰๋ฌธ P ๋ฅผ 256 ๊ฐœ์˜ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ํ‚ค K1 ์œผ๋กœ ์•”ํ˜ธํ™” ํ•˜์—ฌ ์ƒ์„ฑ๋œ ์•”ํ˜ธ๋ฌธ์„ ํ…Œ์ด๋ธ”์— ์ €์žฅ

์•”ํ˜ธ๋ฌธ C ๋ฅผ ํ‚ค K2 ์˜ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  256 ๊ฐœ์˜ ๊ฐ’์œผ๋กœ ๋ณตํ˜ธํ™”ํ•œ ๋ณตํ˜ธ๋ฌธ์„ ํ…Œ์ด๋ธ”์— ์ €์žฅ

๊ฐ๊ฐ์˜ ๋‘ ํ…Œ์ด๋ธ”์ด ์ผ์น˜ํ•˜๋Š”์ง€ ํ™•์ธ ์œ„ ๊ณผ์ •์ด ์ผ์น˜ํ•œ๋‹ค๋ฉด ์ƒˆ๋กœ์šด (P,C) ์Œ์— ๋Œ€ํ•˜์—ฌ ๋‘ Key ๊ฒ€์‚ฌ ๋‘ Key ์ •ํ™•ํ•œ ์•”ํ˜ธ๋ฌธ์„ ๋งŒ๋“ ๋‹ค๋ฉด Key ๊ฒ€์ถœ ์„ฑ๊ณต

1 2[ ] [ ]K KX E P D C

2. Triple DES

Page 8: Chapter 6 Contemporary Symmetric Ciphers

8Network & Information Security LabNetwork & Information Security Lab

Meet-in-the-Middle Attack

56( 1 , ), 1,...., 2iiA E K P i

56( 2 , ), 1,...., 2jiB D K C j

??i jA B( 2 , ( 1 , )) ??j i

New NewC E K E K P

1 1

2 2

i

j

K K

K K

2. Triple DES

Page 9: Chapter 6 Contemporary Symmetric Ciphers

9Network & Information Security LabNetwork & Information Security Lab

Triple-DES with Two-Keys Meet-in-the-middle attack ๊ณต๊ฒฉ์˜ ํ™•์‹คํ•œ ๋Œ€์‘์ฑ…

์„ธ ๊ฐœ์˜ ๋‹ค๋ฅธ Key ๋กœ ์„ธ ๋ฒˆ ์•”ํ˜ธํ™”

๊ธฐ๋ฒ•์€ ์œ„์— ์–ธ๊ธ‰๋œ ํ‰๋ฌธ ๊ณต๊ฒฉ์‹œ ํ•„์š”ํ•œ ๋น„์šฉ์„ 2112 ๋กœ ์ฆ๊ฐ€์‹œํ‚ด 2 X 56 = 112 ์˜ ๋‹ค์†Œ ํฐ ํ‚ค ๊ธธ์ด๋ฅผ ์š”๊ตฌํ•˜๋Š” ๋‹จ์ ์ด ์กด์žฌํ•จ Tuchman ์€ ๋‘๊ฐœ์˜ Key ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” Triple DES ์ œ์•ˆ

์ด ํ•จ์ˆ˜๋Š” E โ€“ D โ€“ E ์ˆœ์„œ๋ฅผ ๊ฐ€์ง€๋ฉฐ , C = EK1[DK2[EK1[P]]] ๋กœ ์ˆ˜์‹ํ™” ํ•  ์ˆ˜ ์žˆ์Œ .

Key ๊ด€๋ฆฌ๋Š” ANSI X.97 ๊ณผ ISO8732 ์‚ฌ์šฉ์— ์ฑ„ํƒ ํ˜„์žฌ 3DES ์— ๋Œ€ํ•œ ์‹ค์งˆ์ ์ธ ์•”ํ˜ธํ•™์  ๊ณต๊ฒฉ์ด ์กด์žฌํ•˜์ง€ ์•Š์Œ

2. Triple DES

Page 10: Chapter 6 Contemporary Symmetric Ciphers

10Network & Information Security LabNetwork & Information Security Lab

3DES ์— ์ œ์•ˆ๋œ ์œ ํšจํ•œ ๊ณต๊ฒฉ ๊ธฐ๋ฒ• Merkel and Hellman ์˜ ์ œ์•ˆ

์ฒ˜์Œ ์ค‘๊ฐ„ ๊ฐ’์„ ์ƒ์„ฑํ•˜๋Š” ํ‰๋ฌธ ๊ฐ’์„ ๋ฐœ๊ฒฌํ•˜์—ฌ ํ‚ค๋ฅผ ๊ฒ€์ถœํ•˜๋Š” ๊ธฐ๋ฒ• ๋‘ ํ‚ค๋ฅผ ๊ฒฐ์ •ํ•˜๋Š” Meet-in-the-middle Attack ์ค‘๊ฐ„ ํ‰๋ฌธ A ์™€ C ๋ฅผ ์•Œ ์ˆ˜ ์žˆ๋‹ค๋ฉด Double DES ๊ณผ ์œ ์‚ฌํ•˜๊ฒŒ ๊ณต๊ฒฉ๊ฐ€๋Šฅ

๋ณดํ†ต ๊ณต๊ฒฉ์ž๋Š” 2 ๊ฐœ์˜ ์•”ํ˜ธํ‚ค ์—†์ด๋Š” A ์™€ B ๊ฐ’์„ ์•Œ ์ˆ˜ ์—†์Œ ๊ณต๊ฒฉ์ž๋Š” A ๊ฐ€ ๋  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋Š” ๊ฐ’์„ ์„ ํƒ A ๋ฅผ ์ƒ์„ฑํ•˜๋Š” ํ‰๋ฌธ / ์•”ํ˜ธ๋ฌธ (P,C) ์Œ์„ ๋ฐœ๊ฒฌํ–ˆ๋‹ค๊ณ  ๊ฐ€์ •

( 1) ( 2) ( 1)

) ( 1, ), ( 2, ), ( 1, )E K D K E K

A E K P B D K A C E K B

P A B C

์˜ˆ

2. Triple DES

Page 11: Chapter 6 Contemporary Symmetric Ciphers

11Network & Information Security LabNetwork & Information Security Lab

๊ณต๊ฒฉ์ž์˜ ๊ณต๊ฒฉ ๋‹จ๊ณ„ 1 ๋‹จ๊ณ„

P,C ์Œ์„ ํš๋“ํ–ˆ๋‹ค๊ณ  ๊ฐ€์ •ํ•˜๋ฉฐ , ์ด ๊ฐ’์„ ํ…Œ์ด๋ธ”์— ์œ„์น˜ ์‹œํ‚ด .

2 ๋‹จ๊ณ„ A ๋ฅผ ์ฐพ๊ธฐ ์œ„ํ•œ ์ž„์˜์˜ ๊ฐ’ a ๋ฅผ ์„ ํƒํ•˜๊ณ  P = Di[a] ๋กœ ์ •์˜๋œ ๋‘ ๋ฒˆ์งธ

ํ…Œ์ด๋ธ”์„ ์ƒ์„ฑ 256 ๊ฐœ์˜ ๊ฐ€๋Šฅํ•œ ํ‚ค K1=i ์— ์˜ํ•ด ์ƒ์„ฑ๋  ์ˆ˜ ์žˆ์–ด์•ผ ํ•จ

56

( 1 , ), 1 2

Select a

P D K a K Number

( 1) ( 2) ( 1)E K D K E KP A B C a

2. Triple DES

Page 12: Chapter 6 Contemporary Symmetric Ciphers

12Network & Information Security LabNetwork & Information Security Lab

๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋ฐฉ๋ฒ•์œผ๋กœ B ์˜ ๊ฐ’์„ ์ƒ์„ฑํ•˜์—ฌ ์„ธ๋ฒˆ์งธ ํ…Œ์ด๋ธ”์— ์ฑ„์›€ . B = Di[C]

B

( 1) ( 2) ( 1)E K D K E KP A B C

a

56( 1, ), 1 2B D K C K Number

2. Triple DES

Page 13: Chapter 6 Contemporary Symmetric Ciphers

13Network & Information Security LabNetwork & Information Security Lab

3 ๋‹จ๊ณ„ ํ…Œ์ด๋ธ” 2 ์—์„œ K1 ์˜ ํ›„๋ณด ๊ฐ’์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ  , K2 ์˜ ๊ฐ’์„ ์ฐพ์„ ์ˆ˜ ์žˆ๋‹ค . 256 ๊ฐœ์˜ ๊ฐ€๋Šฅํ•œ ํ‚ค K2=j ๊ฐ๊ฐ์— ๋Œ€ํ•˜์—ฌ ์„ ํƒ๋œ a ์˜ ๊ฐ’์œผ๋กœ ๋‘ ๋ฒˆ์งธ

์ค‘๊ฐ„ ๊ฐ’์„ ๊ตฌํ•œ๋‹ค . Bj = Dj [a]

56( 2 , ), 2 2B D K a K Number

B

( 1) ( 2) ( 1)E K D K E KP A B C

( 2, )E K a ????

2. Triple DES

Page 14: Chapter 6 Contemporary Symmetric Ciphers

14Network & Information Security LabNetwork & Information Security Lab

4 ๋‹จ๊ณ„ ๊ฐ 1,2,3 ๋‹จ๊ณ„์—์„œ ์‚ฐ์ถœํ•œ ํ‚ค๋ฅผ ๋‹ค๋ฅธ (P,C) ์Œ์— ์ ์šฉ ํ‚ค ์Œ์ด ์ •์ƒ์ ์ธ ์•”ํ˜ธ๋ฌธ์„ ์ƒ์„ฑ ํ•œ๋‹ค๋ฉด ์ž‘์—… ์™„๋ฃŒ ์„ฑ๊ณตํ•œ ์Œ์ด ์กด์žฌ ํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด ์ƒˆ๋กœ์šด a ๋กœ 1 ๋‹จ๊ณ„ ๋ถ€ํ„ฐ ๋ฐ˜๋ณต

์˜ˆ์‚ฐ ๋˜๋Š” ๊ณต๊ฒฉ ์‹คํ–‰ ์‹œ๊ฐ„ (256)264/n = 2120-log

2n

2. Triple DES

Page 15: Chapter 6 Contemporary Symmetric Ciphers

15Network & Information Security LabNetwork & Information Security Lab

Triple-DES with Three-Keys ์œ„์—์„œ ์–ธ๊ธ‰๋œ ๊ณต๊ฒฉ์— ๋Œ€ํ•ด ์ €ํ•ญ์„ฑ์„ ๊ฐ€์ง ๋ณด๋‹ค ๊ฐ•ํ•œ ๋ณด์•ˆ์„ฑ์„ ์œ„ํ•ด 3 ๊ฐœ์˜ ์•” / ๋ณตํ˜ธ์šฉ ํ‚ค๋ฅผ ์‚ฌ์šฉํ•จ ์„ธ ๊ฐœ์˜ ํฌ๊ธฐ๋ฅผ ๊ฐ€์ง„ 3DS ๋Š” 168Bit ์˜ ํ‚ค ํฌ๊ธฐ๋ฅผ ๊ฐ€์ง C = EK3[DK2[EK1[P]]]

Triple ๋Š” PGP ์™€ S/mime ๊ณผ ๊ฐ™์€ ์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜์˜ ์‘์šฉํ”„๋กœ๊ทธ๋žจ์— ์ตœ์ ํ™” ๋˜์–ด ์žˆ์œผ๋ฉฐ ๋ณดํŽธ์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ํ•˜๋‚˜์ž„

2. Triple DES

Page 16: Chapter 6 Contemporary Symmetric Ciphers

16Network & Information Security LabNetwork & Information Security Lab

3. Block Cipher Modes of Operration ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ํšจ๊ณผ์ ์ธ ์‚ฌ์šฉ์„ ์œ„ํ•˜์—ฌ ๋‹ค์–‘ํ•œ ํ˜•ํƒœ๋กœ ์•” /

๋ณตํ˜ธํ™” ๋ฅผ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Œ ECB Mode CBC Mode Feedback Mode Counter Mode

3. Block Cipher Modes of Operation

Page 17: Chapter 6 Contemporary Symmetric Ciphers

17Network & Information Security LabNetwork & Information Security Lab

ECB Mode

๋งค ์‹œ๊ฐ„๋งˆ๋‹ค ๊ฐ๊ฐ์˜ ๋ธ”๋ก์„ ๋™์ผํ•œ ํ‚ค๋กœ ์•” / ๋ณตํ˜ธํ™” ์‹œํ‚ค๋Š” ๊ธฐ๋ฒ• ํ†ต์‹  ์ˆ˜ํ–‰ ์‹œ Signal value ์˜ ๊ธฐ๋ฐ€์„ฑ์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉํ•จ ๋™์ผํ•œ ํŒจํ„ด์— ์˜ํ•ด ์•” / ๋ณตํ˜ธํ™” ์ž‘์—…์ด ์ˆ˜ํ–‰๋˜๋ฏ€๋กœ ์ด๋Ÿฌํ•œ ๊ทœ์น™์ €์ธ ํŒจํ„ด์„ ํŒŒ์•… ,

์•”ํ˜ธ ํ‚ค๋ฅผ ์•Œ์•„๋‚ผ ์ˆ˜ ์žˆ๋‹ค๋Š” ๋ฌธ์ œ์ ์ด ์กด์žฌ

Encrypt

1P

K Encrypt

2P

K Encrypt

nP

Kโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ

1Time 2Time Time n

Encrypt

1P

1C

K Encrypt

2P

2C

K Encrypt

nP

nC

Kโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ

( , ), ( 1,...., )

( , ), ( 1,...., )

i

i

C E K Pi i n

P E K Ci i n

3. Block Cipher Modes of Operation

Page 18: Chapter 6 Contemporary Symmetric Ciphers

18Network & Information Security LabNetwork & Information Security Lab

CBC Mode

์•”ํ˜ธ๋ฌธ ๋ธ”๋ก์„ ๋‹ค์Œ ๋ฒˆ ์•”ํ˜ธํ™” ์ž‘์—…์— Input ๋ฐ์ดํ„ฐ๋กœ ์‚ฌ์šฉํ•˜๋Š” ๊ธฐ๋ฒ• ์ผ๋ฐ˜์ ์œผ๋กœ ๊ธด ๊ธธ์ด์˜ ๋ธ”๋ก ๋ฐ์ดํ„ฐ ์ „์†ก ๋ฐ ์ธ์ฆ์šฉ MAC ๋“ฑ์— ์‚ฌ์šฉ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”์‹œ ํ‰๋ฌธ์— ์ด์ „์˜ ์•”ํ˜ธ๋ฌธ์„ XOR ์—ฐ์‚ฐ์‹œ์ผœ ์•”ํ˜ธํ™”

ํ•จ์œผ๋กœ์จ , ๋™์ผํ•œ ํ‚ค๋ฅผ ์‚ฌ์šฉํ–ˆ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋ถˆ๊ทœ์น™ํ•œ ํŒจํ„ด์— ์˜ํ•ด ์•”ํ˜ธ๋ฌธ ์ƒ์„ฑ

Encrypt

1C

1P

K Encrypt

2C

2P

K Encrypt

nC

nP

Kโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ

1Time 2Time Time n

Encrypt

1P

K Encrypt

2P

K Encrypt

nP

Kโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ

1nC

IV

1nC

1 0( , ), ( 1,...., )i i iC E K C P i n C IV 1 0( , ), ( 2,...., )i i iP C D K C i n C IV

3. Block Cipher Modes of Operation

Page 19: Chapter 6 Contemporary Symmetric Ciphers

19Network & Information Security LabNetwork & Information Security Lab

์ฒซ๋ฒˆ์งธ ์•”ํ˜ธ๋ฌธ ๋ธ”๋ก ์ƒ์„ฑ์‹œ ํ‰๋ฌธ ๋ฐ์ดํ„ฐ์— IV(initialization vector) ๋ฅผ XOR ์—ฐ์‚ฐ ํ•œ ํ›„ ์•”ํ˜ธ์šฉ ํ‚ค๋กœ ์•”ํ˜ธํ™”

์ดํ›„ ์•”ํ˜ธ๋ฌธ ๋ธ”๋ก ์ƒ์„ฑ์‹œ ํ‰๋ฌธ ๋ฐ์ดํ„ฐ์˜ ์ด์ „ ์•”ํ˜ธ๋ฌธ์„ XOR ์—ฐ์‚ฐ ํ•œ ํ›„ ์•”ํ˜ธ์šฉ ํ‚ค๋กœ ์•”ํ˜ธํ™”

๋ณตํ˜ธํ™” ์ž‘์—…์€ ์•”ํ˜ธํ™” ์ž‘์—…๊ณผ ๋ฐ˜๋Œ€๋กœ ํ–‰ํ•ด์ง€๋ฉฐ ๋ณตํ˜ธํ™”์‹œ ์•”ํ˜ธํ‚ค์™€ IV ๊ฐ’์ด ํ•„์š”ํ•จ

์†ก ์ˆ˜์‹ ์ž๊ฐ„์— ์•Œ๊ณ  ์žˆ๋Š” IV ๊ฐ’์€ ์ œ 3 ์ž์— ์˜ํ•ด ์ „์†ก๋˜๊ฑฐ๋‚˜ , ECB Mode ๋กœ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์ „์†ก๋  ์ˆ˜ ์žˆ์Œ

1 1( , )C E K IV P

1( , )i i iC E K C P

1

1 1

( , )

( , )

i i iP C D K C

P IV D K C

3. Block Cipher Modes of Operation

Page 20: Chapter 6 Contemporary Symmetric Ciphers

20Network & Information Security LabNetwork & Information Security Lab

Cipher Feedback Mode(CFB)

๋ธ”๋ก์•”ํ˜ธ๊ฐ€ ์ŠคํŠธ๋ฆผ๋ชจ๋“œ์ฒ˜๋Ÿผ ๋™์ž‘ํ•˜๋„๋ก ํ•จ ๋ธ”๋ก ํฌ๊ธฐ๋ณด๋‹ค ์ž‘์€ ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™” ํ• ์ˆ˜ ์žˆ์œผ๋ฉฐ , ๋‹จ 1 ๊ฐœ์˜ ๋น„ํŠธ๋ถ€ํ„ฐ

๋ธ”๋ก๊นŒ์ง€์˜ ๋‹ค์–‘ํ•œ ํฌ๊ธฐ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™” ํ• ์ˆ˜ ์žˆ์Œ ์ผ๋ฐ˜์ ์œผ๋กœ ๊ธด ๊ธธ์ด์˜ ๋ธ”๋ก ๋ฐ์ดํ„ฐ ์ „์†ก ๋ฐ ์ธ์ฆ์šฉ MAC ๋“ฑ์— ์‚ฌ์šฉ

Encrypt

1P

K

Shift register

Select Discard

IV

1C

Encrypt

2P

K

Shift register

Select Discard

2C

Encrypt

nP

K

Shift register

Select Discard

nC

1nC

3. Block Cipher Modes of Operation

Page 21: Chapter 6 Contemporary Symmetric Ciphers

21Network & Information Security LabNetwork & Information Security Lab

์•”ํ˜ธํ™” ์ดˆ๊ธฐ ์ž…๋ ฅ๋ฒ„ํผ ๋ถ€๋ถ„์€ IV ๋กœ ์ฑ„์›Œ์ง€๋ฉฐ ์•”ํ˜ธ ํ‚ค๋กœ ์•”ํ˜ธํ™” ๋จ

์•”ํ˜ธํ™”๋œ ๋ฒ„ํผ์˜ ์ตœ ์ขŒ๋‹จ ๋น„ํŠธ์™€ ํ‰๋ฌธ์€ XOR ์—ฐ์‚ฐ๋˜๋ฉฐ , ๊ฒฐ๊ณผ๊ฐ™์€ ์•”ํ˜ธ๋ฌธ์ด ๋จ

์•”ํ˜ธํ™”Key

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ

ํ‰๋ฌธ

ํ‰๋ฌธ ๋งŒํผ์˜ ํฌ๊ธฐ

์•”ํ˜ธ๋ฌธ1P 1C

IV

3. Block Cipher Modes of Operation

Page 22: Chapter 6 Contemporary Symmetric Ciphers

22Network & Information Security LabNetwork & Information Security Lab

์•”ํ˜ธํ™”์— ์‚ฌ์šฉ๋œ ๋ถ€๋ถ„์€ ํ๊ธฐ๋˜๋ฉฐ ๋‚˜๋จธ์ง€ ๋ฒ„ํผ๋Š” ๋‹ค์Œ ์•”ํ˜ธํ™”์— ์‚ฌ์šฉ ํ๊ธฐ๋˜์–ด ๋น„์›Œ์ง„ ๋น„ํŠธ๋งŒํผ ์™ผ์ชฝ์œผ๋กœ ์‰ฌํ”„ํŠธํ•จ

์‰ฌํ”„ํŠธ๋กœ ์ธํ•ด ๋นˆ ๊ตฌ๊ฐ„์€ ์•”ํ˜ธ๋ฌธ์ด ๋Œ€์‹ ํ•จ , ๋‚จ์€ ๋ฒ„ํผ๋Š” ๋‹ค์Œ ์•”ํ˜ธํ™”์— ๊ณ„์† ์‚ฌ์šฉ๋˜๋ฉฐ ๋™์ผํ•œ ๋ฐฉ๋ฒ•์œผ๋กœ ์•”ํ˜ธํ™” ์ˆ˜ํ–‰ , ์ด ๊ณผ์ •์ด ๊ณ„์†๋˜๋ฉด ๋ฒ„ํผ๋Š” ์•”ํ˜ธ๋ฌธ์œผ๋กœ ์ฑ„์›Œ์ง

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ ์•”ํ˜ธ๋ฌธ

์•”ํ˜ธ๋ฌธ

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ

1C 2C 3C 4C 5C

3. Block Cipher Modes of Operation

Page 23: Chapter 6 Contemporary Symmetric Ciphers

23Network & Information Security LabNetwork & Information Security Lab

๋ณตํ˜ธํ™” ์ดˆ๊ธฐ ์ž…๋ ฅ๋ฒ„ํผ ๋ถ€๋ถ„์€ IV ๋กœ ์ฑ„์›Œ์ง€๋ฉฐ ์•”ํ˜ธ ํ‚ค๋กœ ์•”ํ˜ธํ™” ๋จ

์•”ํ˜ธํ™”๋œ ๋ฒ„ํผ์˜ ์ตœ ์ขŒ๋‹จ ๋น„ํŠธ์™€ ์•”ํ˜ธ๋ฌธ์€ XOR ์—ฐ์‚ฐ๋˜๋ฉฐ , ๊ฒฐ๊ณผ๊ฐ’์€ ํ‰๋ฌธ์ด ๋จ

์ผ๋ฐ˜์ ์ธ ์•”ํ˜ธํ™”๋Š” ํŠน์ • ๋ถ€๋ถ„์˜ ์ž…๋ ฅ์ด ์ „์ฒด ์•”ํ˜ธ๋ฌธ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€๋งŒ CFB ๋ชจ๋“œ์˜ ๊ฒฝ์šฐ ํŠน์ • ๊ตฌ๊ฐ„์— ์˜ค๋ฅ˜๊ฐ€ ๋ฐœ์ƒํ•˜๋”๋ผ๋„ ์•”ํ˜ธ๋ฌธ ์ „์ฒด์— ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€ ์•Š์Œ

์•”ํ˜ธํ™”Key

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ

์•”ํ˜ธ๋ฌธ

์•”ํ˜ธ๋ฌธ ๋งŒํผ์˜ ํฌ๊ธฐ

ํ‰๋ฌธ

IV

1C 2C 3C 4C 5C

1P

3. Block Cipher Modes of Operation

Page 24: Chapter 6 Contemporary Symmetric Ciphers

24Network & Information Security LabNetwork & Information Security Lab

Output Feedback Mode(OFB)

๋ธ”๋ก์•”ํ˜ธ๊ฐ€ ์ŠคํŠธ๋ฆผ๋ชจ๋“œ์ฒ˜๋Ÿผ ๋™์ž‘ํ•˜๋„๋ก ํ•จ ๋ธ”๋ก ํฌ๊ธฐ๋ณด๋‹ค ์ž‘์€ ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™” ํ• ์ˆ˜ ์žˆ์œผ๋ฉฐ , ๋‹จ 1 ๊ฐœ์˜ ๋น„ํŠธ๋ถ€ํ„ฐ

๋ธ”๋ก๊นŒ์ง€์˜ ๋‹ค์–‘ํ•œ ํฌ๊ธฐ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™” ํ• ์ˆ˜ ์žˆ์Œ CFB ๋ชจ๋“œ์™€ ์œ ์‚ฌํ•จ

Encrypt

1P

K

Shift register

K

Select Discard

IV

1C

Encrypt

2P

K

Shift register

Select Discard

2C

Encrypt

nP

K

Shift register

Select Discard

nC

1nC

3. Block Cipher Modes of Operation

Page 25: Chapter 6 Contemporary Symmetric Ciphers

25Network & Information Security LabNetwork & Information Security Lab

์•”ํ˜ธํ™” ์ดˆ๊ธฐ ์ž…๋ ฅ๋ฒ„ํผ ๋ถ€๋ถ„์€ IV ๋กœ ์ฑ„์›Œ์ง€๋ฉฐ ์•”ํ˜ธ ํ‚ค๋กœ ์•”ํ˜ธํ™” ๋จ

์•”ํ˜ธํ™”๋œ ๋ฒ„ํผ์˜ ์ตœ ์ขŒ๋‹จ ๋น„ํŠธ์™€ ํ‰๋ฌธ์€ XOR ์—ฐ์‚ฐ๋˜๋ฉฐ , ๊ฒฐ๊ณผ๊ฐ™์€ ์•”ํ˜ธ๋ฌธ์ด ๋จ

์•”ํ˜ธํ™”Key

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ

ํ‰๋ฌธ

ํ‰๋ฌธ ๋งŒํผ์˜ ํฌ๊ธฐ

์•”ํ˜ธ๋ฌธ1P 1C

IV

3. Block Cipher Modes of Operation

Page 26: Chapter 6 Contemporary Symmetric Ciphers

26Network & Information Security LabNetwork & Information Security Lab

์•”ํ˜ธํ™”์— ์‚ฌ์šฉ๋œ ๋ถ€๋ถ„์€ ํ๊ธฐ๋˜๋ฉฐ , ๋‚จ์€ ๊ณต๊ฐ„์€ ๋‹ค์Œ ์•”ํ˜ธํ™”์— ์‚ฌ์šฉ ํ๊ธฐ๋œ ๊ณต๊ฐ„๋งŒํผ ์™ผ์ชฝ์œผ๋กœ ์‰ฌํ”„ํŠธํ•จ

๋นˆ ๊ตฌ๊ฐ„์ด ์•”ํ˜ธ๋ฌธ์œผ๋กœ ์ฑ„์›Œ์ง€๋Š” CFB ์™€ ๋‹ฌ๋ฆฌ ๋นˆ ๊ตฌ๊ฐ„์€ 0 ์œผ๋กœ ์ฑ„์›Œ์ง€๋ฉฐ ๋‚จ์€ ๋ฒ„ํผ๋Š” ๋‹ค์Œ ์•”ํ˜ธํ™”์— ๊ณ„์† ์‚ฌ์šฉ๋˜๋ฉฐ ๋™์ผํ•œ ๋ฐฉ๋ฒ•์œผ๋กœ ์•”ํ˜ธํ™” ์ˆ˜ํ–‰ , ์ด ๊ณผ์ •์ด ๊ณ„์†๋˜๋ฉด ๋ฒ„ํผ๋Š” 0 ์œผ๋กœ ์ฑ„์›Œ์ง

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ 00

์•”ํ˜ธํ™” ๋œ ๋ฒ„ํผ

0000โ€ฆโ€ฆ

3. Block Cipher Modes of Operation

Page 27: Chapter 6 Contemporary Symmetric Ciphers

27Network & Information Security LabNetwork & Information Security Lab

Counter Mode

์•”ํ˜ธ๋ฌธ ์ž‘์„ฑ์‹œ IV ๊ฐ’๊ณผ ์นด์šดํ„ฐ๋ฅผ ๊ธฐ์ดˆ๋กœ ์•”ํ˜ธ๋ฌธ์„ ์ž‘์„ฑํ•˜๋Š” ๊ธฐ๋ฒ• ์ดˆ๊ธฐ๊ฐ’ IV ๋ฅผ Counter ๋กœ ์ฆ๊ฐ€์‹œํ‚จ ๊ฐ’์„ ์•”ํ˜ธ ํ‚ค๋กœ ์•”ํ˜ธํ™” ํ•œ ๋‹ค์Œ

ํ‰๋ฌธ๊ณผ XOR ์—ฐ์‚ฐํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ , CBC ๊ธฐ๋ฒ•๋ณด๋‹ค ๋นจ๋ผ ๋ณดํ†ต ๋น ๋ฅธ ์•”ํ˜ธํ™”๋ฅผ ์š”๊ตฌํ•˜๋Š” ๊ฒฝ์šฐ์— ์‚ฌ์šฉ๋จ

๋น ๋ฅด๋ฉฐ , ํŒจํ„ด์ด ๋น„๊ต์  ๋ถˆ๊ทœ์น™ํ•˜๋‹ค๋Š” ์ด์ ์ด ์žˆ์ง€๋งŒ ๋™์ผํ•œ IV ์™€ ์•”ํ˜ธํ‚ค๋ฅผ ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ ์•ˆ์ „์„ฑ ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ

Encrypt

1C

(0)IV Counter

K

1P

Encrypt

2C

(1)IV Counter

K

2P

Encrypt

nC

( 1)IV Counter n

K

nP

3. Block Cipher Modes of Operation

Page 28: Chapter 6 Contemporary Symmetric Ciphers

28Network & Information Security LabNetwork & Information Security Lab

RC5 ์˜ ํŠน์ง• ๋น„๊ต์  ๊ฐ„๋‹จํ•œ ์—ฐ์‚ฐ์œผ๋กœ ๊ฑฐ์˜ ๋ชจ๋“  ํ•˜๋“œ์›จ์–ด์— ์ ํ•ฉ

๋ง์…ˆ , ๋บ„์…ˆ , XOR ๊ณผ ์ขŒ / ์šฐ ๋กœํ…Œ์ด์…˜ ๋“ฑ์˜ ๊ฐ„๋‹จํ•œ ์‚ฐ์ˆ ์—ฐ์‚ฐ์„ ์‚ฌ์šฉ

๋น ๋ฅธ ์•” / ๋ณตํ˜ธํ™” ์—ฐ์‚ฐ RC5 ๋‚ด๋ถ€ ๋กœ์ง์ด ์‚ฐ์ˆ ์—ฐ์‚ฐ ์œ„์ฃผ์ด๋ฏ€๋กœ ์•” / ๋ณตํ˜ธํ™” ์ž‘์—… ์‹œ ๋น ๋ฅธ ์—ฐ์‚ฐ์„

์ˆ˜ํ–‰ํ•จ ์›Œ๋“œ ๋‹จ์œ„๋กœ ์ฒ˜๋ฆฌํ•˜๋ฉฐ ํ•œ๋ฒˆ์— ์•”ํ˜ธํ™” ์ž‘์—…์„ ์ˆ˜ํ–‰

๊ฐ€๋ณ€์ ์ธ ํ‰๋ฌธ ํฌ๊ธฐ๋ฅผ ๊ฐ€์ง ํ•œ ์›Œ๋“œ์˜ ๋น„ํŠธ์˜ ์ˆ˜๋ฅผ ๊ฐ€๋ณ€์ ์œผ๋กœ ์ง€์ •ํ•ด ์ค„ ์ˆ˜ ์žˆ์Œ (W)

๊ฐ€๋ณ€์ ์ธ ๋ผ์šด๋“œ ๋ผ์šด๋“œ์˜ ์ˆ˜๋Š” ์—ญ์‹œ ๊ฐ€๋ณ€์ ์œผ๋กœ ์ง€์ •ํ•ด ์ค„ ์ˆ˜ ์žˆ์Œ ( R) ๋ผ์šด๋“œ ์ˆ˜๋Š” ์•”ํ˜ธ๋ฌธ์˜ ๋ณด์•ˆ์„ฑ์— ์˜ํ–ฅ์„ ์คŒ

5. RC5

Page 29: Chapter 6 Contemporary Symmetric Ciphers

29Network & Information Security LabNetwork & Information Security Lab

๊ฐ€๋ณ€์ ์ธ ํ‚ค์˜ ๊ธธ์ด ํ‚ค ๊ธธ์ด ์—ญ์‹œ ๊ฐ€๋ณ€์ ์œผ๋กœ ์ง€์ •์ด ๊ฐ€๋Šฅํ•จ (B). ํ‚ค์˜ ๊ธธ์ด๋Š” ์•”ํ˜ธ๋ฌธ์˜

๋ณด์•ˆ์„ฑ ๊ฐ•๋„์— ์˜ํ–ฅ์„ ์คŒ

๋‚ฎ์€ ๋ฉ”๋ชจ๋ฆฌ ์š”๊ตฌ์‚ฌํ•ญ RC5 ๋Š” ์ œํ•œ๋œ ๋ฉ”๋ชจ๋ฆฌ๋ฅผ ๊ฐ€์ง„ ์‹œ์Šคํ…œ์— ์ ํ•ฉํ•จ

๋†’์€ ๋ณด์•ˆ์„ฑ ๊ฐ€๋ณ€์ ์œผ๋กœ ๋งค๊ฐœ๋ณ€์ˆ˜๋ฅผ ์„ค์ •ํ•˜์—ฌ ๋†’์€ ๋ณด์•ˆ์„ฑ์„ ์ง€์›ํ•จ

5. RC5

Page 30: Chapter 6 Contemporary Symmetric Ciphers

30Network & Information Security LabNetwork & Information Security Lab

RC5 ํŒŒ๋ผ๋ฏธํ„ฐ

RC5 ๋Š” 32, 64, 128 ๋น„ํŠธ ๊ธธ์ด์˜ ํ‰๋ฌธ ๋ธ”๋ก์„ ๊ฐ™์€ ๊ธธ์ด์˜ ์•”ํ˜ธ๋ฌธ์œผ๋กœ ์ถœ๋ ฅํ•จ

ํ‚ค ๊ธธ์ด์˜ ๋ฒ”์œ„๋Š” 0 ์—์„œ 2040 ๋น„ํŠธ RC5-w/r/b

์˜ˆ )RC5-32/12/16 32 bit word(64bit plaintext and ciphertext) 12 rounds in the en/decryption algorithm,

16 bytes key length(128bits)

๋งค๊ฐœ๋ณ€์ˆ˜ ์ •์˜ ๊ฐ’์˜ ๋ฒ”์œ„

w ํ‰๋ฌธ์œผ๋กœ ์‚ฌ์šฉํ•  ์›Œ๋“œ ํฌ๊ธฐ 16, 32, 64

r ๋ผ์šด๋“œ์˜ ์ˆ˜ 0, 1, ... , 255

b ๋น„๋ฐ€ํ‚ค์˜ ๋ฐ”์ดํŠธ ์ˆ˜ 0, 1, ... , 255

5. RC5

Page 31: Chapter 6 Contemporary Symmetric Ciphers

31Network & Information Security LabNetwork & Information Security Lab

RC5 ํ‚ค ํ™•์žฅ

(1) ๋งค๊ฐœ๋ณ€์ˆ˜ r ๊ณผ w ์— ์˜ํ•ด ์„œ๋ธŒํ‚ค ์ˆ˜์—ด S[0]~S[t-1] ์„ ์ดˆ๊ธฐํ™” (2) ์ž…๋ ฅ ๋ฐ›์€ b ๋ฐ”์ดํŠธ์˜ ์•”ํ˜ธํ‚ค K[0โ€ฆ.b-1] ์„ c ๋‹จ์–ด๋ฐฐ์—ด L[0โ€ฆc-1]๋ฐฐ์—ด๋กœ ๋ณ€ํ™˜

(3) ์ดˆ๊ธฐํ™”๋œ ์„œ๋ธŒํ‚ค ์ˆ˜์—ด๊ณผ ๋‹จ์–ด๋ฐฐ์—ด์„ Mix ํ•˜์—ฌ , ์•”ํ˜ธ์šฉ ํ‚ค ์ˆ˜์—ด์„ ์ƒ์„ฑ

Initialize

Mix

Convert

S[0] S[1] S[t-1]โ€ฆโ€ฆ..

S[0] S[1] S[t-1]โ€ฆโ€ฆ..

r, wK[0] K[1] K[b-1]โ€ฆโ€ฆ..

L[0] L[1] K[c-1]โ€ฆโ€ฆ..

(1) (2)

(3)

5. RC5

Page 32: Chapter 6 Contemporary Symmetric Ciphers

32Network & Information Security LabNetwork & Information Security Lab

 RC5 ๋Š” ์•”ํ˜ธ ํ‚ค๋ฅผ ์ž…๋ ฅ ๋ฐ›์•„ t=2(r+1) ์ˆ˜๋งŒํผ์˜ ํ‚ค ์ˆ˜์—ด๋กœ ํ™•์žฅํ•จ ํ‚ค ์ˆ˜์—ด์€ ๋ผ์šด๋“œ ์™€ ๋น„๋ก€ํ•˜๋ฉฐ ( ์˜ˆ : 12 ๋ผ์šด๋“œ ๋ผ๋ฉด ์ด 26 ๊ฐœ์˜ Sub-K

ey ๋กœ ๊ตฌ์„ฑ๋œ ํ‚ค ์ˆ˜์—ด์„ ๊ฐ€์ง ), ์ด๋Ÿฌํ•œ ํ‚ค ์ˆ˜์—ด ์ƒ์„ฑ์—๋Š” PW ๊ฐ’๊ณผ QW

๊ฐ’์„ ์‚ฌ์šฉ

e=2.178281828459...  ( ์ž์—ฐ๋กœ๊ทธ ) โˆฎ=1.618033988749 ...( ํ™ฉ๊ธˆ๋น„์œจ ) = ( ) Odd[x] ๋Š” x ์— ๊ฐ€์žฅ ๊ฐ€๊นŒ์šด ํ™€์ˆ˜์ธ ์ •์ˆ˜์ด๋‹ค .

Odd[e] = 3 ๊ณผ Odd[ ] = 1โˆฎ ์ผ ๋•Œ์˜ QW, PW ๊ฐ’์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค .

2

51

w 16 32 64

Pw

Qw

B7E19E37

B7E151639E3779B9

B7E151628AED2A6B9E3779B97F4A7C15

[( 2)2 ]

[( 2)2 ]

wW

wW

P Odd e

Q Odd

5. RC5

Page 33: Chapter 6 Contemporary Symmetric Ciphers

33Network & Information Security LabNetwork & Information Security Lab

Pw ์™€ Qw ๋ฅผ ์ด์šฉํ•œ ํ‚ค ์ˆ˜์—ด S ์˜ ์ดˆ๊ธฐํ™”

์ดˆ๊ธฐํ™”๋œ ๋ฐฐ์—ด S[0]~s[t] ๋ฅผ Mixing ํ•˜์—ฌ Secret key ๋ฐฐ์—ด๋กœ ์ƒ์„ฑํ•จ

0;

3 max( , ) :

[ ] ( [ ] ) 3;

[ ];

( 1) mod ( );

[ ] ( [ ] ) ( );

[ ];

( 1) mod ( );

i j X Y

do t c times

S i S i X Y

X S i

i i t

L i L i X Y X Y

Y L i

j j c

2( 1)

/ 8

/

t r

u w

c b u

w

[0] ;

i=1 to t-1 do

S[i]=S[i-1]+Q

wS P

for

5. RC5

Page 34: Chapter 6 Contemporary Symmetric Ciphers

34Network & Information Security LabNetwork & Information Security Lab

Encryption RC5 ๋Š” ๊ธฐ๋ณธ์ ์ธ ์„ธ ๊ฐ€์ง€ ์—ฐ์‚ฐ์„ ์‚ฌ์šฉ .

Addition ์•”ํ˜ธํ™” + , ๋ณตํ˜ธํ™” -

Bitwise execusive-OR Left circular rotation

์•”ํ˜ธํ™” : x<<<y, ๋ณตํ˜ธํ™” : x>>>y

5. RC5

Page 35: Chapter 6 Contemporary Symmetric Ciphers

35Network & Information Security LabNetwork & Information Security Lab

Encryption ์•Œ๊ณ ๋ฆฌ์ฆ˜ ํ‰๋ฌธ ๋ฐ์ดํ„ฐ๋ฅผ A ์™€ B ๋น„ํŠธ๋กœ ๋‚˜๋ˆ„์–ด ์ˆ˜์—ด S ๋กœ ์•”ํ˜ธํ™” ์—ฐ์‚ฐ

0

0

i i-1 i-1 i-1

i i-1 i i

LE A S[0];

RE B S[1];

for i 1 to r do

LE ((LE RE ) RE ) S[2 i];

RE ((RE LE ) LE ) [2 i 1];

i-1LE i-1RE

iLE iRE

S[2 i] S[2 i+1]

i Round

5. RC5

Page 36: Chapter 6 Contemporary Symmetric Ciphers

36Network & Information Security LabNetwork & Information Security Lab

Decryption ์•”ํ˜ธ๋ฌธ์˜ 2 ๊ฐœ์˜ ๋น„ํŠธ๋Š” LDi ๊ณผ RDi ๋ผ ๊ฐ€์ •

Decryption ์•Œ๊ณ ๋ฆฌ์ฆ˜

i-1 i i i

i-1 i i-1 i-1

0

0

for i r to 1 do

RD ((RD - S[2 i 1] LD ) LD ;

LD ((LD - S[2 i] RD ) RD ;

B RD - S[1];

A LD - S[0];

i-1LD i-1RE

iLD iRD

S[2 i] S[2 i+1]

i Round

5. RC5

Page 37: Chapter 6 Contemporary Symmetric Ciphers

37Network & Information Security LabNetwork & Information Security Lab

5. RC5

Page 38: Chapter 6 Contemporary Symmetric Ciphers

38Network & Information Security LabNetwork & Information Security Lab

RC5 ๋Š” Feistel ๊ธฐ๋ฐ˜์˜ DES ์™€ ๊ฐ™์€ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ๋น„ํ•˜์—ฌ ๋งŽ์€ ๋ณด์•ˆ์  , ํšจ์œจ์ ์ธ ์ด์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ์Œ ๊ฐ€๋ณ€์  ํ‚ค ๊ธธ์ด

๋งŒ์•ฝ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ํ‚ค ๊ธธ์ด๋Š” ๋ถ„์„๊ณต๊ฒฉ์— ๋Œ€ํ•œ ์ €ํ•ญ์„ฑ๊ณผ ๋น„๋ก€ํ•œ๋‹ค . ํ‚ค๊ฐ€ ๊ธธ์ˆ˜๋ก ์ „์‚ฌ๊ณต๊ฒฉ์— ๊ฐ•ํ•˜๋‹ค . RC5 ๋Š” ์ด๋Ÿฌํ•œ ํ‚ค์˜ ๊ธธ์ด๋Š” ์„ค์ •ํ•  ์ˆ˜

์žˆ๋„๋ก ๊ฐ€๋ณ€์  ํ‚ค ๊ธธ์ด๋ฅผ ์ œ๊ณตํ•œ๋‹ค . ํ˜ผํ•ฉ๋œ ์—ฐ์‚ฐ์ž

๋งŽ์€ ์—ฐ์‚ฐ์˜ ์‚ฌ์šฉ์€ ๋น„์„ ํ˜•์„ฑ์„ ์ œ๊ณตํ•˜์—ฌ ์•”ํ˜ธ๋ถ„์„์„ ์–ด๋ ต๊ฒŒํ•œ๋‹ค . RC5 ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ด๋Ÿฌํ•œ ์ด์ ์„ ์ œ๊ณตํ•œ๋‹ค .

๋ฐ์ดํ„ฐ ์˜์กด์  ์ˆœํ™˜ ๋ณด์•ˆ์— ํ•„์š”ํ•œ ์ถฉ๋ถ„ํ•œ ๋ผ์šด๋“œ ์ˆ˜๋ฅผ ๊ฐ€์ง€๋ฉฐ ์ด๊ฒƒ์€ ์•”ํ˜ธ๋ถ„์„์„ ๋”์šฑ

์–ด๋ ต๊ฒŒ ํ•œ๋‹ค . ํ‚ค ์˜์กด์  ๋ณด์•ˆ์„ฑ

DES ์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๊ณ ์ •๋œ S-box ๋ฅผ ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š”๋‹ค . RC5 ๋Š” ๋‹จ์ง€ ํ‚ค ์ˆ˜์—ด์— ์˜์กดํ•˜์—ฌ ์•”ํ˜ธํ™”๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค .

5. RC5

Page 39: Chapter 6 Contemporary Symmetric Ciphers

39Network & Information Security LabNetwork & Information Security Lab

๊ธด ํ‚ค ์Šค์ผ€์ฅด ์•Œ๊ณ ๋ฆฌ์ฆ˜ sub-key ๋กœ ๊ตฌ์„ฑ๋œ ํ‚ค ์ˆ˜์—ด์€ ๋‹จ์ผ ์•”ํ˜ธํ™”๋‚˜ ๋ณตํ˜ธํ™”์˜ ๊ทธ๊ฒƒ๋ณด๋‹ค ํ›จ์”ฌ

๊ธธ๋‹ค . ์ด๋Ÿฌํ•œ ํŠน์„ฑ์€ ์•”ํ˜ธ๋ฌธ ๋ถ„์„์„ ๋”์šฑ ์–ด๋ ต๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค .

๊ฐ€๋ณ€์  ํ‰๋ฌธ / ์•”ํ˜ธ๋ฌธ ๋ธ”๋ก ๊ธธ์ด ํ‰๋ฌธ ๋ธ”๋ก์˜ ๊ธธ์ด๋Š” ๋ณด์•ˆ์˜ ๊ฐ•๋„์™€ ๋น„๋ก€ํ•˜๋ฉฐ RC5 ๋Š”์ด๊ฒƒ์„ ๊ฐ€๋ณ€์ ์œผ๋กœ

์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค .

๊ฐ€๋ณ€์  ๋ผ์šด๋“œ ์ˆ˜ ๋ผ์šด๋“œ ์ˆ˜๋Š” ํ•ด๋…๊ณต๊ฒฉ์— ๋Œ€ํ•œ ์ €ํ•ญ์„ฑ์„ ๊ฒฐ์ • ํ•  ์ˆ˜ ์žˆ๋‹ค . ์ฆ‰ ๋งŽ์€

๋ผ์šด๋“œ ์ˆ˜๋ฅผ ๊ฐ€์งˆ์ˆ˜๋ก ๋ณด์•ˆ์„ฑ์ด ์ฆ๊ฐ€ํ•˜์ง€๋งŒ ์•” / ๋ณตํ˜ธํ™”์‹œ ์˜ค๋žœ ์‹œ๊ฐ„์ด ๊ฑธ๋ฆฐ๋‹ค . RC5 ๋Š” ์ด๋Ÿฌํ•œ ๋ผ์šด๋“œ๋ฅผ ๊ฐ€๋ณ€์ ์œผ๋กœ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์žˆ๋‹ค .

์•”ํ˜ธํ™” ์‹œ ์–‘์ชฝ ๋ฐ์ดํ„ฐ ๋ชจ๋‘ ์—ฐ์‚ฐ DES ์™€ ๊ฐ™์€ Feistel ๊ธฐ๋ฐ˜์˜ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ํ‰๋ฌธ์„ 2 ๊ฐœ์˜ ๋ธ”๋ก์œผ๋กœ

๋‚˜๋ˆ„์–ด ํ•œ์ชฝ ๋ถ€๋ถ„์— ๋Œ€ํ•ด์„œ๋งŒ ์—ฐ์‚ฐ ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•˜๋‚˜ , RC5 ๋Š” 2 ๊ฐœ์˜ ๋ชจ๋“  ๋ธ”๋ก์— ๋Œ€ํ•ด์„œ๋„ ์—ฐ์‚ฐ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ๋ณด์•ˆ ๊ฐ•๋„๋ฅผ ๋†’์ผ ์ˆ˜ ์žˆ๋‹ค .

5. RC5