MJay

정보 보호 본문

카테고리 없음

정보 보호

MJSon 2017. 9. 12. 15:09
Edit

정보 보호

정보보호특론 정보보호특론

정보 보호의 목적

  1. Confidentiality
  2. Integrity
  3. Availiablity
  4. Authentication

정보를 나쁘게 쓰는 Case

  1. cipher-text only attack
    1. brute force
    2. statistical analysis
  2. chosen-plain text attack

DES

1. Data Encryption Standarard

  1. 64bit
  2. 해독할 수 있다
  3. 블록 암호이다. (암호학에서 블록 암호(block cipher)란 기밀성 있는 정보를 정해진 블록 단위로 암호화하는 대칭키 암호 시스템이다. 만약 암호화하려는 정보가 블록 길이보다 길 경우에는 특정한 운용 모드가 사용된다.
  4. 16 identical rounds of function application each using different 48 bits of key

AES

  1. Advanced Encryption Standard
  2. Symmetric이다.

Public Key Cryptography

  1. sender랑 receiver가 secret key를 더 share 하지 않는다.
  2. public key를 모두가 알고 있다.

RSA를 통해 Public과 Private Key 만들기

Block vs Stream, Symmetric vs Assymetric

%23%23%23%uC815%uBCF4%20%uBCF4%uD638%0A%0A@%28%uC815%uBCF4%uBCF4%uD638%uD2B9%uB860%29%5B%uC815%uBCF4%uBCF4%uD638%uD2B9%uB860%5D%0A%0A%23%23%23%23%20%uC815%uBCF4%20%uBCF4%uD638%uC758%20%uBAA9%uC801%0A1.%20Confidentiality%0A2.%20Integrity%0A3.%20Availiablity%0A4.%20Authentication%0A%0A%23%23%23%23%20%uC815%uBCF4%uB97C%20%uB098%uC058%uAC8C%20%uC4F0%uB294%20Case%0A1.%20cipher-text%20only%20attack%0A%091.%20brute%20force%0A%092.%20statistical%20analysis%0A2.%20chosen-plain%20text%20attack%0A%0A%23%23%23%23%20DES%0A%091.%20Data%20Encryption%20Standarard%0A%092.%2064bit%0A%093.%20%uD574%uB3C5%uD560%20%uC218%20%uC788%uB2E4%0A%094.%20%uBE14%uB85D%20%uC554%uD638%uC774%uB2E4.%20%28%uC554%uD638%uD559%uC5D0%uC11C%20%uBE14%uB85D%20%uC554%uD638%28block%20cipher%29%uB780%20%uAE30%uBC00%uC131%20%uC788%uB294%20%uC815%uBCF4%uB97C%20%uC815%uD574%uC9C4%20%uBE14%uB85D%20%uB2E8%uC704%uB85C%20%uC554%uD638%uD654%uD558%uB294%20%uB300%uCE6D%uD0A4%20%uC554%uD638%20%uC2DC%uC2A4%uD15C%uC774%uB2E4.%20%uB9CC%uC57D%20%uC554%uD638%uD654%uD558%uB824%uB294%20%uC815%uBCF4%uAC00%20%uBE14%uB85D%20%uAE38%uC774%uBCF4%uB2E4%20%uAE38%20%uACBD%uC6B0%uC5D0%uB294%20%uD2B9%uC815%uD55C%20%uC6B4%uC6A9%20%uBAA8%uB4DC%uAC00%20%uC0AC%uC6A9%uB41C%uB2E4.%0A%095.%2016%20identical%20rounds%20of%20function%20application%20each%20using%20different%2048%20bits%20of%20key%0A%0A%0A%23%23%23%23%20AES%0A1.%20Advanced%20Encryption%20Standard%0A2.%20Symmetric%uC774%uB2E4.%0A%0A%23%23%23%23%20Public%20Key%20Cryptography%0A1.%20sender%uB791%20receiver%uAC00%20secret%20key%uB97C%20%uB354%20share%20%uD558%uC9C0%20%uC54A%uB294%uB2E4.%0A2.%20public%20key%uB97C%20%uBAA8%uB450%uAC00%20%uC54C%uACE0%20%uC788%uB2E4.%0A3.%20%21%5BAlt%20text%5D%28./1504674486682.png%29%0A%0A%23%23%23%23%20RSA%uB97C%20%uD1B5%uD574%20Public%uACFC%20Private%20Key%20%uB9CC%uB4E4%uAE30%0A%21%5BAlt%20text%5D%28./1504674528013.png%29%0A%0A%20%0A%23%23%23%23%20Block%20vs%20Stream%2C%20Symmetric%20vs%20Assymetric