보고서 정보
주관연구기관 |
국가수리과학연구소 |
연구책임자 |
심경아
|
참여연구자 |
박철민
,
구남훈
|
보고서유형 | 최종보고서 |
발행국가 | 대한민국 |
언어 |
한국어
|
발행년월 | 2016-01 |
과제시작연도 |
2015 |
주관부처 |
미래창조과학부 KA |
사업 관리 기관 |
국가수리과학연구소 |
등록번호 |
TRKO201600000671 |
과제고유번호 |
1711032701 |
DB 구축일자 |
2016-04-23
|
키워드 |
경량 암호알고리즘,다변수 이차식 기반 암호알고리즘,익명성,특수 암호알고리즘,양자 컴퓨터,부채널 공격Lightweight Cryptographic Algorithm,Public-key Cryptography based on Multivariate Quadratic Equations,Special-purposed Cryptographic Algorithm,Anonymity,Quantum Computer,Side Channel Attack
|
초록
◦ 양자 컴퓨터에 안전한 수학적 난제에 기반을 둔 경량 암호알고리즘 설계
- 다변수 이차식 기반 암호알고리즘 안전성 분석
- 다변수 이차식 기반 전자서명 알고리즘의 경량 키생성/압축 알고리즘 설계
- 다변수 이차식 기반 전자서명 알고리즘 최적 구현
- 다변수 이차식 기반 암호알고리즘의 부채널 공격에 대한 대응법 설계 및 구현
◦ 응용환경에서 요구되는 특별한 기능을 갖는 암호알고리즘 설계 및 안전성 증명
- 익명성을 갖는 특수 암호알고리즘 설계 및 안전성 분석
Abstract
▼
II. Objective and Necessity
□ Objective of Research : Development of lightweight cryptographic algorithms and special-purposed cryptographic algorithms for resource-restricted small hardware in Internet of Things
□ Necessity of Research
○ Privacy risk is the biggest obstacle of industrial r
II. Objective and Necessity
□ Objective of Research : Development of lightweight cryptographic algorithms and special-purposed cryptographic algorithms for resource-restricted small hardware in Internet of Things
□ Necessity of Research
○ Privacy risk is the biggest obstacle of industrial realization in Internet of Things. Forgery of information detected and transmitted from sensors causes life-critical results in U-health care system and intelligent vehicular system. Therefore, cryptographic algorithms with functions such as integrity, authentication and confidentiality are absolutely required to prevent forgery of information transmitted. Therefore, development of efficient cryptographic algorithms is indispensible.
○ As the number of applications on the Internet continues to grow, more and more traditional human interactions have been converted to their electronic counterparts: messaging, voting, payments, commerce, etc. The increase in reliance on the Internet potentially erodes personal privacy, the right of the individual to be let alone, or the right to determine the amount of personal information which should be available to others. Privacy is important for many reasons, such as impersonation and fraud. As more identity information is collected, correlated, and sold, it becomes easier for criminals to commit fraud. Privacy is more than that, it also concerns about the secrecy of which web sites we visited, the candidates we voted for, etc. Anonymity, traceability, and unlinkability are important forms of privacy protection. Like this, to achieve security required in various applications with cloud-to-user's smart device environment, special-purposed cryptographic algorithms are needed. Also, the cost-effectiveness comes with strong limitation of computational capabilities of user's smart devices. Current devices with limited resources can hardly afford for security mechanisms relying on complex cryptographic operations to counter the security and privacy threats. Thus, efficient spe cial-purposed cryptographic algorithms should be proposed.
○ Cryptographic primitives are fundamental building blocks for security schemes to achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say that the selection and integration of appropriate cryptographic primitives into the security protocols determines the efficiency and energy conservation of the whole scheme. As well as the development of cryptographic primitives, to study how to integrate a set of appropriate cryptographic primitives into security protocols to achieve all security requirements is also important.
○ The media has reported the risk of exposure and reproduction of encryption keys in the Industry Standard block cipher, SEED, mounted on a financial IC-card. In addition, the Korea Standard, ARIA, and the international standard, AES, are also vulnerable to the same side channel attacks exposing the encryption key in seconds. Therefore, ultra-lightweight block ciphers resistant to side channel attacks must be developed.
○ At 1995, Shor presented an efficient quantum algorithm to solve the Integer Factorization problem (IFP) and the Discrete Logarithm problem (DLP) in finite fields, DLP on elliptic curves, and DLP in general class groups in polynomial time. As a result, the existence of quantum computers in the range of 1000 bits would be a real-world threat to break RSA, Diffie-Hellman key exchange, DSA, and ECDSA the most widely used public-key cryptographic algorithms. There is an increasing demand in investigating possible alternatives. Thus, developing new public-key cryptographic algorithms based on the mathematical hard problems secure against the quantum algorithm is needed.
◦ The advent of a new era for Internet of Things (IoT) which is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure, the ability to network embedded devices with limited CPU, memory and power resources means that IoT finds applications in nearly every field. To support secure communication and authentication among these IoT devices, it need to develop a lightweight cryptographic algorithm, in particular digital signature scheme since exiting public-key cryptographic algorithms are very heavy and expensive such a resource-constrained device.
III. Contents and Scopes
○ Design of lightweight public-key cryptographic algorithm based on the mathematical hard problems secure against the Quantum Computer
- Analysis of algorithms for solving the mathematical hard problems secure against the Quantum Computer
- Security analysis of public-key cryptographic algorithm based on the multivariate quadratic equations
- Design of lightweight key generation/reduction algorithms for public-key signature scheme based on the multivariate quadratic equations
- Optimal implementation of public-key cryptographic algorithm based on the multivariate quadratic equations
- Design and Implementation of countermeasures for public-key cryptographic algorithm based on the multivariate quadratic equations against side channel attacks
◦ Design and Security proofs of special-purposed cryptographic algorithms
- Security analysis of special-purposed cryptographic algorithms
IV. Expected Effects and Utilization
◦ The development of new lightweight cryptographic algorithms for devices with limited resources will be expected to be energy saving effect. It will enable such devices to consume lower power and therefore improve battery life.
◦ This research will contribute to secure fundamental technology for Internet of Things in Korea, and take the lead in the international standards.
◦ The proposed efficient special-purposed cryptographic algorithms will contribute to dominate the global market in advance, and thereby increase national wealth through international standardization.
◦ The proposed lightweight cryptographic algorithms can be applied to support secure communication and authentication among the resource-restricted smart devices,. The proposed special-purposed cryptographic algorithms can be utilized in the real world, including m-Healthcare system, vehicular ad hoc networks, smart car, home security, military operations, and industrial machine monitoring.
목차 Contents
- 표지 ... 1
- 제출문 ... 3
- 보고서 요약서 ... 4
- 요약문 ... 5
- SUMMARY ... 9
- 목차 ... 12
- 표목차 ... 13
- 그림목차 ... 14
- CONTENTS ... 15
- 제 1 장. 연구과제의 개요 ... 17
- 제 1 절. 연구개발 목표 ... 17
- 제 2 절. 연구개발 내용 및 범위 ... 18
- 제 2 장. 국내․외 기술개발 현황 ... 19
- 제 1 절. 다변수 이차식 기반 암호알고리즘 연구 동향 ... 19
- 제 2 절. 다변수 이차식 기반 암호알고리즘 키길이 축소 연구 동향 ... 28
- 제 3 절. 다변수 이차식 기반 암호알고리즘의 설계 원칙 ... 44
- 제 3 장. 연구개발 수행 내용 및 결과 ... 52
- 제 1 절. Rainbow 전자서명의 키생성/축소 알고리즘 설계 ... 52
- 제 2 절. Rainbow 전자서명의 서명 생성/검증 경량화 기법 설계 ... 58
- 제 3 절. 다변수 이차식 기반 암호알고리즘 부채널 공격에 대한대응법 ... 64
- 제 4 장. 연구개발 목표 달성도 및 대외기여도 ... 73
- 제 5 장. 연구개발 결과의 활용계획 ... 76
- 제 6 장. 참고문헌 ... 77
- 끝페이지 ... 80
※ AI-Helper는 부적절한 답변을 할 수 있습니다.