ํ˜„๋Œ€ ์•”ํ˜ธ ๊ฐœ์š” 1

[๋ฒˆ์—ญ๊ธ€] ์•”ํ˜ธํ™” ๊ฐœ์š” ( Cryptography Overview )

์ด๊ธ€์€ Pratical Cryptograpy for developers ์— ์žˆ๋Š” ๋‚ด์šฉ์„ ๋ฒˆ์—ญํ•œ ๊ธ€์ž…๋‹ˆ๋‹ค.[์›๋ฌธ] ํ˜„๋Œ€ ์•”ํ˜ธํ™” ๊ฐœ์š” ( Overview of Modern Cryptography ) ์•”ํ˜ธํ™”๋Š” ์ตœ์ดˆ์˜ ์‹œ๋„(์ˆ˜์ฒœ๋…„ ์ „)์—์„œ ์‹œ์ž‘ ๋˜์–ด์„œ ๊ฐœ๋ฐœ์ž๋ฅผ ์œ„ํ•œ ์ตœ์ดˆ์˜ ์„ฑ๊ณต์ ์ธ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜(ํ˜„์žฌ๋Š” ์€ํ‡ดํ•œ MD5 ๋ฐ DES์™€ ๊ฐ™์€)์„ ํ†ตํ•ด ์ตœ์‹  ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜(SHA-3, Argon2 ๋ฐ ChaCha20๊ณผ ๊ฐ™์€)์œผ๋กœ ๋ฐœ์ „ํ–ˆ์Šต๋‹ˆ๋‹ค. ๋จผ์ € ๊ฐ„๋‹จํžˆ ์†Œ๊ฐœ ํ•˜๋ฉด ์•”ํ˜ธํ™” ํ•ด์‹œ ๊ธฐ๋Šฅ(SHA-256, SHA3, RIPEMD ๋“ฑ), HMAC(ํ•ด์‹œ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์ฝ”๋“œ), ํ‚ค ํŒŒ์ƒ ๊ธฐ๋Šฅ์— ๋Œ€ํ•œ ์•”ํ˜ธ(์˜ˆ: Scrypt), Diffie-Hellman ํ‚ค ๊ตํ™˜ ํ”„๋กœํ† ์ฝœ, ๋Œ€์นญ ํ‚ค ์•”ํ˜ธํ™” ์ฒด๊ณ„(์˜ˆ: CBC ๋ฐ CTR ๋ธ”๋ก ๋ชจ๋“œ๋ฅผ ์‚ฌ์šฉ..

PKI/Cryptography 2023.06.22
๋ฐ˜์‘ํ˜•