Cryptography


๋ชจ๋นŒ์œ„๋”์Šค๋Š” ๊ตญ๋‚ด ๋ฐ ๊ตญ์™ธ ํ‘œ์ค€ ์•”ํ˜ธ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๋งŒ์กฑํ•˜๋Š” ์•”ํ˜ธ๋ชจ๋“ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

"๋ณด์•ˆ ๊ธฐ์ˆ ์˜ ๊ธฐ์ดˆ๊ฐ€ ๋˜๋Š” ์•”ํ˜ธ ๊ธฐ์ˆ (Cryptography)" 

์ „๋ฌธ์ ์ธ
์•”ํ˜ธ ๊ธฐ์ˆ  ์ œ๊ณต


๋ชจ๋นŒ์œ„๋”์Šค๋Š” ์ปดํ“จํŒ… ํ™˜๊ฒฝ์˜ ๋ฐœ๋‹ฌ, ๋กœ๋ด‡ ๋ฐ ๋ชจ๋นŒ๋ฆฌํ‹ฐ ์ž„๋ฒ ๋””๋“œ ์œตํ•ฉ ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•˜์—ฌ

์–‘์ž๋‚ด์„ฑ์•”ํ˜ธ(Post Quantum Cryptography), ํ•˜๋“œ์›จ์–ด ์—ฐ์‚ฐ ๊ฐ€์†๊ธฐ(Hardware Accelerator),

ํ•˜๋“œ์›จ์–ด ๋ณด์•ˆ ๋ชจ๋“ˆ(Hardware Security Module)๋ฅผ ํ™œ์šฉํ•œ ์ „๋ฌธ์ ์ธ ์•”ํ˜ธ ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.


๊ตญ๋‚ด ๋ฐ ๊ธ€๋กœ๋ฒŒ ํ‘œ์ค€ ๋ฐ ๊ฒ€์ฆ ๊ธฐ์ค€์„ 100% ์ค€์ˆ˜ํ•˜์—ฌ

๊ณ ๊ฐ์‚ฌ ๊ฐœ๋ฐœ ํ™˜๊ฒฝ ๋ฐ ์„œ๋น„์Šค ์š”๊ตฌ ์‚ฌํ•ญ์— ์ตœ์ ํ™”๋œ ์•”ํ˜ธ ๋ชจ๋“ˆ์„

์†Œํ”„ํŠธ์›จ์–ด ๋ฐ ํŽŒ์›จ์–ด, ํ•˜๋“œ์›จ์–ด ํ˜•ํƒœ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

MOBIL CRYPTO+

๋ชจ๋นŒ ํฌ๋ฆฝํ† +

| ๊ตญ๋‚ด์™ธ ํ‘œ์ค€ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ง€์› ์•”ํ˜ธ ๋ชจ๋“ˆ


์—…๋ฌด์ž๋ฃŒ ํ˜น์€ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ €์žฅ, ํ†ต์‹  ์‹œ ๋ณดํ˜ธํ•˜๋Š” ๋ชฉ์ ์œผ๋กœ ์ •๋ณด์˜ ์œ ์ถœ, ์œ„๋ณ€์กฐ, ํ›ผ์† ๋“ฑ์„ ๋ฐฉ์ง€ํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ๋ฐ€์„ฑ, ๋ฌด๊ฒฐ์„ฑ, ์ธ์ฆ, ๋ถ€์ธ๋ฐฉ์ง€ ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ๊ตฌํ˜„ํ•˜๊ธฐ ์œ„ํ•œ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๊ตฌํ˜„ ์†Œํ”„ํŠธ์›จ์–ด์™€ ํŽŒ์›จ์–ด๋กœ ์ œ๊ณต


·๊ธ€๋กœ๋ฒŒ ์ž๋™์ฐจ OEM ๋ฐ ์ฐจ๋Ÿ‰์šฉ ๋ฐ˜๋„์ฒด์˜ ๋‹ค์–‘ํ•œ ํ˜ธํ™˜์„ฑ ํ™•๋ณด ๋ฐ ๊ฒ€์ฆ ์™„๋ฃŒ

·๊ตญ๋‚ด ๊ตญ์ •์› ์•”ํ˜ธ๋ชจ๋“ˆ ๊ฒ€์ฆ์ œ๋„ ๊ฒ€์ฆ ์ง„ํ–‰(์ค‘)

| ๊ตญ๋‚ด ์•”ํ˜ธ ๋ชจ๋“ˆ ์ง€์› ์•Œ๊ณ ๋ฆฌ์ฆ˜ (์•”ํ˜ธ๋ชจ๋“ˆ๊ฒ€์ฆ์ œ๋„ KCMVP ๊ฒ€์ฆ)


๊ตฌ๋ถ„์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋น„๊ณ 
๋ธ”๋ž™ ์•”ํ˜ธ

ARIAIKI:128/192/256

Mode: ECB/CBC/CTR/CCM/GCM

ํŽŒ์›จ์–ด ๋ฐ
์†Œํ”„ํŠธ์›จ์–ด
ํ˜•ํƒœ ์ง€์›

ํ•ด์‹œํ•จ์ˆ˜

SHA256

๋ฉ”์‹œ์ง€ ์ธ์ฆ

HMAC: SHA256

GMAC:ARIA, | K | :128/192/256

CMAC:ARIA,  | K | :128/192/256

๋‚œ์ˆ˜๋ฐœ์ƒ๊ธฐ

CTR-DRBG, ARIA, K1:128

์ „์ž์„œ๋ช…

ECDSA(p-256, SHA256)

ํ‚ค์„ค์ •

ECDH(p-256)


| ๊ตญ์ œ ์•”ํ˜ธ ๋ชจ๋“ˆ ์ง€์› ์•Œ๊ณ ๋ฆฌ์ฆ˜


๊ตฌ๋ถ„์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋น„๊ณ 

Block Cipher

ARIAIKI:128/192/256

Mode: ECB/CBC/CTR/GCM/XTS

ํ•˜๋“œ์›จ์–ด์—”์ง„ ๋ฐ

์†Œํ”„ํŠธ์›จ์–ด

ํ˜•ํƒœ ์ง€์›


Hash

SHA256/512

MAC

HMAC: SHA256/512

GMAC: AES, | K | :128/256

CMAC: AES, | K | :128/256

RNG

TRNG

DSA

RSA(1024,2048)-PSS/PKCS#1.5

ECDSA(P-256, SHA256)

KEM

ECDH(p-256)

PBKDF2


MOBIL Post Quantum+

๋ชจ๋นŒ ์–‘์ž๋ณด์•ˆ+

| ์–‘์ž ๋‚ด์„ฑ ์•”ํ˜ธ ๋ชจ๋“ˆ


์–‘์ž ์ปดํ“จํŒ… ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•˜์—ฌ, ํ˜„์žฌ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๋ฌด๋ ฅํ™”๋ฅผ ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ๋Š”

์•ˆ์ „ํ•œ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์†Œํ”„ํŠธ์›จ์–ด๋กœ ์ œ๊ณต


MOBIL Consulting

๋ชจ๋นŒ ์ปจ์„คํŒ… ์„œ๋น„์Šค

| ๊ณ ๊ฐ ๋งž์ถค ์•”ํ˜ธ๋ชจ๋“ˆ ์ปจ์„คํŒ… ์„œ๋น„์Šค


Application ๋ฐ ์„œ๋น„์Šค์— ๋”ฐ๋ผ, ํ˜น์€ ๋ฐ˜๋„์ฒด ํŠนํ™” ํ™˜๊ฒฝ ๋“ฑ ํŠน์ˆ˜ ๊ตฌํ˜„ ๊ฐœ๋ฐœ ์š”๊ตฌ์‚ฌํ•ญ ๋ฐ ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•œ ์•”ํ˜ธ๋ชจ๋“ˆ ์„ค๊ณ„ ๋ฐ ๋งž์ถคํ˜• ์ปจ์„คํŒ…์„ ์ œ๊ณต


·Automotive ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•œ MCAL ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ถ”๊ฐ€ ๊ตฌํ˜„

·Robot, Drone ๋“ฑ ํŠน์ˆ˜ ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•œ ์•”ํ˜ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ฐ ์ธ์ฆ ํ”„๋กœํ† ์ฝœ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„

·ARM, MIPS, RISK-V, x86 ๋“ฑ ์•„ํ‚คํ…์ฒ˜ ๊ณ ๋ ค ํ™˜๊ฒฝ

·๊ณ ๊ฐ ๋งž์ถคํ˜• Evaluation Board ์ œ์ž‘

·์†Œ๋ชจ ์ „๋ ฅ ์ตœ์†Œํ™” ๋ฐ ์„ฑ๋Šฅ ์ตœ์ ํ™” ๋ฐฉ์•ˆ ๋„์ถœ