Home ๐ŸŒ [Network] Encryption ๐ŸŒ
Post
Cancel

๐ŸŒ [Network] Encryption ๐ŸŒ

๐ŸŒ ์•”ํ˜ธํ™”(Encryption) & ๋ณตํ˜ธํ™”(Decryption)

์•”ํ˜ธํ™”(Encryption)๋ž€ ์›๋ฌธ ๋ฐ์ดํ„ฐ๋ฅผ ์•Œ์•„๋ณผ ์ˆ˜ ์—†๋Š” ํ˜•ํƒœ๋กœ ๋ณ€๊ฒฝํ•˜๋Š” ๊ฒƒ์„ ๋งํ•˜๊ณ  ๋ณตํ˜ธํ™”(Decryption)๋ž€ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์›๋ฌธ ๋ฐ์ดํ„ฐ๋กœ ๋˜๋Œ๋ฆฌ๋Š” ๊ณผ์ •์„ ๋งํ•ฉ๋‹ˆ๋‹ค.

์•”ํ˜ธํ™”์˜ ์ข…๋ฅ˜์—๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ฒƒ๋“ค์ด ์žˆ์Šต๋‹ˆ๋‹ค.

ย ๋Œ€์นญ ํ‚ค ์•”ํ˜ธํ™”(Symmetric Key Cryptography)๋น„๋Œ€์นญ ํ‚ค ์•”ํ˜ธํ™”(Asymmetric Key Cryptography)
์„ค๋ช…์•”ํ˜ธํ™”์™€ ๋ณตํ˜ธํ™”์— ๋™์ผํ•œ Key๋ฅผ ์‚ฌ์šฉ์•”ํ˜ธํ™”๋ฅผ ์œ„ํ•œ Key(Public Key)์™€ ๋ณตํ˜ธํ™”๋ฅผ ์œ„ํ•œ Key(Private Key)๊ฐ€ ๋‹ค๋ฆ„
์žฅ์ ์ ์€ ๋ถ€ํ•˜๋กœ ์•”ํ˜ธํ™” ๋ฐ ๋ณตํ˜ธํ™”๋ฅผ ๋น ๋ฅด๊ฒŒ ์ˆ˜ํ–‰Key๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ๊ณต์œ  ๊ฐ€๋Šฅ
๋‹จ์ Key๊ฐ€ ์œ ์ถœ ์šฐ๋ ค๊ฐ€ ์žˆ์Œ์‹œ๊ฐ„์ด ์˜ค๋ž˜ ๊ฑธ๋ฆผ

๐ŸŒ ์ธ์ฆ์„œ์™€ ๋””์ง€ํ„ธ ์„œ๋ช…

Network์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ธ์ฆ์„œ(Certificate)๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ๊ณต๊ฐœ ํ‚ค ์ธ์ฆ์„œ(Public Key Certificate)๋ฅผ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค.

๊ณต๊ฐœ ํ‚ค ์ธ์ฆ์„œ๋ž€ Public Key์˜ ์œ ํšจ์„ฑ์„ ์ž…์ฆํ•˜๊ธฐ ์œ„ํ•œ ์ „์ž ๋ฌธ์„œ์ž…๋‹ˆ๋‹ค.

Client์™€ Server๊ฐ€ ๊ณต๊ฐœ ํ‚ค ์•”ํ˜ธํ™” ๋ฐฉ์‹์œผ๋กœ ํ†ต์‹ ํ•  ๋•Œ Server๋กœ๋ถ€ํ„ฐ ์ „๋‹ฌ๋ฐ›์€ Public Key๊ฐ€ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” Key์ธ์ง€ Client๊ฐ€ ํ™•์‹ ํ•˜๊ธฐ ์œ„ํ•ด Server๋Š” Public Key์™€ ํ•จ๊ป˜ ์กฐ์ž‘๋˜์ง€๋Š” ์•Š์•˜๋Š”์ง€, ์œ ํšจ๊ธฐ๊ฐ„์€ ์–ธ์ œ๊นŒ์ง€์ธ์ง€ ๋“ฑ์˜ ์ •๋ณด๋ฅผ ํฌํ•จํ•˜๋Š” ์ธ์ฆ์„œ๋ฅผ ์ „์†กํ•ฉ๋‹ˆ๋‹ค.

์ด๋Ÿฌํ•œ ์ธ์ฆ์„œ๋Š” ์ธ์ฆ ๊ธฐ๊ด€(CA; Certification Authority)์ธ ์ œ 3์˜ ๊ธฐ๊ด€์—์„œ ๋ฐœ๊ธ‰ ๋ฐ›์Šต๋‹ˆ๋‹ค. ์ธ์ฆ์„œ์—๋Š” CA๊ฐ€ ์ธ์ฆํ–ˆ๋‹ค๋Š” ํ‘œ์‹œ์˜ ์„œ๋ช…๊ฐ’(Signature)์ด ์žˆ์Šต๋‹ˆ๋‹ค. Client๋Š” Signature๋ฅผ ํ†ตํ•ด ์ธ์ฆ์„œ๋ฅผ ๊ฒ€์ฆํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์„œ๋ช…๊ฐ’(Signature): ์ธ์ฆ์„œ ๋‚ด์šฉ์— ๋Œ€ํ•œ ํ•ด์‹œ ๊ฐ’์„ CA์˜ Private Key๋กœ ์•”ํ˜ธํ™” ํ•˜๋Š” ๋ฐฉ์‹

๊ณต๊ฐœ ํ‚ค ์ธ์ฆ์„œ๋กœ Public Key์˜ ์œ ํšจ์„ฑ์„ ์ž…์ฆํ•˜๋Š” ๊ณผ์ •(Digital Signature)์„ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.

1๏ธโƒฃ ์ธ์ฆ์„œ ๋‚ด์šฉ์— ๋Œ€ํ•œ ํ•ด์‹œ ๊ฐ’์„ CA์˜ Private Key๋กœ ์•”ํ˜ธํ™”(Signature)
2๏ธโƒฃ CA๋Š” Signature์™€ ์ธ์ฆ์„œ๋ฅผ ํ•จ๊ป˜ Client์—๊ฒŒ ์ „๋‹ฌ
3๏ธโƒฃ Client๋Š” Signature์™€ ์ธ์ฆ์„œ๋ฅผ ๋ถ„๋ฆฌ
4๏ธโƒฃ CA๊ฐ€ ๊ณต๊ฐœํ•œ Public Key๋กœ Signature๋ฅผ ๋ณตํ˜ธํ™”ํ•˜์—ฌ ์ธ์ฆ์„œ ๋‚ด์šฉ์— ๋Œ€ํ•œ ํ•ด์‹œ ๊ฐ’ ํš๋“
5๏ธโƒฃ ์ธ์ฆ์„œ์— ๋Œ€ํ•œ ํ•ด์‹œ ๊ฐ’์„ ์ง์ ‘ ๊ตฌํ•œ ๋’ค 4๋ฒˆ์˜ ํ•ด์‹œ ๊ฐ’๊ณผ ๋น„๊ต
6๏ธโƒฃ ํ•ด์‹œ ๊ฐ’์ด ์ผ์น˜ํ•œ๋‹ค๋ฉด ์ „๋‹ฌ๋ฐ›์€ ์ธ์ฆ์„œ๋Š” ํ™•์‹คํžˆ CA์˜ Private Key๋กœ ๋งŒ๋“ค์–ด์กŒ๋‹ค๊ณ  ๋ณด์žฅํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ Public Key์˜ ์œ ํšจ์„ฑ์„ ์ธ์ฆ
This post is licensed under CC BY 4.0 by the author.

๐ŸŒ [Network] TCP/IP Model - Wi-Fi ๐ŸŒ

๐ŸŒ [Network] Load Balancing & Proxy ๐ŸŒ