PQ3 and PQC ๐Ÿ—๏ธ

Apple์—์„œ ์กฐ๋งŒ๊ฐ„ iMessage์— PQ3๋ผ๋Š” ์•”ํ˜ธํ™” ํ”„๋กœํ† ์ฝœ์„ ์ ์šฉํ•  ์˜ˆ์ •์ด๋ผ๊ณ  ๋ฐœํ‘œํ–ˆ์Šต๋‹ˆ๋‹ค.

๊ฐœ์ธ์ ์œผ๋กœ PQC1์— ๊ด€์‹ฌ์žˆ์—ˆ๊ณ , ์ผ์ ์œผ๋กœ๋„ ์ ‘์ ์ด ์žˆ์–ด ์ข…์ข… ์ฐพ์•„๋ณด๊ณค ํ—€์—ˆ๋Š”๋ฐ, ์ด๋ฒˆ PQ3์— ๋Œ€ํ•œ ๋‚ด์šฉ์€ PQC๋ฅผ ์‹ค์ œ๋กœ ์„œ๋น„์Šค์— ์ ์šฉํ•˜๋Š” ๊ฒฝ์šฐ๋ผ์„œ ์žฌ๋ฏธ์žˆ๊ฒŒ ์ฝ์—ˆ์Šต๋‹ˆ๋‹ค. ๋ค์œผ๋กœ PQC rekeyring์— ๋Œ€ํ•œ ๋‚ด์šฉ๋„ ์žˆ์–ด ํฅ๋ฏธ๋กœ์› ์Šต๋‹ˆ๋‹ค. ์˜ค๋Š˜์€ PQC์™€ PQ3์— ๋Œ€ํ•œ ๋‚ด์šฉ์œผ๋กœ ๊ฐ„๋‹จํ•˜๊ฒŒ ๊ธ€ ์ž‘์„ฑํ•ด๋ด…๋‹ˆ๋‹ค.

Post-quantum cryptography

Post-quantum cryptography (PQC)๋Š” ์–‘์ž ์ปดํ“จํ„ฐ์˜ ๋“ฑ์žฅ์œผ๋กœ ๊ธฐ์กด์˜ ์•”ํ˜ธ ์ฒด๊ณ„๊ฐ€ ๊นจ์งˆ ๊ฐ€๋Šฅ์„ฑ์— ๋Œ€๋น„ํ•˜์—ฌ ๊ฐœ๋ฐœ๋œ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค. ๊ธฐ์กด์˜ ๋งŽ์€ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•๋“ค, ํŠนํžˆ ๊ณต๊ฐœํ‚ค ์•”ํ˜ธํ™” ๋ฐฉ์‹์€ ํฐ ์†Œ์ˆ˜๋ฅผ ์†Œ์ธ์ˆ˜๋ถ„ํ•ดํ•˜๋Š” ๊ฒƒ์ด ์–ด๋ ต๋‹ค๋Š” ์ˆ˜ํ•™์ ์ธ ๋ฌธ์ œ๋ฅผ ๊ธฐ๋ฐ˜์„ ๋‘๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

์ด๋Š” ์ปดํ“จํŒ… ์„ฑ๋Šฅ์— ๋ฐ€์ ‘ํ•˜๊ฒŒ ์˜ํ–ฅ์„ ๋ฐ›๋Š”๋ฐ, ์–‘์ž ์ปดํ“จํ„ฐ๊ฐ€ ์ถฉ๋ถ„ํ•˜๊ฒŒ ๋ฐœ์ „ํ•œ๋‹ค๋ฉด ์†Œ์ธ์ˆ˜๋ถ„ํ•ด ๋ฌธ์ œ๋ฅผ ํฌํ•จํ•ด ๊ธฐ์กด์˜ ์•”ํ˜ธํ™” ๋ฐฉ์‹์„ ๊นจ๋œจ๋ฆด ์ˆ˜ ์žˆ๋Š” ํšจ์œจ์ ์ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ๋‚˜ํƒ€๋‚  ์ˆ˜ ์žˆ๊ณ  ์ด๋ฅผ ๋Œ€๋น„ํ•˜์—ฌ ๊ฐœ๋ฐœํ•˜๋Š” ์•”ํ˜ธํ™” ๋กœ์ง๋“ค์„ ์ง€์นญํ•˜๋Š” ์šฉ์–ด์ž…๋‹ˆ๋‹ค.

PQ3

Key Establishment & Hybrid design

PQ3๋Š” ๋Œ€ํ™” ์‹œ์ž‘๋ถ€ํ„ฐ PQC๋ฅผ ์ ์šฉํ•ฉ๋‹ˆ๋‹ค. ์ดˆ๊ธฐ ํ‚ค ์„ค์ • ๋ฉ”์ปค๋‹ˆ์ฆ˜์€ Kyber๋ฅผ ํ†ตํ•ด ๋ฐœ์‹ ์ž๊ฐ€ ์ˆ˜์‹ ์ž์˜ ๊ณต๊ฐœ ํ‚ค๋ฅผ ํš๋“ํ•˜๊ณ , ์ฒซ ๋ฒˆ์งธ ๋ฉ”์‹œ์ง€๋ฅผ ์œ„ํ•œ post-quantum ์•”ํ˜ธํ™” ํ‚ค์™€ ECC(ํƒ€์›๊ณก์„ ๊ธฐ๋ฐ˜) ํ‚ค ์„ธํŠธ๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ์ฐธ๊ณ ๋กœ ์•”ํ˜ธํ™” ํ‚ค ์„ธํŠธ๋Š” ๊ฐ ๋””๋ฐ”์ด์Šค ๋ณ„๋กœ ๋งŒ๋“ ๋‹ค๊ณ  ํ•˜๋„ค์š”. (e.g iPhone, Macbook, iPad)

๊ฒฐ๊ณผ์ ์œผ๋กœ iMessage๋Š” 2๊ฐœ์˜ ๊ณต๊ฐœ ํ‚ค๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.

  • A post-quantum Kyber-1024 key encapsulation public key
  • A classical P-256 Elliptic Curve key agreement public key

๊ทธ๋ฆฌ๊ณ  ์ด๋ฅผ ํ†ตํ•ด ์•”ํ˜ธํ™” ์„ธ์…˜ ์„ค์ • ์‹œ ๊ฐ๊ฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ถ€ํ„ฐ ์–ธ์–ด๋‚ธ 2๊ฐœ์˜ ๋Œ€์นญ ํ‚ค๋ฅผ ๋ชจ๋‘ ์‚ฌ์šฉํ•˜์—ฌ ์„ธ์…˜์˜ ์•”ํ˜ธํ™”์— ์‚ฌ์šฉํ•  ์ดˆ๊ธฐ ํ‚ค๋ฅผ ๋งŒ๋“ค๊ธฐ ๋•Œ๋ฌธ์— ๊ณต๊ฒฉ์ž ์ž…์žฅ์—์„  ECC์™€ PQC ๋ชจ๋‘๋ฅผ ๊นจ์•ผ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณตํ˜ธํ™”ํ•  ์ˆ˜ ์žˆ์–ด ์ „ํ†ต์ ์ธ ๊ณต๊ฒฉ๊ณผ ์–‘์ž ์•”ํ˜ธ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋™์‹œ ๋Œ€์‘์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•ฉ๋‹ˆ๋‹ค.

์ด์™ธ์—๋„ ECDSA ์„œ๋ช…, Contact Key Verification์„ ํ†ตํ•ด ํ†ตํ•ด ๋‹ค์šด๊ทธ๋ ˆ์ด๋“œ ๊ณต๊ฒฉ์„ ๋ฐฉ์ง€ํ•˜๊ณ  ์ธ์ฆ ํ‚ค์™€ ๋ฒ„์ „ ์ •๋ณด๋ฅผ ๊ฒ€์ฆํ•˜๋Š” ๋“ฑ ์—ฌ๋Ÿฌ๊ฐ€์ง€ ๋ณด์•ˆ ์š”์†Œ๋“ค์ด ๊ณ ๋ ค๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

Rekeying Mechanism

PQ3๋Š” rekeying ๋งค์ปค๋‹ˆ์ฆ˜์„ ๊ฐ€์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. rekey๋ฅผ ์ด์šฉํ•˜์—ฌ ์•”ํ˜ธํ™”ํ‚ค๋ฅผ ์ง€์†์ ์œผ๋กœ ๋ณ€๊ฒฝํ•˜๊ณ , ํ‚ค๊ฐ€ ํƒˆ์ทจ๋˜์–ด๋„ ๋ณตํ˜ธํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๋ฉ”์‹œ์ง€์˜ ๋ฒ”์œ„๊ฐ€ ์ œํ•œ๋˜๊ธฐ ๋–„๋ฌธ์— ๋ฉ”์„ธ์ง€ ๋ณด์•ˆ์„ฑ์„ ๊ณ ๋ คํ•˜๋ฉด ๋†’์€ ์ˆ˜์ค€์˜ ์•”ํ˜ธ ๋กœ์ง์„ ๊ณ ๋ คํ–ˆ๋‹ค๊ณ  ์ƒ๊ฐํ•ฉ๋‹ˆ๋‹ค.

Rekeying์€ ๋งค๋ฒˆ ๋ฉ”์‹œ์ง€ ์•”ํ˜ธํ™” ์‹œ ์‹ ๊ทœ ํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  ์†ก,์ˆ˜์‹  ๋งˆ๋‹ค ์•”ํ˜ธํ‚ค๋ฅผ ํ๊ธฐํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ๊ตฌํ˜„๋œ ๊ฒƒ ๊ฐ™๊ณ , ๋ฉ”์‹œ์ง€ ์‚ฌ์ด์ฆˆ ๋•Œ๋ฌธ์— ์ผ์ •ํ•œ ์ฃผ๊ธฐ? ๊ฐ™์€๊ฒŒ ์„ค์ •๋˜์–ด ์žˆ๋Š” ๊ฒƒ ๊ฐ™์Šต๋‹ˆ๋‹ค.

1. ์†ก์‹ ์ž
  1-1. ์†ก์‹ ์ž๊ฐ€ ๋ฉ”์‹œ์ง€ ํ‚ค๋ฅผ ์ƒ์„ฑํ•œ ํ›„ ๋ฉ”์‹œ์ง€๋ฅผ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์ „์†กํ•ฉ๋‹ˆ๋‹ค.
  1-2. ๋ฉ”์‹œ์ง€ ์†ก์‹  ํ›„ ์•”ํ˜ธํ‚ค๋ฅผ ์‚ญ์ œํ•ฉ๋‹ˆ๋‹ค.
2. ์ˆ˜์‹ ์ž
  2-1. ๋ฉ”์‹œ์ง€ ์ˆ˜์‹  ์‹œ ํ‚ค๋ฅผ ์ด์šฉํ•ด ๋ณตํ˜ธํ™”ํ•ฉ๋‹ˆ๋‹ค.
  2.2. ๋ณตํ˜ธํ™” ํ›„ ์•”ํ˜ธํ‚ค๋ฅผ ์‚ญ์ œํ•ฉ๋‹ˆ๋‹ค.

์ œ๊ฐ€ ๋‹จ์ˆœํ•˜๊ฒŒ ํ‘œํ˜„ํ•˜์˜€์ง€๋งŒ ์ด ๊ณผ์ •์—์„  ๋ฉ”์‹œ์ง€์˜ ๊ณผ๊ฑฐ, ๋ฏธ๋ž˜์˜ ๋ณด์•ˆ์„ฑ์„ ๋ณด์žฅํ•˜๋Š” ๋ฐฉ๋ฒ• ๋“ฑ๋„ ๊ณ ๋ ค๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

Appleโ€™s roadmap?

Apple์€ Messaging App์—์„œ์˜ ์•”ํ˜ธํ™” ๊ด€๋ จํ•ด์„œ ์š”๊ตฌ๋˜๋Š” ๋‚ด์šฉ์„ ๊ธฐ๋ฐ˜์œผ๋กœ Level์„ ๋ถ„๋ฆฌํ•ด์„œ ๊ด€๋ฆฌํ•˜๋Š” ๊ฒƒ ๊ฐ™์Šต๋‹ˆ๋‹ค.

https://security.apple.com/blog/imessage-pq3/

Conclusion

๋Œ€๋‹ค์ˆ˜ ์—”์ง€๋‹ˆ์–ด๋ง์ด ๊ทธ๋ ‡๋“ฏ์ด ์–ด๋–ค ๊ฒฐ๊ณผ๋“  ๋งŽ์€ ๊ณ ๋ฏผ๊ณผ ์ง€์‹์ด ํ•จ์ถ•๋˜์–ด ์žˆ๋‹ค๊ณ  ์ƒ๊ฐํ•ฉ๋‹ˆ๋‹ค. ์ง์ ‘์ ์œผ๋กœ ์•Œ ์ˆ˜๋Š” ์—†์ง€๋งŒ ๋ณด์•ˆ์„ฑ์„ ์œ„ํ•œ ์„ค๊ณ„, ๊ทธ๋ฆฌ๊ณ  ์ด๋ฅผ ์„œ๋น„์Šค์— ์ ์šฉํ•˜๊ธฐ ๊นŒ์ง€ ๊ฑธ๋ ธ์„ ๋…ธ๋ ฅ์ด ๋ˆˆ์— ์„ ํ•˜๊ฒŒ ๋ณด์ด๋Š” ๊ฒƒ ๊ฐ™์Šต๋‹ˆ๋‹ค. ์š”์•ฝํ•˜๋‹ค ๋ณด๋‹ˆ ์ œ ๊ธ€์—๋Š” ๋‚ด์šฉ์ด ๋งŽ์ด ๋น ์ง€๊ฒŒ ๋˜์—ˆ๋Š”๋ฐ, ๊ด€์‹ฌ ์žˆ์œผ์‹œ๋‹ค๋ฉด ๊ณต์‹ ๋ฌธ์„œ๋ฅผ ๊ผญ ์ฝ์–ด๋ณด์‹œ๋Š” ๊ฒƒ์„ ์ถ”์ฒœํ•ฉ๋‹ˆ๋‹ค.

References

  1. Post-quantum cryptographyย