{"id":1428,"date":"2005-04-29T00:23:43","date_gmt":"2005-04-29T00:23:43","guid":{"rendered":"http:\/\/dev.jblove.net\/?p=1428"},"modified":"2005-04-29T00:23:43","modified_gmt":"2005-04-29T00:23:43","slug":"rsa-%ea%b3%b5%ea%b0%9c%ed%82%a4-%ec%95%94%ed%98%b8%ed%99%94-%ec%95%8c%ea%b3%a0%eb%a6%ac%ec%a6%98-php-%ea%b5%ac%ed%98%84","status":"publish","type":"post","link":"https:\/\/jblove.net\/?p=1428","title":{"rendered":"RSA \uacf5\uac1c\ud0a4 \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998 &#8211; PHP \uad6c\ud604"},"content":{"rendered":"<p>\uc774\ud615\ucca0<br \/>\nhttp:\/\/hc.pe.kr<br \/>\nhttp:\/\/hc.pe.kr\/notefiles\/8187\/RSAKeyGen.exe<\/p>\n<p>\uc774\ubc88\uc5d0 \ud504\ub85c\uc81d\ud2b8 \ud558\ub2e4\uac00 RSA \uacf5\uac1c\ud0a4 \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc774 \ud544\uc694\ud574\uc11c \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4.<br \/>\n\ud074\ub77c\uc774\uc5b8\ud2b8 \uce21\uc73c\ub85c \ubab0\ub798 \ubcf4\ub0b4\uc57c\ud560 \uc790\ub8cc(password \ub4f1)\uac00 \uc788\uc744 \ub54c \uc0ac\uc6a9\ud558\uc2dc\uae30 \ubc14\ub78d\ub2c8\ub2e4.<\/p>\n<p>\ucc28\ub840<br \/>\n1. RSA\uc758 \uc18c\uac1c<br \/>\n2. RSA\ub97c php\uc5d0\uc11c \uc774\uc6a9\ud558\uae30 \uc704\ud55c \uc18c\uc2a4 \ucf54\ub4dc(\uc608\uc81c \ud3ec\ud568)<\/p>\n<p>\ub9c1\ud06c : RSA \ud0a4 pair \uc0dd\uc131\ud558\ub294 \ud504\ub85c\uadf8\ub7a8(\uc81c\uac00 \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4.)<br \/>\n===================================================================<br \/>\n\uc554\ud638\uc758 \uc5ed\uc0ac\ub294 \ub85c\ub9c8 \uc2dc\ub300\ub85c \uae4c\uc9c0 \uac70\uc2ac\ub7ec\uc62c\ub77c\uac04\ub2e4\uace0 \ud558\uc9c0\ub9cc \uc778\ud130\ub137\uc744 \ud1b5\ud574 \uc218\ub9ce\uc740 \uae08\uc735 \uac70\ub798\uac00 \uc774\ub8e8\uc5b4\uc9c0\uc788\ub294 \uc694\uc998 \ucc98\ub7fc \uc554\ud638\ud654\ub41c \ud1b5\uc2e0\uc774 \ub110\ub9ac \uc0ac\uc6a9\ub418\ub294 \ub54c\ub3c4 \uc544\ub9c8 \uc5c6\uc744 \uac83\uc774\ub2e4. \uc2e4\uc81c\ub85c \uc5b4\ub5a4 \ud30c\uc77c \ud639\uc740 \ubb38\uc7a5\uc744 \uc778\ud130\ub137\uc0c1\uc758 \ub2e4\ub978 \uc0ac\uc6a9\uc790\uc5d0\uac8c \ube44\ubc00\ub9ac\uc5d0 \uc804\uc1a1\ud558\ub824\uace0 \ud560 \ub54c \uc5b4\ub5a4 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc744\uae4c? \uac00\uc7a5 \uba3c\uc800 \uc0dd\uac01\ud560 \uc218 \uc788\ub294 \uac83\uc740 \uc6b0\ub9ac\uac00 \ud754\ud788 zip \ud30c\uc77c\uc744 \uc555\ucd95\ud560 \ub54c \uc774\uc6a9\ud558\ub294 \ub300\uce6d\ud0a4 \uc54c\uace0\ub9ac\uc998(\ud639\uc740 \ube44\ubc00\ud0a4 \uc54c\uace0\ub9ac\uc998)\uc774\ub2e4. \uc774 \ubc29\uc2dd\uc5d0\uc11c\ub294 \uc554\ud638\ud654\ud558\ub294 \uce21\uacfc \uc554\ud638\ub97c \ud478\ub294 \uce21\uc774 \uac19\uc740 \ud0a4\ub97c \uc774\uc6a9\ud55c\ub2e4. \uadf8\ub7ec\ub098 \uc778\ud130\ub137 \uc0c1\uc758 \uc815\ubcf4\ub294 \uc5b8\uc81c\ub4e0\uc9c0 \ud6d4\uccd0\ubcf4\uae30\uac00 \uac00\ub2a5\ud558\uae30 \ub54c\ubb38\uc5d0 \uc774 \ubc29\ubc95\uc740 \ub124\ud2b8\uc6cd\uc0c1\uc758 \ud1b5\uc2e0\uc5d0 \uc801\uc6a9\ud558\uae30\uc5d0 \uc801\uc808\ud558\uc9c0 \uc54a\ub2e4. \uc554\ud638(\ube44\ubc00\ud0a4)\ub97c \uc778\ud130\ub137\uc744 \ud1b5\ud574 \uc8fc\uace0 \ubc1b\ub294 \uac83\uc774 \ubd88\uac00\ub2a5\ud558\uae30 \ub54c\ubb38\uc774\ub2e4.<\/p>\n<p>\uadf8\ub9ac\ud558\uc5ec \ub098\uc624\uac8c \ub41c \uac83\uc774 \uacf5\uac1c\ud0a4 \uc54c\uace0\ub9ac\uc998\uc778\ub370 \uacf5\uac1c\ud0a4 \uc54c\uace0\ub9ac\uc998\uc740 \uc554\ud638\ud654 \ud560 \ub54c \uc0ac\uc6a9\ud558\ub294 \uc554\ud638\uc640 \uc554\ud638\ub97c \ud480 \ub54c \uc0ac\uc6a9\ud558\ub294 \uc554\ud638\uac00 \uc11c\ub85c \ub2e4\ub974\ub2e4. \uc11c\ub85c \ub2e4\ub978 \ud0a4\ub97c \uc0ac\uc6a9\ud568\uc73c\ub85c\uc11c \ube44\ubc00\ub9ac\uc5d0 \ud0a4\ub97c \uad50\ud658\ud560 \ud544\uc694 \uc790\uccb4\uac00 \uc5c6\uc5b4\uc84c\ub2e4. \uc81c 3 \uc790\ub294 \uc554\ud638\ud654\ud0a4\ub97c \uc54c\uace0 \uc788\ub354\ub77c\ub3c4 \uc554\ud638\ubb38\uc744 \ud480 \uc218 \uc5c6\uc73c\ubbc0\ub85c \uc554\ud638\ud654\ud560 \ub54c \uc0ac\uc6a9\ud558\ub294 \ud0a4\ub294 \uc911\uac04\uc5d0 \ub204\uac00 \uac00\ub85c\ucc44\ub3c4 \uc0c1\uad00\uc5c6\ub2e4. \uc544\ub2c8 \uc624\ud788\ub824 \uc0ac\uc6a9\ud558\uae30 \ud3b8\ud558\uac8c \uc798 \ubcf4\uc774\ub294 \uacf3\uc5d0 \ub194\ub450\ub294 \uac83\uc774 \uc88b\uc744 \uac83\uc774\ub2e4. \ub204\uad6c\ub4e0\uc9c0 \uc774 \uacf5\uac1c\ud0a4\ub85c \uba54\uc2dc\uc9c0\ub97c \uc554\ud638\ud654\ud574\uc11c \ubcf4\ub0b4\uba74 \uadf8 \uba54\uc2dc\uc9c0\ub97c \ubc1b\ub294 \uc0ac\ub78c\uc740 \uc228\uaca8\ub454 \ube44\ubc00\ud0a4(\ud639\uc740 \uac1c\uc778\ud0a4\ub77c\uace0\ub3c4 \ud55c\ub2e4)\ub97c \uc774\uc6a9\ud558\uc5ec \uc774\ub97c \ud480\uc5b4\ubcfc \uc218 \uc788\ub2e4. \uc5bc\ud54f \uc0dd\uac01\ud558\uba74 \ubbff\uae30 \ud798\ub4e0 \uc774\ub7ec\ud55c \uc77c\uc774 \uc218\ud559\uc758 \ub9c8\uc220\ub85c \uc778\ud574 \uac00\ub2a5\ud574 \uc84c\ub2e4.<\/p>\n<p>\uacf5\uac1c\ud0a4 \uc54c\uace0\ub9ac\uc998\uc758 \ub300\ud45c\uc801\uc778 RSA\ub294 1977\ub144\uc5d0 Ron Rivest, Adi Shamir\uc640 Leonard Adleman\uc5d0 \uc758\ud574 \uac1c\ubc1c\ub418\uc5c8\ub2e4. RSA\ub294 \ud070 \uc218\uc758 \uc18c\uc778\uc218 \ubd84\ud574\uac00 \ub9e4\uc6b0 \uc5b4\ub835\ub2e4\ub294 \uc0ac\uc2e4\uc744 \uc774\uc6a9\ud55c\ub2e4. \ud604\uc7ac \uc288\ud37c\ucef4\ud4e8\ud130\uc640 \ubcf5\uc7a1\ud55c \uc218\ud559\uc801 \uae30\ubc95\ub4e4\uc744 \uc774\uc6a9\ud574 155\uc790\ub9ac \ud569\uc131\uc218\uac00 \uc778\uc218\ubd84\ud574 \ub418\uc5c8\ub294\ub370(1999\ub144 8\uc6d4) 155\ub97c 2\uc9c4\uc218\ub85c \ud45c\ud604\ud558\uba74 512 \ube44\ud2b8\uc774\uae30 \ub54c\ubb38\uc5d0 \ud754\ud788 RSA\uc5d0\uc11c \uc0ac\uc6a9\ud558\ub294 \ud0a4\ub294 \uc774\ubcf4\ub2e4 \uae38\uc774\uac00 2\ubc30 \uae34 1024\ube44\ud2b8\ub97c \uc774\uc6a9\ud55c\ub2e4.<\/p>\n<p>RSA\uc758 \uc6d0\ub9ac<\/p>\n<p>\uc9d1\ud569 {1, 2, &#8230; , n-1} \uc758 \uc6d0\uc18c\ub4e4 \uc911\uc5d0\uc11c n \uacfc \uc11c\ub85c\uc18c\uc758 \uad00\uacc4\uc5d0 \uc788\ub294 \uc6d0\uc18c\ub4e4\uc758 \uac1c\uc218\ub97c \u03c6(n)\uc73c\ub85c \ub098\ud0c0\ub0b4\uace0 \uc774\ub97c Euler\uc758 \u03c6-function\uc774\ub77c\uace0 \ud55c\ub2e4. \ud2b9\ubcc4\ud788 \uc18c\uc218 p\uc5d0 \ub300\ud574\uc11c \u03c6(p) = p-1 \uc774\ub2e4. \ud070 \uc815\uc218 n\uc5d0 \ub300\ud574 \u03c6(n)\uc758 \uac12\uc744 \uc54c\uae30 \uc704\ud574\uc11c\ub294 n\uc758 \uc18c\uc778\uc218 \ubd84\ud574\uac00 \ud544\uc218\uc801\uc774\ub2e4. \uc989, n\uc774 \ub450 \uc18c\uc218 p\uc640 q\uc758 \uacf1\uc77c \ub54c \u03c6(n) = (p-1)(q-1)\uc774\ub2e4. \ub530\ub77c\uc11c \uc18c\uc778\uc218 \ubd84\ud574 \uc5c6\uc774 \u03c6(n)\uc744 \uad6c\ud558\uae30\ub294 \ub9e4\uc6b0 \uc5b4\ub835\ub2e4. Euler\uc758 \uc815\ub9ac\ub780, \uc11c\ub85c \uc18c\uc778 \ub450 \uc591\uc758 \uc815\uc218 a, n\uc5d0 \ub300\ud574 a\u03c6(n) \u2261 1 (mod n) \uc774 \uc131\ub9bd\ud55c\ub2e4\ub294 \uac83\uc774\ub2e4.<\/p>\n<p>Step 1<br \/>\n   \ub450\uac1c\uc758 \ud070 \uc18c\uc218 p, q\ub97c \uc120\uc815\ud558\uc5ec \uc790\uc2e0\uc758 \ube44\ubc00\uc5f4\uc1e0\ub85c \ud55c\ub2e4<br \/>\nStep 2<br \/>\n   n = pq\uc778 n\uc744 \uacf5\uac1c\ud558\uace0 \u03c6(n)\uacfc \uc11c\ub85c \uc18c\uc778 \uc784\uc758\uc758 \uc815\uc218 e\ub97c \uc120\ud0dd\ud558\uc5ec \uacf5\uac1c\ud0a4\ub85c \ud55c\ub2e4. <br \/>\nStep 3<br \/>\n   ed \u2261 1 (mod \u03c6(n)) \uc774 \ub418\ub294 d\ub97c Euclidean Algorithm\ub4f1\uc73c\ub85c \uacc4\uc0b0\ud558\uc5ec \ube44\ubc00 \uc5f4\uc1e0\ub85c \ud55c\ub2e4.<br \/>\n   \uc989, p\uc640 q \uadf8\ub9ac\uace0 d\ub294 \ube44\ubc00 \uc5f4\uc1e0\ub85c, n\uacfc e\ub294 \uacf5\uac1c\ud0a4\ub85c \ud55c\ub2e4. <\/p>\n<p>\uc554\ud638\ud654 Step<br \/>\n     \ud3c9\ubb38 M\uc744 \uacf5\uac1c\ud0a4 e\ub97c \uc0ac\uc6a9\ud558\uc5ec Me\ub97c \uacc4\uc0b0\ud55c \ub2e4\uc74c modular n\uc73c\ub85c \uac04\ub2e8\ud788 \ud55c\ub2e4.<br \/>\n     \uc989 \uc554\ud638\ubb38 C\ub294 \ub2e4\uc74c\uacfc \uac19\ub2e4. C = Me (mod n) <\/p>\n<p>\ubcf5\ud638\ud654 Step. <br \/>\n     \uc554\ud638\ubb38 C\ub97c \ube44\ubc00\uc5f4\uc1e0 d\ub97c \uc774\uc6a9\ud558\uc5ec Cd\ud55c \ub2e4\uc74c modular n\uc73c\ub85c \uac04\ub2e8\ud788 \ud55c\ub2e4. <br \/>\n     \ub2e4\uc2dc \ud3c9\ubb38\uc774 \ub098\uc624\uac8c \ub418\ub294 \uad00\uacc4\uc2dd\uc740 \ub2e4\uc74c\uacfc \uac19\ub2e4. <br \/>\n                 Cd \u2261 (Me)d = Mt\u03c6(n)+1 = M\u03c6(n)t M \u2261 M (mod n)<br \/>\n     \uc5ec\uae30\uc11c t\ub294 ed \u2261 1 (mod \u03c6(n))\uc5d0\uc11c \uc720\ub3c4\ub418\ub294 ed = t\u03c6(n)+1 \uc744 \ub9cc\uc871\ud558\ub294 \uc815\uc218\uc774\ub2e4. <\/p>\n<p>\uc2e4\uc81c \uc0ac\uc6a9 \uc608<br \/>\n\uc608\ub97c \ub4e4\uc5b4 \uc124\uba85\ud558\uba74 \ub2e4\uc74c\uacfc \uac19\ub2e4. RSA \uc554\ud638\ud654 \uae30\ubc95\uc5d0\ub294 private key, public key, modulus\uac00 \ud544\uc694\ud558\ub2e4.<br \/>\n\uc554\ud638\ud654\ud558\ub294\ub370\uc5d0\ub294 public key\uc640 modulus, \ubcf5\ud638\ud654\ud558\ub294\ub370\uc5d0\ub294 private key\uc640 modulus\uac00 \uc774\uc6a9\ub41c\ub2e4.<\/p>\n<p>\uc554\ud638\ud654 : (\uc554\ud638\ud654\ub41c\ubb38\uc7a5) = (\uc6d0\ub798\ubb38\uc7a5)^(public key) mod modulus<br \/>\n\uc554\ud638\ud654 : (\uc6d0\ub798\ubb38\uc7a5) = (\uc554\ud638\ud654\ub41c\ubb38\uc7a5)^(private key) mod modulus<\/p>\n<p>\ub2e8, \uc5ec\uae30\uc11c (\uc6d0\ub798 \ubb38\uc7a5)\uc758 \ube44\ud2b8\uc218\ub294 (modulus)\uc758 \ube44\ud2b8\uc218\ubcf4\ub2e4 \uc791\uc544\uc57c \ud55c\ub2e4. \ub530\ub77c\uc11c \uc2e4\uc81c\uc758 \uba54\uc138\uc9c0\ub97c n\ubcf4\ub2e4 \uc791\uac70\ub098 \uac19\uc740 \uae38\uc774\ub85c \uc798\ub77c\uc11c \uc785\ub825\ud574\uc57c \ud55c\ub2e4. \uc880 \ub354 \uad6c\uccb4\uc801\uc778 \uc608\ub97c \ub4e4\uae30 \uc704\ud574\uc11c \uc774\ubc88\uc5d0\ub294 \ud06c\uae30\uac00 \ub9e4\uc6b0(!) \uc791\uc740 \uc218\ub97c \uc774\uc6a9\ud558\uc5ec \uc704\uc758 \uacfc\uc815\uc744 \ub530\ub77c\uac00 \ubcf4\uc790<br \/>\npublic key = 5 <br \/>\nprivate key = 77 <br \/>\nmodulus = 119 <br \/>\n\ube44\ubc00\ud0a4\ub97c \uc790\uc2e0\uc774 \uc18c\uc720\ud558\uace0 \uacf5\uac1c\ud0a4\ub294 \uc548\uc804\ud55c \uacf5\uac1c\ud0a4 \ub514\ub809\ud1a0\ub9ac\uc5d0 \ub4f1\ub85d\ud55c\ub2e4.<br \/>\n\uadf8\ub7f0 \ub2e4\uc74c \uc544\uc2a4\ud0a4\ucf54\ub4dc \ud55c\uc790\ub9ac &#8220;a&#8221;=65\ub97c \uc804\uc1a1\ud55c\ub2e4\uace0 \ud574 \ubcf4\uc790.(\uc544\uc2a4\ud0a4\ucf54\ub4dc\ub294 7\ube44\ud2b8 \uc774\ub0b4\uc5d0 \uc788\uc73c\ubbc0\ub85c 7\ube44\ud2b8 \uc9dc\ub9ac modulus\ub85c \uc804\uc1a1\ud560 \uc218 \uc788\ub2e4.)<\/p>\n<p>\uc554\ud638\ud654 : 65^5 mod 119 = 46<br \/>\n\ubcf5\ud638\ud654 : 46^77 mod 119 = 65<\/p>\n<p>\uc798 \uc791\ub3d9\ud55c\ub2e4\ub294 \uac83\uc744 \uc54c \uc218 \uc788\ub2e4.<\/p>\n<p>\ud0a4\ub97c \uc0dd\uc131\ud558\uae30<\/p>\n<p>\uc774\ub7ec\ud55c RSA \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud558\uae30 \uc704\ud574\uc11c\ub294 \uc790\uc2e0\ub9cc\uc758 \uacf5\uac1c\ud0a4, \ube44\ubc00\ud0a4, modulus\uc758 \uc30d\uc744 \ud544\uc694\ub85c \ud55c\ub2e4. \uc774\ub7ec\ud55c \uc22b\uc790 \uc30d\uc744 \uc0dd\uc131\ud558\ub294 \ud504\ub85c\uadf8\ub7a8\uc744 \uc81c\uc791\ud574 \ubcf4\uc558\ub2e4.(\ucca8\ubd80 \ud30c\uc77c\uc5d0 \uc788\ub294 RSAKeyGen.exe \uc2e4\ud589)<\/p>\n<p>php \uc18c\uc2a4 \ucf54\ub4dc<\/p>\n<p>php\uc5d0\uc11c RSA \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc744 \uc774\uc6a9\ud560 \uc218 \uc788\ub3c4\ub85d \ud568\uc218 \ubc0f \uc608\uc81c\ub97c \uc544\ub798\uc5d0 \ucca8\ubd80\ud558\uc600\ub2e4.<br \/>\n<?<br \/>\n\/\/ PHP\uc758 BCMath \uae30\ub2a5\uc744 \ud544\uc694\ub85c\ud569\ub2c8\ub2e4. &#8211;enable-bcmath \uc635\uc158\uc744 \ubd99\uc5ec \ucef4\ud30c\uc77c \ud574\uc57c\ud569\ub2c8\ub2e4.<br \/>\n\/\/ \ucd5c\uc2e0 \ubc84\uc83c\uc758 PHP\uc5d0\ub294 BCMath\uac00 \uae30\ubcf8\uc73c\ub85c \ub4e4\uc5b4\uac00 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\/\/ Calculate (p ^ q) mod r <br \/>\nfunction pow_mod($p, $q, $r)<br \/>\n{<br \/>\n    \/\/ Extract powers of 2 from $q<br \/>\n   $factors = array();<br \/>\n   $div = $q;<br \/>\n   $power_of_two = 0;<\/p>\n<p>    \/\/ BCCOMP_LARGER == 1<br \/>\n   while(bccomp($div, &#8220;0&#8221;) == 1)<br \/>\n   {<br \/>\n       $rem = bcmod($div, 2);<br \/>\n       $div = bcdiv($div, 2);<\/p>\n<p>       if($rem) array_push($factors, $power_of_two);<br \/>\n       $power_of_two++;<br \/>\n   }<\/p>\n<p>   \/\/ Calculate partial results for each factor, using each partial result as a<br \/>\n   \/\/ starting point for the next. This depends of the factors of two being<br \/>\n   \/\/ generated in increasing order.<br \/>\n   $partial_results = array();<br \/>\n   $part_res = $p;<br \/>\n   $idx = 0;<br \/>\n   foreach($factors as $factor)<br \/>\n   {<br \/>\n       while($idx < $factor)<br \/>\n       {<br \/>\n           $part_res = bcpow($part_res, &#8220;2&#8221;);<br \/>\n           $part_res = bcmod($part_res, $r);<\/p>\n<p>           $idx++;<br \/>\n       }<\/p>\n<p>       array_push($partial_results, $part_res);<br \/>\n   }<\/p>\n<p>   \/\/ Calculate final result<br \/>\n   $result = &#8220;1&#8221;;<br \/>\n   foreach($partial_results as $part_res)<br \/>\n   {<br \/>\n       $result = bcmul($result, $part_res);<br \/>\n       $result = bcmod($result, $r);<br \/>\n   }<\/p>\n<p>   return $result;<br \/>\n}<\/p>\n<p>\/\/ Function to add padding to a decrypted string<br \/>\n\/\/ We need to know if this is a private or a public key operation<br \/>\nfunction add_PKCS1_padding($data, $isPublicKey, $blocksize)<br \/>\n{<br \/>\n   $pad_length = $blocksize &#8211; 3 &#8211; strlen($data);<br \/>\n   if($isPublicKey)<br \/>\n   {<br \/>\n       $block_type = &#8220;x02&#8221;;<br \/>\n       $padding = &#8220;&#8221;;<br \/>\n       for($i = 0; $i < $pad_length; $i++)<br \/>\n       {<br \/>\n           $rnd = mt_rand(1, 255);<br \/>\n           $padding .= chr($rnd);<br \/>\n       }<br \/>\n   }<br \/>\n   else<br \/>\n   {<br \/>\n       $block_type = &#8220;x01&#8221;;<br \/>\n       $padding = str_repeat(&#8220;xFF&#8221;, $pad_length);<br \/>\n   }<\/p>\n<p>   return &#8220;x00&#8221; . $block_type . $padding . &#8220;x00&#8221; . $data;<br \/>\n}<\/p>\n<p>\/\/ Remove padding from a decrypted string<br \/>\nfunction remove_PKCS1_padding($data, $blocksize)<br \/>\n{<br \/>\n   assert(strlen($data) == $blocksize);<br \/>\n   $data = substr($data, 1);<\/p>\n<p>   \/\/ We cannot deal with block type 0<br \/>\n   if($data{0} == &#8220;&#8221;)<br \/>\n       die(&#8220;Block type 0 not implemented.&#8221;);<\/p>\n<p>   \/\/ Then the block type must be 1 or 2 <br \/>\n   assert(($data{0} == &#8220;x01&#8221;) || ($data{0} == &#8220;x02&#8221;));<\/p>\n<p>   \/\/ Remove the padding<br \/>\n   $offset = strpos($data, &#8220;&#8221;, 1);<br \/>\n   return substr($data, $offset + 1);<br \/>\n}<\/p>\n<p>function hex_to_number($data)<br \/>\n{<br \/>\n    $len = strlen($data);<br \/>\n    $result = &#8220;0&#8221;;<br \/>\n   for($i = 0; $i < $len - 1; $i++)<br \/>\n   {<br \/>\n       $result = bcadd($result, hexdec($data{$i}));<br \/>\n        $result = bcmul($result, 16);<br \/>\n   }<br \/>\n    $result = bcadd($result, hexdec($data{$len-1}));<br \/>\n   return $result;<br \/>\n}<\/p>\n<p>\/\/ Convert binary data to a decimal number<br \/>\nfunction binary_to_number($data)<br \/>\n{<br \/>\n   $base = &#8220;256&#8221;;<br \/>\n   $radix = &#8220;1&#8221;;<br \/>\n   $result = &#8220;0&#8221;;<br \/>\n   for($i = strlen($data) &#8211; 1; $i >= 0; $i&#8211;)<br \/>\n   {<br \/>\n       $digit = ord($data{$i});<br \/>\n       $part_res = bcmul($digit, $radix);<br \/>\n       $result = bcadd($result, $part_res);<br \/>\n       $radix = bcmul($radix, $base);<br \/>\n   }<br \/>\n   return $result;<br \/>\n}<\/p>\n<p>\/\/ Convert a number back into binary form<br \/>\nfunction number_to_binary($number, $blocksize)<br \/>\n{<br \/>\n   $base = &#8220;256&#8221;;<br \/>\n   $result = &#8220;&#8221;;<br \/>\n   $div = $number;<br \/>\n   while($div > 0)<br \/>\n   {<br \/>\n       $mod = bcmod($div, $base);<br \/>\n       $div = bcdiv($div, $base);<br \/>\n       $result = chr($mod) . $result;<br \/>\n   }<br \/>\n   return str_pad($result, $blocksize, &#8220;x00&#8221;, STR_PAD_LEFT);<br \/>\n}<\/p>\n<p>function rsa_encrypt($message, $public_key, $modulus, $keylength)<br \/>\n{<br \/>\n    $padded = add_PKCS1_padding($message, true, $keylength \/ 8);<br \/>\n   $number = binary_to_number($padded);<br \/>\n   $encrypted = pow_mod($number, $public_key, $modulus);<br \/>\n    return $encrypted;<br \/>\n}<\/p>\n<p>function rsa_decrypt($message, $private_key, $modulus, $keylength)<br \/>\n{<br \/>\n   $decrypted = pow_mod($message, $private_key, $modulus);<br \/>\n    $result = number_to_binary($decrypted, $keylength \/ 8);<br \/>\n   return remove_PKCS1_padding($result, $keylength \/ 8);<br \/>\n}<\/p>\n<p>$public_key = hex_to_number(&#8220;9E649FF1&#8221;);<br \/>\n$private_key = hex_to_number(&#8220;7C0732C4379EDE1FB6E6CF2E7B262B41&#8221;);<br \/>\n$modulus = hex_to_number(&#8220;95C3BE09B678F8BD55F859CC24B4797B&#8221;);<\/p>\n<p>$enc = rsa_encrypt(&#8220;\uba54\ub871 \uc57d\uc624\ub974\uc9c0\ub871~&#8221;, $public_key, $modulus, 128);<br \/>\necho rsa_decrypt($enc, $private_key, $modulus, 128);<br \/>\n?><\/p>\n<p>\uc704\uc758 \uc608\uc81c\uc5d0\uc11c\ub294 128 \ube44\ud2b8 \uc554\ud638\ud654\ub97c \uc774\uc6a9\ud558\uc600\uc73c\ub098 \ucda9\ubd84\ud788 512 \ube44\ud2b8 1024\ube44\ud2b8\ub85c \ud655\uc7a5\ud560 \uc218 \uc788\ub2e4. \ube44\ud2b8\uc218\uac00 \ub298\uc5b4\ub0a0\uc218\ub85d \uc554\ud638\ub294 \uae68\uae30 \uc5b4\ub824\uc6cc\uc9c0\ub294 \ub300\uc2e0 \uc18d\ub3c4\uac00 \ub290\ub824\uc9c0\ub294 \ub2e8\uc810\uc774 \uc788\ub2e4. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc774\ud615\ucca0 http:\/\/hc.pe.kr http:\/\/hc.pe.kr\/notefiles\/8187\/RSAKeyGen.exe \uc774\ubc88\uc5d0 \ud504\ub85c\uc81d\ud2b8 \ud558\ub2e4\uac00 RSA \uacf5\uac1c\ud0a4 \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc774 \ud544\uc694\ud574\uc11c \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \ud074\ub77c\uc774\uc5b8\ud2b8 \uce21\uc73c\ub85c \ubab0\ub798 \ubcf4\ub0b4\uc57c\ud560 \uc790\ub8cc(password \ub4f1)\uac00 \uc788\uc744 \ub54c \uc0ac\uc6a9\ud558\uc2dc\uae30 \ubc14\ub78d\ub2c8\ub2e4. \ucc28\ub840 1. RSA\uc758 \uc18c\uac1c 2. RSA\ub97c php\uc5d0\uc11c \uc774\uc6a9\ud558\uae30 \uc704\ud55c \uc18c\uc2a4 \ucf54\ub4dc(\uc608\uc81c \ud3ec\ud568) \ub9c1\ud06c : RSA \ud0a4 pair \uc0dd\uc131\ud558\ub294 \ud504\ub85c\uadf8\ub7a8(\uc81c\uac00 \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4.) =================================================================== \uc554\ud638\uc758 \uc5ed\uc0ac\ub294 \ub85c\ub9c8 \uc2dc\ub300\ub85c \uae4c\uc9c0 \uac70\uc2ac\ub7ec\uc62c\ub77c\uac04\ub2e4\uace0 \ud558\uc9c0\ub9cc \uc778\ud130\ub137\uc744 \ud1b5\ud574 \uc218\ub9ce\uc740 \uae08\uc735 \uac70\ub798\uac00 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[51],"tags":[],"class_list":["post-1428","post","type-post","status-publish","format-standard","hentry","category-papa-php"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/jblove.net\/index.php?rest_route=\/wp\/v2\/posts\/1428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jblove.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jblove.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jblove.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jblove.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1428"}],"version-history":[{"count":0,"href":"https:\/\/jblove.net\/index.php?rest_route=\/wp\/v2\/posts\/1428\/revisions"}],"wp:attachment":[{"href":"https:\/\/jblove.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jblove.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jblove.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}