ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-11.0301 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-06-29 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥ÁØ¸í µ¥ÀÌÅÍ ¹èÆ÷ ¼­ºñ½º(DDS) º¸¾È ¼­ºñ½º¸¦ À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò Áö¿ø ÀÎÅÍÆäÀ̽º
¿µ¹® Ç¥Áظí Cryptographic Algorithm Support Interfaces for DDS Security Services
ÇÑ±Û ³»¿ë¿ä¾à ´Ù¾çÇÑ »ê¾÷ÇöÀå¿¡¼­´Â µ¥ÀÌÅÍÀÇ ¾ÈÀüÇÑ º¸È£¸¦ À§Çؼ­ ´Ù¾çÇÑ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Àû¿ëÇÏ¿© »ç¿ëÇϰí ÀÖ´Ù. ±×·¯³ª, µ¥ÀÌÅÍ ¹èÆ÷ ¼­ºñ½º(DDS) º¸¾È ¼­ºñ½º³»ÀÇ ¾ÏÈ£ Ç÷¯±×ÀÎ(Cryptographic Plugin)¿¡¼­´Â AES ¾ÏÈ£ ¾Ë°í¸®Áò¸¸À» Á¤ÀÇÇϰí ÀÖÀ¸¸ç, »õ·Î¿î ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Ãß°¡ÇÏ°í »ç¿ëÇϱâ À§ÇÑ ÀÎÅÍÆäÀ̽º°¡ Á¤ÀǵǾî ÀÖÁö ¾Ê´Ù. ÀÌ¿¡ µû¶ó¼­ DDS º¸¾È ¼­ºñ½º¸¦ »ç¿ëÇÏ´Â ´Ù¾çÇÑ »ç¿ëÀÚÀÇ ¿ä±¸¿¡ µû¶ó »õ·Î¿î ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Ãß°¡ÇÒ ¼ö ÀÖÀ¸¸ç, »ç¿ëÀÚÀÇ ¼±Åÿ¡ ÀÇÇØ ´Ù¾çÇÑ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÒ ¼ö ÀÖ´Â »õ·Î¿î ÀÎÅÍÆäÀ̽º¸¦ Á¦°øÇϰíÀÚ ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à Many algorithms are applied and used in various industrial sites to secure data protection. However, the encryption module defined in DDS security provides only the AES algorithm and does not have an interface defined to add a new cryptographic algorithm. As a result, new cryptographic algorithms can be added according to the needs of various users using DDS security services, and a new interface can be provided to use various cryptographic algorithms at the user's choice.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-11.0301.pdf TTAK.KO-11.0301.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
µ¥ÀÌÅÍ ¹èÆ÷ ¼­ºñ½º(DDS) º¸¾È ¼­ºñ½º¸¦ À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò Áö¿ø ÀÎÅÍÆäÀ̽º TTAK.KO-11.0301 2022-06-29 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-11.0301.pdf