ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0271-Part2/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑ ÆäÀÌÁö 43
ÇÑ±Û Ç¥Áظí nºñÆ® ºí·Ï ¾ÏÈ£ ¿î¿µ ¸ðµå - Á¦2ºÎ: ºí·Ï ¾ÏÈ£ LEA
¿µ¹® Ç¥Áظí Modes of Operation for an n-bit Block Cipher Algorithm - Part 2: Block Cipher LEA
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ±â¹Ð¼º ¿î¿µ ¸ðµåÀÎ ECB, CBC, CFB, OFB, CTR°ú ÀÎÁõ ¿î¿µ ¸ðµåÀÎ CMAC, ±×¸®°í ÀÎÁõ ¾Ïȣȭ ¿î¿µ ¸ðµåÀÎ CCM, GCMÀÇ ±â¹Ý ºí·Ï ¾ÏÈ£·Î LEA¸¦ Àû¿ëÇÒ ¶§ ±¸Çö Á¤È®¼ºÀ» È®ÀÎÇϱâ À§ÇÑ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard specifies the test vectors about implementation conformance. The standard defines the test vectors about mode of operation for block cipher LEA, i.e., confidential modes of operation ECB, CBC, CFB, OFB, CTR, message authentication mode of operation CMAC and authenticated encryption modes of operation CCM, GCM.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2020-12-10
ÆóÁö»çÀ¯ ±¹°¡Ç¥ÁØ Á¦Á¤¿¡ µû¸¥
TTAÇ¥ÁØ ÆóÁö
(KS X 3274, 2019-12-27)
°ü·ÃÆÄÀÏ  TTAK.KO-12.0271-Part2_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
nºñÆ® ºí·Ï ¾ÏÈ£ ¿î¿µ ¸ðµå - Á¦2ºÎ: ºí·Ï ¾ÏÈ£ LEA TTAK.KO-12.0271-Part2/R1 2017-12-13 °³Á¤ ÆóÁö ¾øÀ½
nºñÆ® ºí·Ï ¾ÏÈ£ ¿î¿µ ¸ðµå - Á¦2ºÎ ºí·Ï ¾ÏÈ£ LEA TTAK.KO-12.0271-Part2 2015-12-16 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0271-Part2_[1].pdf