Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.3G-33.902(R4-4.0.0) ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2002-10-28 ÃÑÆäÀÌÁö 11
ÇѱÛÇ¥Áظí IMT-2000 3GPP-3G ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ Çü½ÄÀû ºÐ¼®;4.0.0
¿µ¹®Ç¥Áظí IMT-2000 3GPP-Formal Analysis of the 3G Authentication Protocol;4.0.0
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â 3G TS 33.102¿¡ ±ÔÁ¤µÇ¾î ÀÖ´Â ÀÎÁõ°ú Å° µ¿ÀÇ(AKA) ÇÁ·ÎÅäÄÝÀÇ Çü½ÄÀû ºÐ¼®À» Æ÷ÇÔÇÏ°í ÀÖ´Ù
ÀÎÁõ°ú Å° µ¿ÀÇ(AKA) ÇÁ·ÎÅäÄÝ ºÐ¼®
º» ¹®¼­´Â ÀÎÁõ°ú Å° µ¿ÀÇ(AKA) ÇÁ·ÎÅäÄÝÀÇ Çü½ÄÀû ºÐ¼®À» Æ÷ÇÔÇÏ°í ÀÖÀ¸¸ç, ÀÌ ºÐ¼®µéÀº AKA ÇÁ·ÎÅäÄÝÀÇ º¸¾È°ú Á¤È®¼º Ư¼ºµéÀ» Áõ¸íÇϴµ¥ ÀûÇÕÇÑ Çü½ÄÀûÀÌ°í ´Ù¾çÇÑ ³í¸® ¼ö´ÜÀ» ÀÌ¿ëÇÏ¿© ¼öÇàµÉ ¼ö ÀÖ´Ù
¿µ¹®³»¿ë¿ä¾à This report contains formal analyses of the authentication and key agreement (AKA) protocol specified in 3G TS 33.102. These analyses are carried out using various means of formal logic suitable for demonstrating security and correctness properties of the AKA protocol.
The structure of this technical specification is as follows:
clause 2 lists the references used in this specification;
clause 3 lists the definitions and abbreviations used in this specification;
clause 4 refers to the main body of this report. The main body is only referred to because it is not available in Word-, but only in pdf-format. The corresponding .pdf-documents are attached to this document.
±¹Á¦Ç¥ÁØ 3GPP TR 33.902
°ü·ÃÆÄÀÏ TTAE.3G-33.902(R4-4.0.0).pdf TTAE.3G-33.902(R4-4.0.0).pdf            

ÀÌÀü
¹«¼± ÀÎü¿µ¿ª ³×Æ®¿öÅ© (IEEE Std 802.15.6-2012)
´ÙÀ½
´ë»ó ÀÎ½Ä Åë½ÅÀ» À§ÇÑ PHY ¿Í MAC ±Ô°Ý(IEEE Std 802.15.8-2017)