Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.3G-33.909(R4-4.0.1) ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2002-10-28 ÃÑÆäÀÌÁö 32
ÇѱÛÇ¥Áظí IMT-2000 3GPP-3G º¸¾È; MILENAGE ¾Ë°í¸®Áò ¼ÂÀÇ ¼³°è¿Í Æò°¡¿¡ ´ëÇÑ º¸°í¼­; Deliverable 5; 3GPP ÀÎÁõ°ú Å° ¹ß»ý ÇÔ¼ö¿¡ ´ëÇÑ ¿¹Á¦ ¾Ë°í¸®Áò(R4)
¿µ¹®Ç¥Áظí IMT-2000 3GPP-3G Security; Report on the Design and Evaluation of the MILENAGE Algorithm Set; Deliverable 5: An Example Algorithm for the 3GPP Authentication and Key Generation Functions
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº 3GPP ÀÎÁõ°ú Å° ¹ß»ý ¾Ë°í¸®ÁòÀÎ MILENAGE ¾Ë°í¸®Áò ¼ÂÀÇ ¼³°è¿Í Æò°¡¿¡ ´ëÇÑ ÀϹÝÀûÀÎ ³»¿ëÀ» Æ÷ÇÔÇÏ°í ÀÖÀ¸¸ç 3GPP ±¹Á¦ ±Ô°Ý¿¡ ±Ù°ÅÇÏ¿© ±¹³» Ç¥ÁØÀ» Á¦Á¤ÇÔÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù
IMT-2000 ºñµ¿±â ¹æ½Ä¿¡¼­ ÀÎÁõ°ú Å° ¹ß»ý ¾Ë°í¸®Áò¿¡ ´ëÇÑ ±âÁØÀ¸·Î »ç¿ëÇÒ ¼ö ÀÖ´Ù
º» ±â¼ú º¸°í¼­´Â MILENAGE ¾Ë°í¸®Áò ¼ÂÀ¸·Î ¾Ë·ÁÁø 3GPP ÀÎÁõ ±â´ÉÀÇ ¼³°è¿Í Æò°¡ ±â°£ µ¿¾È ÇàÇØÁø ÀÛ¾÷¿¡ ´ëÇؼ­ ÀÚ¼¼È÷ ¿ä¾àµÈ ³»¿ëÀ» Æ÷ÇÔÇÏ°í ÀÖ´Ù. º» ¹®¼­¿¡´Â ÀÌ ÀÛ¾÷À¸·Î ºÎÅÍÀÇ ¸ðµç °á°ú¹°À» Æ÷ÇÔÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This public report contains a detailed summary of the work performed during the design and evaluation of the 3GPP Authentication Functions denoted as the MILENAGE algorithm set. It contains all results and findings from this work and should be read as a supplement to the specifications of the algorithms in ref. [3] and the general project report, ref. [4].
±¹Á¦Ç¥ÁØ 3GPP TR 33.909
°ü·ÃÆÄÀÏ TTAE.3G-33.909(R4-4.0.1).pdf TTAE.3G-33.909(R4-4.0.1).pdf            

ÀÌÀü
IMT-2000 3GPP-±¹Á¦ EMC ¿ä±¸ »çÇ×Ç¥
´ÙÀ½
IMT2000 3GPP - º¸¾È - ºñ¹Ð¼º°ú ¹«°á¼º ¾Ë°í¸®Áò ¸í¼¼: ¹®¼­ 1: f8°ú f9 ¸í¼¼ (R5-5.0.0)