Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0195 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Cryptographic Algorithms for VoIP Secure Communication in Private Sector
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ÀÎÅͳÝÀüÈ­ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ­ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× ÅëÈ­³»¿ë ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ À־ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼ­µµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼­ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼­ ½ÇÁ¦ ¾Ïȣȭ¿¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0195_ed15.pdf TTAK.KO-12.0195_ed15.pdf            

ÀÌÀü
ÀÓº£µðµå ½Ã½ºÅÛÀ» À§ÇÑ °³¹æÇü Çǵå¹é ½Ã½ºÅÛÀÇ ¿ä±¸ »çÇ×
´ÙÀ½
½Ç½Ã°£ ¼ÒÇÁÆ®¿þ¾î ·±Å¸ÀÓ ºÐ¼®À» À§ÇÑ ÇÁ·ÎÆÄÀϸµ µ¥ÀÌÅÍ Ç׸ñ