Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0356/R1 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2024-06-28 | ÃÑÆäÀÌÁö | 35 |
ÇѱÛÇ¥Áظí | ¾çÀÚ Å° ºÐ¹è º¸¾È ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security Requirements for Quantum Key Distribution | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼ºñ½º¸¦ Á¦°øÇÏ´Â QKD Àåºñ¿¡ ´ëÇØ ¾ÈÀüÇÑ µ¿ÀÛÀ» À§ÇÑ QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸í¼¼ÇÑ´Ù. Áï, º» Ç¥ÁØ¿¡¼ QKD ¸ÞÄ¿´ÏÁòÀÌ Ç¥ÁØÈµÈ QKD ÇÁ·ÎÅäÄÝÀ» ÁؼöÇÏ°í ¾Ë·ÁÁø °ø°Ý¿¡ ´ëÇÑ ´ëÀÀ ±â´ÉÀ» Æ÷ÇÔÇÏ¿© µ¿ÀÛÇØ¾ß ÇÔÀ» ¿ä±¸ÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard specifies security requirements for QKD mechanism implemented using BB84 protocol and decoy method. It outlines the security requirements within the QKD boundary for QKD devices that provide key generation and sharing services included within the cryptographic system boundary. Therefore this standard demands that QKD mechanisms operate in compliance with standardized QKD protocols and include functionalities to counter known attacks. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0356_R1.pdf |