Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0356/R1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-06-28 ÃÑÆäÀÌÁö 35
ÇѱÛÇ¥ÁØ¸í ¾çÀÚ Å° ºÐ¹è º¸¾È ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security Requirements for Quantum Key Distribution
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼­ºñ½º¸¦ Á¦°øÇÏ´Â QKD Àåºñ¿¡ ´ëÇØ ¾ÈÀüÇÑ µ¿ÀÛÀ» À§ÇÑ QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸í¼¼ÇÑ´Ù. Áï, º» Ç¥ÁØ¿¡¼­ QKD ¸ÞÄ¿´ÏÁòÀÌ Ç¥ÁØÈ­µÈ QKD ÇÁ·ÎÅäÄÝÀ» ÁؼöÇÏ°í ¾Ë·ÁÁø °ø°Ý¿¡ ´ëÇÑ ´ëÀÀ ±â´ÉÀ» Æ÷ÇÔÇÏ¿© µ¿ÀÛÇØ¾ß ÇÔÀ» ¿ä±¸ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard specifies security requirements for QKD mechanism implemented using BB84 protocol and decoy method. It outlines the security requirements within the QKD boundary for QKD devices that provide key generation and sharing services included within the cryptographic system boundary. Therefore this standard demands that QKD mechanisms operate in compliance with standardized QKD protocols and include functionalities to counter known attacks.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0356_R1.pdf TTAK.KO-12.0356_R1.pdf            

ÀÌÀü
¿¡Áö ÄÄÇ»ÆÃÀ» È°¿ëÇÑ Å¬¶ó¿ìµå ±â¹Ý °øÀå ¿¡³ÊÁö °ü¸® ¼­ºñ½º - Á¦1ºÎ: ÂüÁ¶ ±¸Á¶
´ÙÀ½
¿Àµð¿À ºñµð¿À ºê¸®Â¡(AVB) ½Ã½ºÅÛ (IEEE Std 802.1BA-2021)