Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0289 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 11
ÇѱÛÇ¥Áظí DB ¾Ïȣȭ Á¦Ç° º¸¾È¼º Æò°¡¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Security Requirements for the Security Evaluation of the DB Encryption Products
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº DB ¾Ïȣȭ Á¦Ç°¿¡¼­ Á¦°øÇØ¾ß ÇÏ´Â ¾ÈÀüÇÑ Å° °ü¸®, DB µ¥ÀÌÅÍ ¾Ï¤ýº¹È£È­, ½Äº° ¹× ÀÎÁõ, °¨»ç ±â·Ï »ý¼º µîÀÇ º¸¾È ¿ä±¸ »çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes security requirements provided by DB encryption products such as secure key management, DB data encryption and decryption, identification and authentication, and generation of audit data.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0289.pdf TTAK.KO-12.0289.pdf            

ÀÌÀü
Çؽà ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦2ºÎ: Çؽà ÇÔ¼ö SHA-2
´ÙÀ½
ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ