Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0330-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 23 |
ÇѱÛÇ¥Áظí | Çؽà ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦2ºÎ: Çؽà ÇÔ¼ö SHA-2 | ||
¿µ¹®Ç¥Áظí | The Keyed-Hash Message Authentication Code (HMAC) - Part2: Hash Function SHA-2 | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾ÏÈ£ÇÐÀû Çؽà ÇÔ¼ö¸¦ ±â¹ÝÀ¸·Î Á¤ÀÇµÈ ¸Þ½ÃÁö ÀÎÁõ ÄÚµå ¾Ë°í¸®Áò HMACÀÇ »ó¼¼ ±Ô°ÝÀ» Á¦½ÃÇÏ°í, ¾ÈÀü¼º°ú È¿À²¼º °í·Á »çÇ×À» Á¤¸®ÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines the detailed specification of HMAC, a message authentication code algorithm based on a cryptographic hash function, and provides several considerations for security and efficiency. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0330-Part2.pdf |