Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0115/R2 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 20
ÇѱÛÇ¥Áظí SRTP¿¡¼­ÀÇ ARIA ¾Ë°í¸®Áò ¿î¿µ ¹æ¹ý
¿µ¹®Ç¥Áظí The Use of ARIA Algorithm in SRTP
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ARIA¸¦ CTR(Counter) ¸ðµå¿Í GCM(Galois/Counter Mode)ÀÇ ±â¹Ý ºí·Ï ¾ÏÈ£·Î »ç¿ëÇÏ¿© ½Ç½Ã°£ Àü¼Û ÇÁ·ÎÅäÄÝ¿¡¼­ Á¤ÀÇÇÏ´Â RTP¿Í RTCP ÆÐŶÀÇ ¾Ïȣȭ¿Í ÀÎÁõ ÅÂ±× °è»ê, ±×¸®°í ¼¼¼ÇÅ° À¯µµ¿¡ Àû¿ëÇÏ´Â ¹æ¹ýÀ» Á¤ÀÇÇÑ´Ù. ±¸Ã¼ÀûÀ¸·Î´Â ¹Ì±¹ ¿¬¹æÁ¤ºÎ Ç¥ÁØ ºí·Ï ¾ÏÈ£ AESÀÇ SRTP Àû¿ë ¹æ¹ýÀ» ÁØ¿ëÇÑ´Ù. ±×¸®°í SRTPÀÇ ±âº» Å° °ü¸® ¹æ½ÄÀÎ SDES(Session Description Protocol Security Descriptions)¸¦ ÅëÇØ ¼¼¼Ç Âü¿©ÀÚµéÀÌ ARIA Àû¿ëÀ» À§ÇÑ ÁÖ¿ä ÆĶó¹ÌÅ͸¦ Çù»óÇÏ´Â °úÁ¤¿¡¼­ ÇÊ¿äÇÑ crypto suite¸¦ Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes how ARIA can be used to provide confidentiality and/or integrity to RTP/RTCP packets, and to provide session keys for the respective security primitives. Specifically, detailed descriptions of the use of ARIA for the encryption transform and the key derivation function are defined as the same with the cases of AES. Furthermore, it defines new SRTP crypto suites of ARIA to be used to signal and negotiate them via SDES(Session Description Protocol Security Descriptions).
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0115R2.pdf TTAK.KO-12.0115R2.pdf            

ÀÌÀü
IMT-2000 3GPP2 -HRPD ¸Á Á¢¼Ó±Ô°ÝÀ» À§ÇÑ »óÈ£¿î¿ë ±Ô°Ý (Release B)
´ÙÀ½
IMT-2000 3GPP2 - ÆÐŶ Á¶Á¤ ±â´É»ó¿¡¼­ÀÇ ¼¼¼Ç Á¶Á¤±â´ÉÀ» °®´Â HRPD ¹«¼± Á¢¼Ó ³×Æ®¿÷ ÀÎÅÍÆäÀ̽º¸¦ À§ÇÑ »óÈ£¿î¿ë ±Ô°Ý (Release A)