Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0330-Part3 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥Áظí ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦3ºÎ: ÇØ½Ã ÇÔ¼ö LSH
¿µ¹®Ç¥Áظí The Keyed-Hash Message Authentication Code (HMAC) - Part3: Hash Function LSH
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¾ÏÈ£ Ű Å©±â Á¶°Ç¿¡ µû¶ó ´Þ¶óÁö´Â HMAC ¾Ë°í¸®ÁòÀÇ µ¿ÀÛ ¹æ½ÄÀ» ¹Ý¿µÇÏ¿©, LSH¸¦ ±â¹Ý ÇØ½Ã ÇÔ¼ö·Î »ç¿ëÇÏ´Â HMACÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard reflects the characteristic of HMAC algorithms depending on the cryptographic key size option.
And, the standard specifies the detailed test vectors of HMAC based on LSH about implementation conformance.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0330-Part3.pdf TTAK.KO-12.0330-Part3.pdf            

ÀÌÀü
ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦2ºÎ: ÇØ½Ã ÇÔ¼ö SHA-2
´ÙÀ½
ºÐ»ê¿øÀå±â¼úÀ» Ȱ¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ