Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0330-Part3 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 41 |
ÇѱÛÇ¥Áظí | ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦3ºÎ: ÇØ½Ã ÇÔ¼ö LSH | ||
¿µ¹®Ç¥Áظí | The Keyed-Hash Message Authentication Code (HMAC) - Part3: Hash Function LSH | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾ÏÈ£ Ű Å©±â Á¶°Ç¿¡ µû¶ó ´Þ¶óÁö´Â HMAC ¾Ë°í¸®ÁòÀÇ µ¿ÀÛ ¹æ½ÄÀ» ¹Ý¿µÇÏ¿©, LSH¸¦ ±â¹Ý ÇØ½Ã ÇÔ¼ö·Î »ç¿ëÇÏ´Â HMACÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard reflects the characteristic of HMAC algorithms depending on the cryptographic key size option.
And, the standard specifies the detailed test vectors of HMAC based on LSH about implementation conformance. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ |
![]() |