Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0409 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-06-28 ÃÑÆäÀÌÁö 76
ÇѱÛÇ¥ÁØ¸í ¾çÀÚ Å° ºÐ¹è Àåºñ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ý
¿µ¹®Ç¥Áظí Test Methods for Verifying Security Requirements of Quantum Key Distribution Equipment
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD(Quantum Key Distribution) ¸ÞÄ¿´ÏÁòÀÇ ¾ÈÀü¼º È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. ÀϹÝÀûÀ¸·Î QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼­ºñ½º¸¦ Á¦°øÇÏ¸ç ¿©±â¼­´Â QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard specifies security test requirements for QKD mechanism using BB84 protocol and decoy method. Generally QKD boundary is included within cryptographic boundary to provide the secret key generation and sharing services, and this document specifies the testing methods within the QKD boundary.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0409.pdf TTAK.KO-12.0409.pdf            

ÀÌÀü
Çϵå¿þ¾î °ø±Þ¸Á º¸¾È °ËÁõÀ» À§ÇÑ °øÅë º¸¾È¿ä±¸»çÇ×
´ÙÀ½
IoT ±â¹Ý ¹ßÀü¼Ò ¾ÈÀü°ü¸® ¼­ºñ½º ÇÁ·ÎÆÄÀÏ ½ÃÇè±Ô°Ý - Á¦1ºÎ: ÀûÇÕ¼º ½ÃÇè