Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0195 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2012-12-21 | ÃÑÆäÀÌÁö | 19 |
ÇѱÛÇ¥Áظí | ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò | ||
¿µ¹®Ç¥Áظí | Cryptographic Algorithms for VoIP Secure Communication in Private Sector | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â ÀÎÅͳÝÀüÈ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× Åëȳ»¿ë ¾Ïȣȿ¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ ÀÖ¾î¼ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼµµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼ ½ÇÁ¦ ¾Ïȣȿ¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0195_ed15.pdf |