Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0330-Part3 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 41 |
ÇѱÛÇ¥Áظí | Çؽà ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦3ºÎ: Çؽà ÇÔ¼ö LSH | ||
¿µ¹®Ç¥Áظí | The Keyed-Hash Message Authentication Code (HMAC) - Part3: Hash Function LSH | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾ÏÈ£ Å° Å©±â Á¶°Ç¿¡ µû¶ó ´Þ¶óÁö´Â HMAC ¾Ë°í¸®ÁòÀÇ µ¿ÀÛ ¹æ½ÄÀ» ¹Ý¿µÇÏ¿©, LSH¸¦ ±â¹Ý Çؽà ÇÔ¼ö·Î »ç¿ëÇÏ´Â HMACÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard reflects the characteristic of HMAC algorithms depending on the cryptographic key size option.
And, the standard specifies the detailed test vectors of HMAC based on LSH about implementation conformance. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0330-Part3.pdf |