Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0264 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑÆäÀÌÁö 11
ÇѱÛÇ¥ÁØ¸í ¿î¿µ½Ã ¾ÏÈ£¸ðµâ ÀÎÁ¤ ÇÁ·Î¼¼½º
¿µ¹®Ç¥Áظí Accreditation Process of Cryptographic Module to Operate
Çѱ۳»¿ë¿ä¾à ´Ù¾çÇÑ ÇüÅÂÀÇ ¾ÏÈ£ ¸ðµâÀº Á¤º¸Åë½Å½Ã½ºÅÛ¿¡¼­ Áß¿äÇÑ Á¤º¸¸¦ º¸È£ÇÏ´Â Á¤º¸º¸È£½Ã½ºÅÛ¿¡ žÀçµÇ¾î »ç¿ëµÈ´Ù. ±¹Á¦ÀûÀ¸·Î KCMVP, CMVP, JCMVP µî ¾ÏÈ£ ¸ðµâ °ËÁõ±â°ü¿¡¼­ ISO/IEC 19790¿¡ µû¶ó °ËÁõÇÏ°í ¾ÏÈ£ ¸ðµâÀÇ ¾ÈÀü¼ºÀ» º¸ÁõÇÏ°í ÀÖ´Ù. ¾ÏÈ£ ¸ðµâÀÌ ´Ù¾çÇÑ ¿î¿µ ȯ°æ¿¡ »ç¿ëµÉ ¶§ ÀûÇÕÇÑ ¾ÏÈ£ ¸ðµâÀ» ¼±Á¤Çϱâ À§Çؼ­´Â Àü¹®ÀûÀÎ ±â¼úÀÌ ÇÊ¿äÇÏ´Ù. ±×·¯¹Ç·Î »ç¿ë ±â°üÀÌ Á¤º¸Åë½Å½Ã½ºÅÛ¿¡¼­ Á¤º¸º¸È£½Ã½ºÅÛÀ» ¾ÈÀüÇÏ°Ô ¿î¿µÇϱâ À§ÇØ ¾ÏÈ£ ¸ðµâÀ» µµÀÔÇÒ °æ¿ì ÀÎÁ¤ ÀýÂ÷¸¦ ÅëÇÏ¿© ¾ÏÈ£ ¸ðµâÀ» ½ÂÀÎÇÏ´Â °ÍÀÌ ÇÊ¿äÇÏ´Ù.
º» Ç¥ÁØÀº ¾ÏÈ£ ¸ðµâ »ç¿ë ±â°üÀÌ ¾ÏÈ£ ¸ðµâ °ËÁõ±â°ü¿¡¼­ ISO/IEC 19790¿¡ µû¶ó °ËÁõµÈ ¾ÏÈ£ ¸ðµâµé Áß¿¡¼­ ¿î¿µ ȯ°æ¿¡ ÀûÇÕÇÑ ¾ÏÈ£ ¸ðµâÀ» ¼±Á¤Çϱâ À§ÇÑ ÀÎÁ¤ ÇÁ·Î¼¼½º¸¦ Á¦½ÃÇÑ´Ù.

º» ÀÎÁ¤ÀýÂ÷´Â »ç¿ë ±â°üÀÌ Á¤º¸Åë½Å½Ã½ºÅÛ¿¡ ¿î¿µÇÒ ¾ÏÈ£ ¸ðµâÀ» ½ÂÀÎÇÒ ¶§ À¯¿ëÇÏ°Ô »ç¿ëµÉ ¼ö ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à A various types of cryptographic modules are utilized within a security system protecting sensitive information in computer and telecommunication systems. The approved authorities as like KCMVP, CMVP, JCMVP validate various types of cryptographic modules according to ISO/IEC 1979 and assure the security of the module. When the cryptographic module is utilized in a diversity of application environments, it needs the professional technology to choice the cryptographic module which is proper to the application environments. Therefore, if the information system owner acquires the cryptographical module to operate the information system safely, it is necessary to accredit the module through the accreditation process. This standard proposes accreditation process to authorize cryptographic module when information system owner acquires a cryptographic module which is validated at the approved authority. The cryptographic module is claimed by ISO/IEC 19790. The accreditation process which is proposed by this standard is useful when accreditor approves the cryptographic module to operate in the information system.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0264.pdf TTAK.KO-12.0264.pdf            

ÀÌÀü
À¥ ÀÀ¿ëÇÁ·Î±×·¥ ħÀÔÂ÷´Ü Á¦Ç° º¸¾È¿ä±¸»çÇ×
´ÙÀ½
½º¸¶Æ® Æù º¸¾È°ü¸® Á¦Ç° º¸¾È¿ä±¸»çÇ×