Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAS.KO-12.0065 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑÆäÀÌÁö | 9 |
ÇѱÛÇ¥Áظí | MIKEY±â¹Ý ¾ÏÈ£¾Ë°í¸®Áò Çù»óÀýÂ÷ | ||
¿µ¹®Ç¥Áظí | Cryptographic Algorithm Negotiation Procedure based on MIKEY | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº RFC 3830À» ±â¹ÝÀ¸·Î UA(User Agent)°£ °øÅëÀûÀ¸·Î Áö¿øÇÏ´Â ¾ÏÈ£ ¾Ë°í¸®Áò
À» ã¾Æ³»±â À§ÇÑ Çù»ó ÀýÂ÷¿¡ ´ëÇÏ¿© ±â¼úÇÑ´Ù. 3Àå¿¡¼´Â Ç¥ÁØ¿¡¼ »ç¿ëµÇ´Â ¿ë¾î ¹× ¾à¾î¸¦ Á¤¸®ÇÏ¿´°í, 4Àå¿¡¼´Â ¸Þ½ÃÁö ±³È¯ Ƚ¼ö¸¦ °¨¼Ò½ÃŲ »õ·Î¿î ¾ÏÈ£¾Ë°í¸®Áò Çù»ó ÀýÂ÷¸¦ Á¦¾ÈÇÑ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | This standard describes a cryptographic algorithm negotiation procedure based on
the RFC 3830 for seeking a common algorithm between user agents. Section 3 describe definitions and abbreviations, and Section 4 proposes a new cryptographic algorithm negotiation procedure to reduce the number of roundtrip. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAS.KO-12.0065_ed15.pdf |