Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0409 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2024-06-28 | ÃÑÆäÀÌÁö | 76 |
ÇѱÛÇ¥Áظí | ¾çÀÚ Å° ºÐ¹è Àåºñ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ý | ||
¿µ¹®Ç¥Áظí | Test Methods for Verifying Security Requirements of Quantum Key Distribution Equipment | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD(Quantum Key Distribution) ¸ÞÄ¿´ÏÁòÀÇ ¾ÈÀü¼º È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. ÀϹÝÀûÀ¸·Î QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼ºñ½º¸¦ Á¦°øÇÏ¸ç ¿©±â¼´Â QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard specifies security test requirements for QKD mechanism using BB84 protocol and decoy method. Generally QKD boundary is included within cryptographic boundary to provide the secret key generation and sharing services, and this document specifies the testing methods within the QKD boundary. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0409.pdf |