Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.3G-33.901(R4-4.0.0) ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2002-10-28 ÃÑÆäÀÌÁö 18
ÇѱÛÇ¥Áظí IMT-2000 3GPP-¾Ïȣȭ ¾Ë°í¸®Áò ¼³°è ÇÁ·Î¼¼½º¸¦ À§ÇÑ ±âÁØ;4.0.0
¿µ¹®Ç¥Áظí IMT-2000 3GPP-Criteria for cryptographic Algorithm design process;4.0.0
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â UMTS¿¡¼­ Ç¥ÁØÈ­ µÉ ¾Ïȣȭ ¾Ë°í¸®ÁòÀÇ È®º¸ °¡´É¼º¿¡ ´ëÇؼ­ ³íÀÇÇÏ°í ÀÖ´Â °ÍÀ¸·Î ÁÖ¿ä »çÇ×Àº µ¥ÀÌÅÍ ½Å·Ú¼º ¸ÞÄ¿´ÏÁò¿¡ »ç¿ëµÇ´Â ºñÈ­±â´É°ú ½ÅÈ£ µ¥ÀÌÅÍ ¹«°á¼º ¸ÞÄ¿´ÏÁò¿¡ »ç¿ëµÇ´Â ÀÎÁõ ±â´É¿¡ ´ëÇÑ °ÍÀÓ
µ¥ÀÌÅÍ ½Å·Ú¼ºÀ» À§ÇÑ ºñÈ­±â´É°ú ½ÅÈ£ µ¥ÀÌÅÍ ¹«°á¼ºÀ» À§ÇÑ ÀÎÁõ ±â´É¿¡ ´ëÇؼ­ Àû¿ëÇÒ ¼ö ÀÖÀ» °ÍÀÓ
º» ¹®¼­´Â UMTS¿¡¼­ Ç¥ÁØÈ­ µÉ ¾Ïȣȭ ¾Ë°í¸®Áò È®º¸ °¡´É¼º¿¡ ´ëÇÑ ³íÀǸ¦ ´Ù·é °ÍÀ¸·Î, °¡´ÉÇÑ ¼³°è Àü·«, Æò°¡ Àü·«, ¾Ë°í¸®Áò ¹èÆ÷ °¡´É¼º, ±×¸®°í ¾Ë°í¸®Áò¿¡ ´ëÇÑ Ã¥ÀÓ°ú ½Å·Ú¼º¿¡ ´ëÇÑ ¼±Åà »çÇ×µéÀ» Æ÷ÇÔÇÔ.
¿µ¹®³»¿ë¿ä¾à This report discusses the possibilities for acquisition of the cryptographic algorithms that has to be standardised in UMTS. The focus is on the encryption function used in the data confidentiality mechanism and the message authentication function used in the signalling data integrity mechanism.
First certain aspects of the process and desired results for an algorithm specification and their pro's and cons will be given. These aspects will include the possible design strategies, the evaluation strategies, the possibilities for distribution of the algorithms and the options for the liability and responsibility for the algorithm.
±¹Á¦Ç¥ÁØ 3GPP TR 33.901
°ü·ÃÆÄÀÏ TTAE.3G-33.901(R4-4.0.0).pdf TTAE.3G-33.901(R4-4.0.0).pdf            

ÀÌÀü
IMT-2000 3GPP-3G ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ Çü½ÄÀû ºÐ¼®;4.0.0
´ÙÀ½
IMT-2000 3GPP-3G º¸¾È; MILENAGE ¾Ë°í¸®Áò ¼ÂÀÇ ¼³°è¿Í Æò°¡¿¡ ´ëÇÑ º¸°í¼­; Deliverable 5; 3GPP ÀÎÁõ°ú Å° ¹ß»ý ÇÔ¼ö¿¡ ´ëÇÑ ¿¹Á¦ ¾Ë°í¸®Áò(R4)