Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0195 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Cryptographic Algorithms for VoIP Secure Communication in Private Sector
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ÀÎÅͳÝÀüÈ­ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ­ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× ÅëÈ­³»¿ë ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ À־ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼ­µµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼­ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼­ ½ÇÁ¦ ¾Ïȣȭ¿¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0195_ed15.pdf TTAK.KO-12.0195_ed15.pdf            

ÀÌÀü
È£Ãâ±â ±¸ºÐÀÚ¸¦ °®´Â ÇÏÀ̺긮µå ±¤-RF ID ¸Þ½ÃÁö Àü¼Û ±¸Á¶
´ÙÀ½
¶óÀÎ ÄÚµåÈ­µÈ Â÷µî ºñµ¿±â ºü¸¥ ¸µÅ©(DA-QL) ½Ã½ºÅÛ ¾ÆÅ°ÅØó