ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0246 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑ ÆäÀÌÁö 207
ÇÑ±Û Ç¥Áظí 128 ºñÆ® ºí·Ï ¾ÏÈ£ LEA ¿î¿µ ¸ðµå
¿µ¹® Ç¥Áظí Modes of Operation for the 128-Bit Block Cipher LEA
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ºí·Ï ¾ÏÈ£ LEA(Lightweight Encryption Algorithm)ÀÇ ±â¹Ð¼º ¿î¿µ ¸ðµåÀÎ ECB(Electronic Code Book), CBC(Cipher Block Chaining), CFB(Cipher FeedBack), OFB(Output FeedBack), CTR(CounTeR)°ú ÀÎÁõ ¾Ïȣȭ ¿î¿µ ¸ðµåÀÎ CCM, GCMÀÇ ¾Ï・º¹È£È­ °úÁ¤, ±×¸®°í ÀÎÁõ ¿î¿µ ¸ðµåÀÎ CMACÀÇ ÀÎÁõ°ª »ý¼º・°ËÁõ °úÁ¤À» Á¤ÀÇÇÏ°í ÀÖ´Ù. ¶ÇÇÑ ±¸Çö ÀûÇÕ¼ºÀ» È®ÀÎÇϱâ À§ÇÑ ÂüÁ¶ ±¸Çö°ªÀ» ºÎ·Ï¿¡ ¸í½ÃÇÏ°í ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard defines the overall structure of confidential modes of operation ECB(Electronic Code Book), CBC(Cipher Block Chaining), CFB(Ciphertext FeedBack), OFB(Output FeedBack), CTR(CounTeR), authenticated encryption modes of operation CCM, GCM, and message authentication mode of operation CMAC. And test vectors for implementation conformance checks are provided in appendix.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2019-06-18
ÆóÁö»çÀ¯ °ü·Ã ´ÜüǥÁØÀÌ »õ·Î Á¦Á¤µÇ¾î ±âÁ¸ ´ÜüǥÁØ ÆóÁö
(´ëüǥÁØ: TTAK.KO-12.0271-Part2/R1, nºñÆ® ºí·Ï ¾ÏÈ£ ¿î¿µ ¸ðµå - Á¦2ºÎ: ºí·Ï ¾ÏÈ£ LEA)
°ü·ÃÆÄÀÏ  TTAK.KO-12.0246.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
128 ºñÆ® ºí·Ï ¾ÏÈ£ LEA ¿î¿µ ¸ðµå TTAK.KO-12.0246 2014-12-17 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 ÆóÁö °ü·Ã ±¹³»Ç¥ÁØ(TTAK.KO-12.0271-Part2 : LEA) Á¦Á¤À¸·Î ±¸Ç¥ÁØ ÆóÁö
¿À·ùÁ¤Á¤
±¸ºÐ äÅÃÀÏ Á¤Á¤¹øÈ£ ¹®¼­
Ç¥ÁØ¿À·ùÁ¤Á¤1
2015-09-04
TTAK.KO-12.0246-Cor1
ÆÄÀÏ´Ù¿î
Ç¥ÁØÇؼ³¼­ ÆÄÀÏ ´Ù¿î·Îµå Ç¥ÁØÇؼ³¼­_128ºñÆ®ºí·Ï¾ÏÈ£LEA¹×¿î¿µ¸ðµå_[2].pdf