ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0331-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 45
ÇÑ±Û Ç¥Áظí ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦2ºÎ: ÇØ½Ã ÇÔ¼ö SHA-2
¿µ¹® Ç¥Áظí Deterministic Random Bit Generator based on Hash Function - Part2: Hash Function SHA-2
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Hash_DRBG ¿î¿ëÀ» À§ÇØ °í·ÁÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ ¼±Åà ¿ä¼Ò(¿¹Ãø ³»¼º Áö¿ø, »óÅ °»½Å ÁÖ±â, °³º°È­ ¹®ÀÚ¿­ ÀÔ·Â, Ãß°¡ ÀÔ·Â)ÀÇ ¼³Á¤À̳ª »ç¿ë ¿©ºÎ¿¡ µû¸¥ ³»ºÎ µ¿ÀÛ ¹æ½ÄÀÇ º¯È­¸¦ ¹Ý¿µÇÏ¿©, SHA-2¸¦ ±â¹Ý ÇØ½Ã ÇÔ¼ö·Î »ç¿ëÇÏ´Â Hash_DRBGÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard specifies the detailed test vectors of Hash_DRBG used as hash function SHA-2 about implementation conformance. The standard reflects the various options(prediction resistance, reseed interval, personalization string, additional input) that can be considered for Hash_DRBG operation.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0331-Part2.pdf TTAK.KO-12.0331-Part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦1ºÎ: ÀÏ¹Ý TTAK.KO-12.0331-Part1/R1 2022-12-07 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0331-Part1_R1.pdf
ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦4ºÎ: ÇØ½Ã ÇÔ¼ö SHA-3 TTAK.KO-12.0331-Part4 2019-06-18 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0331-Part4_[1].pdf
ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦1ºÎ: ÀÏ¹Ý TTAK.KO-12.0331-Part1 2018-12-19 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0331-Part1.pdf
ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦2ºÎ: ÇØ½Ã ÇÔ¼ö SHA-2 TTAK.KO-12.0331-Part2 2018-12-19 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0331-Part2.pdf
ÇØ½Ã ÇÔ¼ö ±â¹Ý °áÁ¤·ÐÀû ³­¼ö¹ß»ý±â - Á¦3ºÎ: ÇØ½Ã ÇÔ¼ö LSH TTAK.KO-12.0331-Part3 2018-12-19 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0331-Part3.pdf
°áÁ¤·ÐÀû ³­¼ö ¹ß»ý±â -Á¦2ºÎ- ÇØ½Ã ÇÔ¼ö ±â¹Ý ³­¼ö ¹ß»ý±â TTAK.KO-12.0190 2012-12-21 Á¦Á¤ ÆóÁö ¾øÀ½