Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAS.KO-12.0065 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑ ÆäÀÌÁö | 9 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | MIKEY±â¹Ý ¾ÏÈ£¾Ë°í¸®Áò Çù»óÀýÂ÷ | ||||||||||||||||
¿µ¹® Ç¥Áظí | Cryptographic Algorithm Negotiation Procedure based on MIKEY | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº RFC 3830À» ±â¹ÝÀ¸·Î UA(User Agent)°£ °øÅëÀûÀ¸·Î Áö¿øÇÏ´Â ¾ÏÈ£ ¾Ë°í¸®Áò
À» ã¾Æ³»±â À§ÇÑ Çù»ó ÀýÂ÷¿¡ ´ëÇÏ¿© ±â¼úÇÑ´Ù. 3Àå¿¡¼´Â Ç¥ÁØ¿¡¼ »ç¿ëµÇ´Â ¿ë¾î ¹× ¾à¾î¸¦ Á¤¸®ÇÏ¿´°í, 4Àå¿¡¼´Â ¸Þ½ÃÁö ±³È¯ Ƚ¼ö¸¦ °¨¼Ò½ÃŲ »õ·Î¿î ¾ÏÈ£¾Ë°í¸®Áò Çù»ó ÀýÂ÷¸¦ Á¦¾ÈÇÑ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
This standard describes a cryptographic algorithm negotiation procedure based on
the RFC 3830 for seeking a common algorithm between user agents. Section 3 describe definitions and abbreviations, and Section 4 proposes a new cryptographic algorithm negotiation procedure to reduce the number of roundtrip. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|