Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | TTAS.KO-12.0065 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑ ÆäÀÌÁö | 9 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | MIKEY±â¹Ý ¾ÏÈ£¾Ë°í¸®Áò Çù»óÀýÂ÷ | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | Cryptographic Algorithm Negotiation Procedure based on MIKEY | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº RFC 3830À» ±â¹ÝÀ¸·Î UA(User Agent)°£ °øÅëÀûÀ¸·Î Áö¿øÇÏ´Â ¾ÏÈ£ ¾Ë°í¸®Áò
À» ã¾Æ³»±â À§ÇÑ Çù»ó ÀýÂ÷¿¡ ´ëÇÏ¿© ±â¼úÇÑ´Ù. 3Àå¿¡¼´Â Ç¥ÁØ¿¡¼ »ç¿ëµÇ´Â ¿ë¾î ¹× ¾à¾î¸¦ Á¤¸®ÇÏ¿´°í, 4Àå¿¡¼´Â ¸Þ½ÃÁö ±³È¯ Ƚ¼ö¸¦ °¨¼Ò½ÃŲ »õ·Î¿î ¾ÏÈ£¾Ë°í¸®Áò Çù»ó ÀýÂ÷¸¦ Á¦¾ÈÇÑ´Ù. |
||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à |
This standard describes a cryptographic algorithm negotiation procedure based on
the RFC 3830 for seeking a common algorithm between user agents. Section 3 describe definitions and abbreviations, and Section 4 proposes a new cryptographic algorithm negotiation procedure to reduce the number of roundtrip. |
||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| °ü·ÃÆÄÀÏ |
|
||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||

