ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0330-Part4 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-06-18 ÃÑ ÆäÀÌÁö 23
ÇÑ±Û Ç¥Áظí ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦4ºÎ: ÇØ½Ã ÇÔ¼ö SHA-3
¿µ¹® Ç¥Áظí The Keyed-Hash Message Authentication Code (HMAC) - Part4: Hash Function SHA-3
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¾ÏÈ£ Ű Å©±â Á¶°Ç¿¡ µû¶ó ´Þ¶óÁö´Â HMAC ¾Ë°í¸®ÁòÀÇ µ¿ÀÛ ¹æ½ÄÀ» ¹Ý¿µÇÏ¿©, SHA-3¸¦ ±â¹Ý ÇØ½Ã ÇÔ¼ö·Î »ç¿ëÇÏ´Â HMACÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÑ´Ù. ÀÌ Ç¥ÁØÀÇ ¸ñÀûÀº SHA-3¸¦ ±â¹Ý ÇØ½Ã ÇÔ¼ö·Î »ç¿ëÇÏ´Â HMAC(Keyed-Hash Message Authentication Code)ÀÇ ÂüÁ¶±¸Çö°ªÀ» Á¦½ÃÇÏ¿©, HMACÀÇ ±¸Çö Á¤È®¼ºÀ» È®ÀÎÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â °ÍÀÌ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard reflects the characteristic of HMAC algorithms depending on the cryptographic key size option.
Furthermore, the standard specifies detailed test vectors for HMAC based on SHA-3 about implementation conformance. The standard is to define test vectors for HMAC based on SHA-3 about implementation conformance.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0330-Part4_[2].pdf TTAK.KO-12.0330-Part4_[2].pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦4ºÎ: ÇØ½Ã ÇÔ¼ö SHA-3 TTAK.KO-12.0330-Part4 2019-06-18 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0330-Part4_[2].pdf