Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0330-Part1 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑ ÆäÀÌÁö | 10 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦1ºÎ: ÀÏ¹Ý | ||||||||||||||||
¿µ¹® Ç¥Áظí | The Keyed-Hash Message Authentication Code (HMAC) - Part1: General | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾ÏÈ£ÇÐÀû ÇØ½Ã ÇÔ¼ö¸¦ ±â¹ÝÀ¸·Î Á¤ÀÇµÈ ¸Þ½ÃÁö ÀÎÁõ ÄÚµå ¾Ë°í¸®Áò HMACÀÇ »ó¼¼ ±Ô°ÝÀ» Á¦½ÃÇϰí, ¾ÈÀü¼º°ú È¿À²¼º °í·Á »çÇ×À» Á¤¸®ÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard defines the detailed specification of HMAC, a message authentication code algorithm based on a cryptographic hash function, and provides several considerations for security and efficiency. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|