ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0330-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 23
ÇÑ±Û Ç¥Áظí ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦2ºÎ: ÇØ½Ã ÇÔ¼ö SHA-2
¿µ¹® Ç¥Áظí The Keyed-Hash Message Authentication Code (HMAC) - Part2: Hash Function SHA-2
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¾ÏÈ£ÇÐÀû ÇØ½Ã ÇÔ¼ö¸¦ ±â¹ÝÀ¸·Î Á¤ÀÇµÈ ¸Þ½ÃÁö ÀÎÁõ ÄÚµå ¾Ë°í¸®Áò HMACÀÇ »ó¼¼ ±Ô°ÝÀ» Á¦½ÃÇϰí, ¾ÈÀü¼º°ú È¿À²¼º °í·Á »çÇ×À» Á¤¸®ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard defines the detailed specification of HMAC, a message authentication code algorithm based on a cryptographic hash function, and provides several considerations for security and efficiency.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0330-Part2.pdf TTAK.KO-12.0330-Part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÇØ½Ã ÇÔ¼ö ±â¹Ý ¸Þ½ÃÁö ÀÎÁõ ÄÚµå (HMAC) - Á¦2ºÎ: ÇØ½Ã ÇÔ¼ö SHA-2 TTAK.KO-12.0330-Part2 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0330-Part2.pdf