ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0032 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-11-07 ÃÑ ÆäÀÌÁö 26
ÇÑ±Û Ç¥ÁØ¸í ¾ÏÈ£¸ðµâ ½ÃÇè±â¼úÇ¥ÁØ »ç¿ëÁöħ(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Guideline for Using the Testing Standards of the Cryptographic Modules(Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ ±â¼úº¸°í¼­´Â KS ¾ÏÈ£ ¸ðµâ º¸¾È ¿ä±¸»çÇ×, KS ¾ÏÈ£ ¸ðµâ ½ÃÇè¿ä±¸»çÇ×, TTA ÀâÀ½¿ø ¼öÁý¹æ¹ý ¹× ÀÀ¿ëÁöħ, TTA ¾ÏÈ£ ¸ðµâ ÀÎÁ¤ÀýÂ÷, ISO/IEC ¾ÏÈ£ ¸ðµâ º¸¾È ¿ä±¸»çÇ×, ISO/IEC ¾ÏÈ£ ¸ðµâ ½ÃÇè¿ä±¸»çÇ×, ISO/IEC ¾ÏÈ£ ¸ðµâ¿¡ ´ëÇÑ ºñħÅõ °ø°Ý ´ëÀÀ±â¼ú ½ÃÇè ¹æ¹ý, ISO/IEC ¾ÏÈ£¾Ë°í¸®Áò ±¸Çö ÀûÇÕ¼º ½ÃÇè, ISO/IEC ³­¼ö ¹ß»ý±â ½ÃÇè ¹æ¹ý, ISO/IEC ¹°¸®Àû º¸¾È °ø°Ý ´ëÀÀ±â¼ú ¹× º¸¾È ¿ä±¸»çÇ×, ISO/IEC ¾ÏÈ£ ¸ðµâ ½ÃÇèÀÚ ÀڰݱâÁØ, ISO/IEC ¾ÏÈ£ ¸ðµâ ÇöÀå½ÃÇè °¡ÀÌµå µî Á¦Á¤µÇ¾ú°Å³ª °³¹ßµÇ°í ÀÖ´Â ¸¹Àº ¾ÏÈ£ ¸ðµâ ½ÃÇè±â¼ú Ç¥ÁصéÀ» ¼Ò°³ÇÏ°í »ç¿ë ÁöħÀ» Á¦½ÃÇÑ´Ù. Çѱ¹ ¾ÏÈ£ ¸ðµâ °ËÁõÁ¦µµ(KCMVP)¿¡¼­ ÁØ¿ëÇϰí Çϰí ÀÖ´Â °ËÁõ ±âÁØ ¹× ½ÃÇè±âÁØÀÎ KS ¾ÏÈ£ ¸ðµâ º¸¾È ¿ä±¸»çÇ× ¹× KS ¾ÏÈ£ ¸ðµâ ½ÃÇè¿ä±¸»çÇ×ÀÌ ÀÖÀ¸¸ç KCMVP ¼öÇà½Ã ÂüÁ¶ÇÒ ¼ö ÀÖ´Â ISO/IEC ¾ÏÈ£ ¸ðµâ¿¡ ´ëÇÑ ºñħÅõ °ø°Ý ´ëÀÀ±â¼ú ½ÃÇè ¹æ¹ý, ISO/IEC ¾ÏÈ£¾Ë°í¸®Áò ±¸Çö ÀûÇÕ¼º ½ÃÇè, ISO/IEC ³­¼ö ¹ß»ý±â ½ÃÇè ¹æ¹ý µîÀÌ ÀÖ´Ù. ±¹Á¦ ¾ÏÈ£ ¸ðµâ °ËÁõ ±âÁØ ¹× ½ÃÇè±âÁØÀº ISO/IEC ¾ÏÈ£ ¸ðµâ º¸¾È ¿ä±¸»çÇ× ¹× ISO/IEC ¾ÏÈ£ ¸ðµâ ½ÃÇè¿ä±¸»çÇ×À» ÁØ¿ëÇϰí ÀÖÀ¸¸ç ¹Ì±¹, ij³ª´Ù, ÀϺ» µîÀº ÀÚ±¹ÀÇ ¾ÏÈ£ ¸ðµâ °ËÁõÀ» À§ÇØ ±¹Á¦Ç¥ÁØ µµÀÔÀ» ÁغñÇϰí ÀÖ´Ù. ¶ÇÇÑ ¹Ì±¹, ij³ª´Ù, ÀϺ» µîÀº Çϵå¿þ¾î ¾ÏÈ£ ¸ðµâ °ËÁõ½Ã ISO/IEC ¾ÏÈ£ ¸ðµâ¿¡ ´ëÇÑ ºñħÅõ °ø°Ý ´ëÀÀ±â¼ú ½ÃÇè ¹æ¹ýÀ», ¾ÏÈ£ ¸ðµâ¿¡ ±¸ÇöµÈ ¾ÏÈ£¾Ë°í¸®Áò °ËÁõ½Ã ISO/IEC ¾ÏÈ£¾Ë°í¸®Áò ±¸Çö ÀûÇÕ¼º ½ÃÇèÀ», ¾ÏÈ£ ¸ðµâ¿¡ ±¸ÇöµÈ ¶Ç´Â »ç¿ëµÇ´Â ³­¼ö ¹ß»ý±â °ËÁõ½Ã ISO/IEC ³­¼ö ¹ß»ý±â ½ÃÇè ¹æ¹ý µîÀ» ÂüÁ¶Çϰí ÀÖ´Ù. ÀÌ ±â¼úº¸°í¼­´Â À§ÀÇ Ç¥ÁصéÀÇ ¸ñÀû, °³¹ß ¹è°æ, »ç¿ë ºÐ¾ß, »ç¿ë ¹æ¹ý, »ç¿ë½Ã Âü°í »çÇ×, Ç¥ÁØµé »çÀÌÀÇ ¿¬°è¼º µî »ç¿ë ÁöħÀ» Á¦½ÃÇÏ¿© °ü·Ã Ç¥ÁصéÀÇ ÀÌÇØ¸¦ µ½°íÀÚ ÇÑ´Ù
¿µ¹® ³»¿ë¿ä¾à A lot of standards related the cryptographic module testing technology have been published or developing. There are KS Security requirements for cryptographic modules, KS Test requirements for cryptographic modules, TTA Guideline for the collection and application of noise source on the operating systems, TTA Accreditation process of cryptographic module to operate, ISO/IEC Security requirements for cryptographic modules, ISO/IEC Test requirements for cryptographic modules, ISO/IEC Cryptographic algorithms and security mechanisms conformance testing, ISO/IEC Testing methods for the mitigation of non-invasive attack classes against cryptographic modules, ISO/IEC Competence requirements for information security testers and evaluators-Part 2: Competence requirements for ISO/IEC 19790 testers, ISO/IEC Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408, ISO/IEC Guidelines for testing cryptographic modules in their operational environment. ISO/IEC Physical security attacks, mitigation techniques and security requirements in the cryptographic module testing family. The KCMVP claims KS Security requirements for cryptographic modules and KS Test requirements for cryptographic modules as the validation criteria and testing criteria. ISO/IEC Security requirements for cryptographic modules and ISO/IEC Test requirements for cryptographic modules are claimed as the international validation criteria and testing criteria. The USA, Canada and Japan will adopt them as their national standards.
The technical report describes their purpose, the background of their development, the area for their use, the method to use them, the notes on using them and the relation among them, etc and help to understand them.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0032.pdf TTAR-12.0032.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾ÏÈ£¸ðµâ ½ÃÇè±â¼úÇ¥ÁØ »ç¿ëÁöħ(±â¼úº¸°í¼­) TTAR-12.0032 2018-11-07 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0032.pdf