ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0275 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑ ÆäÀÌÁö 43
ÇÑ±Û Ç¥Áظí ÇüÅ º¸Á¸ ¾ÏÈ£ FEA
¿µ¹® Ç¥Áظí Format-Preserving Encryption Algorithm FEA
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ÇüÅ º¸Á¸ ¾ÏÈ£(Format-Preserving Encryption) FEAÀÇ Àüü ±¸Á¶ ¹× ¾Ïȣȭ °úÁ¤°ú º¹È£È­ °úÁ¤ÀÇ ¶ó¿îµå ÇÔ¼ö¸¦ Á¤ÀÇÇϰí ÀÖ´Ù. ±×¸®°í °¢ °úÁ¤¿¡¼­ ¶ó¿îµå ÇÔ¼öÀÇ ºñ¹Ð ¿ä¼Ò·Î »ç¿ëµÇ´Â ¶ó¿îµå ۸¦ ºñ¹Ð Ű·ÎºÎÅÍ »ý¼ºÇÏ´Â ¹æ¹ý°ú, °¢ ¶ó¿îµå ÇÔ¼öÀÇ ÀÔ·Â ±æÀ̸¦ 128 ºñÆ®·Î ÀÏÁ¤ÇÏ°Ô À¯Áö½ÃŰ´Â ¿ä¼Ò·Î »ç¿ëµÇ´Â ¶ó¿îµå Æ®À¨À» Æ®À¨À¸·ÎºÎÅÍ »ý¼ºÇÏ´Â ¹æ¹ýÀ» Á¤ÀÇÇϰí ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard defines the overall structure and round functions for encryption and decryption procedures of two format-preserving encryption schemes FEA-1 and FEA-2. And the standard specifies the key scheduling and tweak scheduling functions for generating round keys and round tweaks to be used at each round function.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0275.pdf TTAK.KO-12.0275.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÇüÅ º¸Á¸ ¾ÏÈ£ FEA TTAK.KO-12.0275 2015-12-16 Á¦Á¤ À¯È¿ 2015-025
TTAK.KO-12.0275.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç Ȱ¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö