ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0356/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-06-28 ÃÑ ÆäÀÌÁö 35
ÇÑ±Û Ç¥ÁØ¸í ¾çÀÚ Å° ºÐ¹è º¸¾È ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Security Requirements for Quantum Key Distribution
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄݰú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Ű »ý¼º ¹× °øÀ¯ ¼­ºñ½º¸¦ Á¦°øÇÏ´Â QKD Àåºñ¿¡ ´ëÇØ ¾ÈÀüÇÑ µ¿ÀÛÀ» À§ÇÑ QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸í¼¼ÇÑ´Ù. Áï, º» Ç¥ÁØ¿¡¼­ QKD ¸ÞÄ¿´ÏÁòÀÌ Ç¥ÁØÈ­µÈ QKD ÇÁ·ÎÅäÄÝÀ» ÁؼöÇÏ°í ¾Ë·ÁÁø °ø°Ý¿¡ ´ëÇÑ ´ëÀÀ ±â´ÉÀ» Æ÷ÇÔÇÏ¿© µ¿ÀÛÇØ¾ß ÇÔÀ» ¿ä±¸ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard specifies security requirements for QKD mechanism implemented using BB84 protocol and decoy method. It outlines the security requirements within the QKD boundary for QKD devices that provide key generation and sharing services included within the cryptographic system boundary. Therefore this standard demands that QKD mechanisms operate in compliance with standardized QKD protocols and include functionalities to counter known attacks.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0356_R1.pdf TTAK.KO-12.0356_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾çÀÚ Å° ºÐ¹è º¸¾È ¿ä±¸»çÇ× TTAK.KO-12.0356/R1 2024-06-28 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0356_R1.pdf
¾çÀÚŰºÐ¹è º¸¾È ¿ä±¸»çÇ× TTAK.KO-12.0356 2019-12-11 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0356.pdf
Ç¥ÁØÇؼ³¼­ ÆÄÀÏ ´Ù¿î·Îµå ¾Ë±â½¬¿î ict Ç¥ÁØ ÇØ¼³¼­(25³âµµ)Æîħ_TTAK.KO-12.0356R1.pdf