ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0409 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-06-28 ÃÑ ÆäÀÌÁö 76
ÇÑ±Û Ç¥ÁØ¸í ¾çÀÚ Å° ºÐ¹è Àåºñ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ý
¿µ¹® Ç¥Áظí Test Methods for Verifying Security Requirements of Quantum Key Distribution Equipment
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄݰú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¿© ±¸ÇöÇÑ QKD(Quantum Key Distribution) ¸ÞÄ¿´ÏÁòÀÇ ¾ÈÀü¼º È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. ÀϹÝÀûÀ¸·Î QKD °æ°è°¡ ¾ÏÈ£½Ã½ºÅÛ °æ°è ³»¿¡ Æ÷ÇԵǾî Ű »ý¼º ¹× °øÀ¯ ¼­ºñ½º¸¦ Á¦°øÇÏ¸ç ¿©±â¼­´Â QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard specifies security test requirements for QKD mechanism using BB84 protocol and decoy method. Generally QKD boundary is included within cryptographic boundary to provide the secret key generation and sharing services, and this document specifies the testing methods within the QKD boundary.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0409.pdf TTAK.KO-12.0409.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾çÀÚ Å° ºÐ¹è Àåºñ º¸¾È ¿ä±¸»çÇ× È®ÀÎÀ» À§ÇÑ ½ÃÇè ¹æ¹ý TTAK.KO-12.0409 2024-06-28 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0409.pdf
Ç¥ÁØÇؼ³¼­ ÆÄÀÏ ´Ù¿î·Îµå ¾Ë±â½¬¿î ict Ç¥ÁØ ÇØ¼³¼­(25³âµµ)Æîħ_TTAK.KO-12.0409.pdf