Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAR-12.0003 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2009-11-24 | ÃÑ ÆäÀÌÁö | 33 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¼öµ¿Çü RFID º¸¾ÈÅÂ±×¿Í ¸®´õÀÇ ÀÎÁõ ¹× µ¥ÀÌÅÍ º¸È£ ÇÁ·ÎÅäÄÝ ºÐ¼®¼ | ||||||||||||||||
¿µ¹® Ç¥Áظí | Analytical Manual for Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÁÖ¿ä ³»¿ëÀ¸·Î´Â ¼öµ¿Çü RFID ÅÂ±×¿Í ¸®´õ °£ÀÇ ÀÎÁõ ¹× µ¥ÀÌÅÍ Åë½Åä³Î º¸È£¸¦ º¸ÀåÇϱâ À§ÇÑ ÇÁ·ÎÅäÄÝ ±Ô°ÝÀ¸·Î¼, ISO/IEC 18000-6 Type C ±Ô°ÝÀÇ ¼öµ¿Çü RFID ÅÂ±×¿Í È£È¯µÇ¸é¼ º¸¾È ±â´ÉÀÌ °ÈµÈ ¼öµ¿Çü RFID º¸¾Èű׸¦ ±¸ÇöÇÒ ¼ö ÀÖ´Â ±â¼úÀ» Á¤ÀÇÇÑ´Ù.
º» ±â¼úº¸°í¼ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼´Â űװ¡ ű×ÀÇ ·£´ý³Ñ¹ö¸¸À» »ç¿ëÇÏ¿© ¹Ì¸® ¼¼¼Ç ۸¦ »ý¼ºÇÏ´Â ¹æ¹ýÀ» »ç¿ëÇϰí ÀÖ´Ù. À̴ ű×ÀÇ ÀÀ´äÁ¦Çѽð£(Áï, ¸®´õ°¡ ¸í·ÉÀ» º¸³½ ÈÄ Å±×ÀÇ ÀÀ´äÀ» ¹ÞÀ» ¶§±îÁö ±â´Ù·ÁÁÖ´Â ½Ã°£) ¾È¿¡ űװ¡ ¾ÏÈ£¹®À» »ý¼ºÇÏ¿© ÀÀ´äÇÒ ¼ö ÀÖ´Â Åä´ë¸¦ Á¦°øÇÑ´Ù. ±×·¯³ª, ű×ÀÇ ·£´ý³Ñ¹ö¸¸À» »ç¿ëÇϱ⠶§¹®¿¡ °ø°ÝÀÚ°¡ ±âÁ¸ÀÇ Å±×ÀÇ ·£´ý³Ñ¹ö¸¦ ÀçÀü¼ÛÇÒ °æ¿ì µÑ ÀÌ»óÀÇ ¼¼¼Ç¿¡¼ µ¿ÀÏÇÑ ¼¼¼Ç ۰¡ »ç¿ëµÇ¾î ½ºÇªÇÎ(spoofing) °ø°Ý¿¡ Ãë¾àÇÏ´Ù´Â ¾àÁ¡À» °¡Áö°í ÀÖ´Ù. µû¶ó¼, º» ±â¼úº¸°í¼ÀÇ ÇÁ·ÎÅäÄÝÀº ű×ÀÇ ¿¬»ê ´É·ÂÀÌ ¹ÌÈíÇÏ¿© ¼¼¼Ç ½ÃÀÛ ½Ã ¹Ì¸® ¼¼¼Ç ۸¦ »ý¼ºÇØ¾ß ÇÏ´Â °æ¿ì¿¡ »ç¿ëµÉ ¼ö ÀÖ´Ù. ¸¸ÀÏ ½ºÇªÇÎ °ø°ÝÀ» ¹æ¾îÇϱâ À§Çؼ´Â ÇÁ·ÎÅäÄÝ °úÁ¤¿¡ ¸®´õÀÇ ·£´ý³Ñ¹ö¸¦ ¼ö½ÅÇÏ¿© ű×ÀÇ ÀÀ´äÁ¦Çѽ𣠾ȿ¡ ¼¼¼Ç Ű »ý¼º°ú µ¥ÀÌÅÍ ¾Ïȣȸ¦ ¼öÇàÇÒ ¼ö ÀÖ´Â ¿¬»ê´É·ÂÀ» °¡Áø űװ¡ »ç¿ëµÇ¾î¾ß Çϸç, ±×¿¡ ¸Â´Â º°µµÀÇ ÇÁ·ÎÅäÄÝ·Î µ¿À۵Ǿî¾ß ÇÑ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
The contents are the security protocols for guaranteeing an authentication between the tag and a reader and data communication channel protection. This technical report defines the technology implementing the passive RFID security tag and the reader in which the security function is strengthened. And this technical report is compatible with the passive RFID tag of the ISO/IEC 18000-6 Type C standard.
The security protocols define the session key generation method which uses the only tag¡¯s random number. The tag can respond to the reader with encrypted data within the limited tag response time by using the security protocols of this technical report. However, the security protocols have a weak point of a spoofing attack because more than two sessions can generate the same session key. Therefore, if users should be prevented from the spoofing attack, they should use the powerful tag which can generate the session key using the tag¡¯s random number and the reader¡¯s random number and encrypt the data with the generated session key within the limited tag response time. The tag conforming to this technical report can be used in the case that the tag has no abilities of the real-time session key generation and data encryption. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2021-10-22 | ||||||||||||||||
ÆóÁö»çÀ¯ | »ê¾÷ ÇöÀå¿¡¼ Ȱ¿ëµÇÁö ¾ÊÀ¸¹Ç·Î ÆóÁö | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAR-12.0003.zip | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|