ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ [ÆóÁö] TTAR-12.0003 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-11-24 ÃÑ ÆäÀÌÁö 33
ÇÑ±Û Ç¥ÁØ¸í ¼öµ¿Çü RFID º¸¾ÈÅÂ±×¿Í ¸®´õÀÇ ÀÎÁõ ¹× µ¥ÀÌÅÍ º¸È£ ÇÁ·ÎÅäÄÝ ºÐ¼®¼­
¿µ¹® Ç¥Áظí Analytical Manual for Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader
ÇÑ±Û ³»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â ¼öµ¿Çü RFID ÅÂ±×¿Í ¸®´õ °£ÀÇ ÀÎÁõ ¹× µ¥ÀÌÅÍ Åë½Åä³Î º¸È£¸¦ º¸ÀåÇϱâ À§ÇÑ ÇÁ·ÎÅäÄÝ ±Ô°ÝÀ¸·Î¼­, ISO/IEC 18000-6 Type C ±Ô°ÝÀÇ ¼öµ¿Çü RFID ÅÂ±×¿Í È£È¯µÇ¸é¼­ º¸¾È ±â´ÉÀÌ °­È­µÈ ¼öµ¿Çü RFID º¸¾Èű׸¦ ±¸ÇöÇÒ ¼ö ÀÖ´Â ±â¼úÀ» Á¤ÀÇÇÑ´Ù.
º» ±â¼úº¸°í¼­ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼­´Â űװ¡ ű×ÀÇ ·£´ý³Ñ¹ö¸¸À» »ç¿ëÇÏ¿© ¹Ì¸® ¼¼¼Ç ۸¦ »ý¼ºÇÏ´Â ¹æ¹ýÀ» »ç¿ëÇϰí ÀÖ´Ù. À̴ ű×ÀÇ ÀÀ´äÁ¦Çѽð£(Áï, ¸®´õ°¡ ¸í·ÉÀ» º¸³½ ÈÄ Å±×ÀÇ ÀÀ´äÀ» ¹ÞÀ» ¶§±îÁö ±â´Ù·ÁÁÖ´Â ½Ã°£) ¾È¿¡ űװ¡ ¾ÏÈ£¹®À» »ý¼ºÇÏ¿© ÀÀ´äÇÒ ¼ö ÀÖ´Â Åä´ë¸¦ Á¦°øÇÑ´Ù. ±×·¯³ª, ű×ÀÇ ·£´ý³Ñ¹ö¸¸À» »ç¿ëÇϱ⠶§¹®¿¡ °ø°ÝÀÚ°¡ ±âÁ¸ÀÇ Å±×ÀÇ ·£´ý³Ñ¹ö¸¦ ÀçÀü¼ÛÇÒ °æ¿ì µÑ ÀÌ»óÀÇ ¼¼¼Ç¿¡¼­ µ¿ÀÏÇÑ ¼¼¼Ç ۰¡ »ç¿ëµÇ¾î ½ºÇªÇÎ(spoofing) °ø°Ý¿¡ Ãë¾àÇÏ´Ù´Â ¾àÁ¡À» °¡Áö°í ÀÖ´Ù.
µû¶ó¼­, º» ±â¼úº¸°í¼­ÀÇ ÇÁ·ÎÅäÄÝÀº ű×ÀÇ ¿¬»ê ´É·ÂÀÌ ¹ÌÈíÇÏ¿© ¼¼¼Ç ½ÃÀÛ ½Ã ¹Ì¸® ¼¼¼Ç ۸¦ »ý¼ºÇØ¾ß ÇÏ´Â °æ¿ì¿¡ »ç¿ëµÉ ¼ö ÀÖ´Ù. ¸¸ÀÏ ½ºÇªÇÎ °ø°ÝÀ» ¹æ¾îÇϱâ À§Çؼ­´Â ÇÁ·ÎÅäÄÝ °úÁ¤¿¡ ¸®´õÀÇ ·£´ý³Ñ¹ö¸¦ ¼ö½ÅÇÏ¿© ű×ÀÇ ÀÀ´äÁ¦Çѽ𣠾ȿ¡ ¼¼¼Ç Ű »ý¼º°ú µ¥ÀÌÅÍ ¾Ïȣȭ¸¦ ¼öÇàÇÒ ¼ö ÀÖ´Â ¿¬»ê´É·ÂÀ» °¡Áø űװ¡ »ç¿ëµÇ¾î¾ß Çϸç, ±×¿¡ ¸Â´Â º°µµÀÇ ÇÁ·ÎÅäÄÝ·Î µ¿À۵Ǿî¾ß ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The contents are the security protocols for guaranteeing an authentication between the tag and a reader and data communication channel protection. This technical report defines the technology implementing the passive RFID security tag and the reader in which the security function is strengthened. And this technical report is compatible with the passive RFID tag of the ISO/IEC 18000-6 Type C standard.
The security protocols define the session key generation method which uses the only tag¡¯s random number. The tag can respond to the reader with encrypted data within the limited tag response time by using the security protocols of this technical report. However, the security protocols have a weak point of a spoofing attack because more than two sessions can generate the same session key.
Therefore, if users should be prevented from the spoofing attack, they should use the powerful tag which can generate the session key using the tag¡¯s random number and the reader¡¯s random number and encrypt the data with the generated session key within the limited tag response time. The tag conforming to this technical report can be used in the case that the tag has no abilities of the real-time session key generation and data encryption.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2021-10-22
ÆóÁö»çÀ¯ »ê¾÷ ÇöÀå¿¡¼­ Ȱ¿ëµÇÁö ¾ÊÀ¸¹Ç·Î ÆóÁö
°ü·ÃÆÄÀÏ  TTAR-12.0003.zip
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¼öµ¿Çü RFID º¸¾ÈÅÂ±×¿Í ¸®´õÀÇ ÀÎÁõ ¹× µ¥ÀÌÅÍ º¸È£ ÇÁ·ÎÅäÄÝ ºÐ¼®¼­ TTAR-12.0003 2009-11-24 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö
2018-05-31 °³Á¤ TTAK.KO-12.0091/R1 ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ º¸¾È¼º ºÐ¼® TR·Î½á, TTAK.KO-12.0091/R1 3¿¡ µû¶ó ÇÔ²² 3