Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0356 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑ ÆäÀÌÁö | 38 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¾çÀÚÅ°ºÐ¹è º¸¾È ¿ä±¸»çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security requirements for quantum key distribution(QKD) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¸ç ´Ü¹æÇâ ±â¹ýÀ¸·Î ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£°æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼ºñ½º¸¦ Á¦°øÇÏ´Â °æ¿ì QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard specifies security requirements for QKD mechanism using BB84 protocol, decoy method, and one-way realization method. Define security requirements within QKD boundary if QKD boundary is contained within the cryptographic boundary to provide secret key generation and sharing services. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0356.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|