ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0115/R2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 20
ÇÑ±Û Ç¥Áظí SRTP¿¡¼­ÀÇ ARIA ¾Ë°í¸®Áò ¿î¿µ ¹æ¹ý
¿µ¹® Ç¥Áظí The Use of ARIA Algorithm in SRTP
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ARIA¸¦ CTR(Counter) ¸ðµå¿Í GCM(Galois/Counter Mode)ÀÇ ±â¹Ý ºí·Ï ¾ÏÈ£·Î »ç¿ëÇÏ¿© ½Ç½Ã°£ Àü¼Û ÇÁ·ÎÅäÄÝ¿¡¼­ Á¤ÀÇÇÏ´Â RTP¿Í RTCP ÆÐŶÀÇ ¾Ïȣȭ¿Í ÀÎÁõ ÅÂ±× °è»ê, ±×¸®°í ¼¼¼ÇÅ° À¯µµ¿¡ Àû¿ëÇÏ´Â ¹æ¹ýÀ» Á¤ÀÇÇÑ´Ù. ±¸Ã¼ÀûÀ¸·Î´Â ¹Ì±¹ ¿¬¹æÁ¤ºÎ Ç¥ÁØ ºí·Ï ¾ÏÈ£ AESÀÇ SRTP Àû¿ë ¹æ¹ýÀ» ÁØ¿ëÇÑ´Ù. ±×¸®°í SRTPÀÇ ±âº» Å° °ü¸® ¹æ½ÄÀÎ SDES(Session Description Protocol Security Descriptions)¸¦ ÅëÇØ ¼¼¼Ç Âü¿©ÀÚµéÀÌ ARIA Àû¿ëÀ» À§ÇÑ ÁÖ¿ä ÆĶó¹ÌÅ͸¦ Çù»óÇÏ´Â °úÁ¤¿¡¼­ ÇÊ¿äÇÑ crypto suite¸¦ Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard describes how ARIA can be used to provide confidentiality and/or integrity to RTP/RTCP packets, and to provide session keys for the respective security primitives. Specifically, detailed descriptions of the use of ARIA for the encryption transform and the key derivation function are defined as the same with the cases of AES. Furthermore, it defines new SRTP crypto suites of ARIA to be used to signal and negotiate them via SDES(Session Description Protocol Security Descriptions).
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0115R2.pdf TTAK.KO-12.0115R2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
SRTP¿¡¼­ÀÇ ARIA ¾Ë°í¸®Áò ¿î¿µ ¹æ¹ý TTAK.KO-12.0115/R2 2018-12-19 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0115R2.pdf
SRTP¿¡¼­ÀÇ ARIA ¾ÏÈ£ ¾Ë°í¸®Áò ¿î¿µ ¹æ¹ý TTAK.KO-12.0115/R1 2011-12-21 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0115_R1.pdf
SRTP¿¡¼­ÀÇ ARIA ¾ÏÈ£¾Ë°í¸®Áò ¿î¿µ ¹æ¹ý TTAK.KO-12.0115 2009-12-22 Á¦Á¤ ÆóÁö ¾øÀ½