Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0246 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2014-12-17 | ÃÑÆäÀÌÁö | 207 |
ÇѱÛÇ¥Áظí | 128 ºñÆ® ºí·Ï ¾ÏÈ£ LEA ¿î¿µ ¸ðµå | ||
¿µ¹®Ç¥Áظí | Modes of Operation for the 128-Bit Block Cipher LEA | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ºí·Ï ¾ÏÈ£ LEA(Lightweight Encryption Algorithm)ÀÇ ±â¹Ð¼º ¿î¿µ ¸ðµåÀÎ ECB(Electronic Code Book), CBC(Cipher Block Chaining), CFB(Cipher FeedBack), OFB(Output FeedBack), CTR(CounTeR)°ú ÀÎÁõ ¾ÏÈ£È ¿î¿µ ¸ðµåÀÎ CCM, GCMÀÇ ¾Ï・º¹È£È °úÁ¤, ±×¸®°í ÀÎÁõ ¿î¿µ ¸ðµåÀÎ CMACÀÇ ÀÎÁõ°ª »ý¼º・°ËÁõ °úÁ¤À» Á¤ÀÇÇÏ°í ÀÖ´Ù. ¶ÇÇÑ ±¸Çö ÀûÇÕ¼ºÀ» È®ÀÎÇϱâ À§ÇÑ ÂüÁ¶ ±¸Çö°ªÀ» ºÎ·Ï¿¡ ¸í½ÃÇÏ°í ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard defines the overall structure of confidential modes of operation ECB(Electronic Code Book), CBC(Cipher Block Chaining), CFB(Ciphertext FeedBack), OFB(Output FeedBack), CTR(CounTeR), authenticated encryption modes of operation CCM, GCM, and message authentication mode of operation CMAC. And test vectors for implementation conformance checks are provided in appendix. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0246.pdf |
- ÀÌÀü
- È£½ºÆ® ½Äº° ÇÁ·ÎÅäÄÝ DNS È®Àå
- ´ÙÀ½
- ±âº» IPTV ´Ü¸»