Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0356 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 38
ÇѱÛÇ¥ÁØ¸í ¾çÀÚÅ°ºÐ¹è º¸¾È ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security requirements for quantum key distribution(QKD)
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¸ç ´Ü¹æÇâ ±â¹ýÀ¸·Î ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£°æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼­ºñ½º¸¦ Á¦°øÇÏ´Â °æ¿ì QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard specifies security requirements for QKD mechanism using BB84 protocol, decoy method, and one-way realization method. Define security requirements within QKD boundary if QKD boundary is contained within the cryptographic boundary to provide secret key generation and sharing services.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0356.pdf TTAK.KO-12.0356.pdf            

ÀÌÀü
´ÙÁ߸Åü ¹× ´ÙÁߴ뿪 ±â¹Ý ¼öÁßÅë½ÅÀ» À§ÇÑ ¿ä±¸ »çÇ×
´ÙÀ½
ÀÚÀ²Çù·ÂÁÖÇàÀ» À§ÇÑ Åë½Å½Ã½ºÅÛ Stage 1: ¿ä±¸»çÇ×