Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0195 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Cryptographic Algorithms for VoIP Secure Communication in Private Sector
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ÀÎÅͳÝÀüÈ­ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ­ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× ÅëÈ­³»¿ë ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ À־ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼ­µµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼­ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼­ ½ÇÁ¦ ¾Ïȣȭ¿¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0195_ed15.pdf TTAK.KO-12.0195_ed15.pdf            

ÀÌÀü
ÅëÇÕ ÀÎÁõ ±â¹Ý ºÎÀÎ ¹æÁö ¼­ºñ½º ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
¸ð¹ÙÀÏ È¯°æÀÇ »ç¿ëÀÚ Á᫐ °³ÀÎÈ­ ¼­ºñ½º¸¦ À§ÇÑ »ç¿ëÀÚ µ¥ÀÌÅÍ Ã³¸® ±¸Á¶