¸¶ÀÌÅ©·ÎĨÅ×Å©³î·ÎÁö(¾Æ½Ã¾Æ ÃÑ°ý ¹× Çѱ¹´ëÇ¥: ÇѺ´µ·)´Â º¸¾È Å° ÇÁ·ÎºñÀú´× ÀýÂ÷¸¦ °£¼ÒÈÇÏ¿© ÁøÀÔ À庮À» ³·Ãß°í, º¸´Ù ½Å¼ÓÇÑ ÇÁ·ÎÅäŸÀÌÇÎÀ» ±¸ÇöÇÒ ¼ö ÀÖµµ·Ï TrustFLEX Æ÷Æ®Æú¸®¿ÀÀÇ µð¹ÙÀ̽º, ¼ºñ½º ¹× µµ±¸¿¡ ECC204, SHA104 ¹× SHA105 CryptoAuthentication™ IC¸¦ Ãß°¡Çß´Ù.
ECC20x ¹× SHA10x IC´Â Çϵå¿þ¾î ±â¹ÝÀÇ º¸¾È ÀúÀå ÀåÄ¡·Î, Çã°¡ ¹ÞÁö ¾ÊÀº Á¢¼Ó µîÀÇ ¹«´Ü °ø°ÝÀÌ ÀÖÀ» °æ¿ì ºñ¹Ð Å°¸¦ ¼û±âµµ·Ï ¼³°èµÇ¾ú´Ù. ECC204, SHA104 ¹× SHA105 IC´Â TrustFLEX Ç÷§ÆûÀÇ ÀϺημ ÀÎÁõµÈ »ç¿ë »ç·Ê, Ä¿½ºÅ͸¶ÀÌ¡ÀÌ °¡´ÉÇÑ ±¸¼º ¿ä¼Ò ¹× ÄÚµå ¿¹Á¦°¡ »çÀü¿¡ ¼³Á¤µÈ »óÅ·ΠÁ¦°øµÅ °³¹ß °úÁ¤À» °£¼ÒÈÇÑ´Ù.
ECC20x ¹× SHA10x µð¹ÙÀ̽º´Â °øÅëÆò°¡±âÁØ ÀÎÁõ JIL(Joint Interpretation Library) High µî±ÞÀÇ º¸¾È Å° ½ºÅ丮ÁöÀÇ ¿ä±¸ »çÇ×À» ÃæÁ·Çϸç, ¹Ì±¹ÀÇ ¿¬¹æ Á¤º¸Ã³¸® Ç¥ÁØ(FIPS, Federal Information Processing Standard)¿¡ µû¶ó NIST ¿£Æ®·ÎÇÇ ¼Ò½º °ËÁõ(ESV, Entropy Source Validation) ¹× ¾ÏÈ£È ¾Ë°í¸®Áò °ËÁõ ÇÁ·Î±×·¥(CAVP, Cryptographic Algorithm Validation Program)ÀÇ ÀÎÁõÀ» ¹Þ¾Ò´Ù. ÀÌ º¸¾È IC Á¦Ç°±ºÀº ´Ù¾çÇÑ ½Ã½ºÅÛ°ú ¾ÖÇø®ÄÉÀ̼ǿ¡¼ µ¥ÀÌÅÍ¿Í Åë½ÅÀÇ ±â¹Ð¼º, ¹«°á¼º ¹× ½Å·Ú¼ºÀ» À¯ÁöÇϱâ À§ÇØ ½Å·ÚÇÒ ¼ö ÀÖ´Â ÀÎÁõÀ» ±¸ÇöÇϵµ·Ï ¼³°èµÇ¾ú´Ù.
|