{"id":1093,"date":"2022-03-25T17:48:47","date_gmt":"2022-03-25T08:48:47","guid":{"rendered":"https:\/\/cybersecurity-jp.com\/zero-trust\/?p=255"},"modified":"2022-03-25T17:48:47","modified_gmt":"2022-03-25T08:48:47","slug":"%e5%af%be%e7%a7%b0%e9%8d%b5%e6%9a%97%e5%8f%b7%e6%96%b9%e5%bc%8f","status":"publish","type":"post","link":"https:\/\/securityagent.jp\/cont\/cat-security-glossary\/1093\/","title":{"rendered":"\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f"},"content":{"rendered":"<h3>\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u3068\u306f<\/h3>\n<p>\u6697\u53f7\u5316\u3068\u5fa9\u53f7\u5316\u306b<strong>\u540c\u3058\u9375<\/strong>\u3092\u4f7f\u7528\u3059\u308b\u6697\u53f7\u5316\u65b9\u5f0f\u306e\u3053\u3068\u3002<br \/>\n\u6697\u53f7\u5316\u306b\u4f7f\u7528\u3055\u308c\u308b\u9375\u3068\u3001\u5fa9\u53f7\u5316\u306b\u4f7f\u7528\u3055\u308c\u308b\u9375\u306f\u540c\u3058\u3067\u3042\u308b\u305f\u3081\u3001\u9375\u3092\u4fdd\u6301\u3059\u308b\u5074\u3068\u9375\u3092\u4f7f\u7528\u3059\u308b\u5074\u304c\u540c\u3058\u9375\u3092\u5171\u6709\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3002\u3053\u306e\u65b9\u5f0f\u306f\u5171\u6709\u9375\u6697\u53f7\u65b9\u5f0f\u3068\u3082\u547c\u3070\u308c\u308b\u3002<\/p>\n<p>\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u306f\u3001\u6697\u53f7\u5316\u30fb\u5fa9\u53f7\u5316\u306e\u901f\u5ea6\u304c\u901f\u304f\u3001\u5927\u91cf\u306e\u30c7\u30fc\u30bf\u3092\u9ad8\u901f\u306b\u6697\u53f7\u5316\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u4e00\u65b9\u3067\u3001\u6697\u53f7\u5316\u306b\u4f7f\u7528\u3059\u308b\u9375\u304c\u5916\u90e8\u306b\u6f0f\u6d29\u3059\u308b\u3068\u3001\u9375\u3092\u77e5\u3063\u3066\u3044\u308b\u4eba\u306a\u3089\u3070\u7c21\u5358\u306b\u5fa9\u53f7\u5316\u3067\u304d\u308b\u3068\u3044\u3046\u6b20\u70b9\u304c\u3042\u308b\u3002\u9375\u3092\u5171\u6709\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u305f\u3081\u3001\u9375\u914d\u9001\u65b9\u6cd5\u3084\u9375\u7ba1\u7406\u304c\u91cd\u8981\u306b\u306a\u308b\u3002<\/p>\n<p>\u4ee3\u8868\u7684\u306a\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u306b\u306f\u3001DES\uff08Data Encryption Standard\uff09\u30013DES\u3001AES\uff08Advanced Encryption Standard\uff09\u306a\u3069\u304c\u3042\u308b\u3002\u3053\u308c\u3089\u306e\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306f\u3001\u9375\u306e\u9577\u3055\u3092\u5909\u3048\u305f\u308a\u3001\u540c\u3058\u9375\u3092\u8907\u6570\u56de\u4f7f\u7528\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u306a\u3069\u306e\u5de5\u592b\u304c\u3055\u308c\u3066\u3044\u308b\u3002<\/p>\n<p>\uff08\u53c2\u8003\uff1a<a href=\"https:\/\/cybersecurity-jp.com\/zero-trust\/word\/263\/\">DES\/\u7528\u8a9e\u96c6<\/a>\uff09<br \/>\n\uff08\u53c2\u8003\uff1a<a href=\"https:\/\/cybersecurity-jp.com\/zero-trust\/word\/267\/\">AES\/\u7528\u8a9e\u96c6<\/a>\uff09<\/p>\n<p>\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u306f\u3001\u4e3b\u306b\u30c7\u30fc\u30bf\u901a\u4fe1\u3084\u30b9\u30c8\u30ec\u30fc\u30b8\u6697\u53f7\u5316\u306a\u3069\u3067\u5229\u7528\u3055\u308c\u308b\u304c\u3001\u9375\u306e\u5171\u6709\u65b9\u6cd5\u306a\u3069\u306e\u554f\u984c\u304b\u3089\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u4e0a\u306e\u60c5\u5831\u306e\u3084\u308a\u53d6\u308a\u306a\u3069\u3001\u4e0d\u7279\u5b9a\u591a\u6570\u306e\u4eba\u304c\u53c2\u52a0\u3059\u308b\u5834\u9762\u3067\u306f\u3001\u516c\u958b\u9375\u6697\u53f7\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u304c\u5229\u7528\u3055\u308c\u308b\u3002<\/p>\n<h3>\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u306e\u30dd\u30a4\u30f3\u30c8\u307e\u3068\u3081<\/h3>\n<ul>\n<li>\u6697\u53f7\u5316\u3068\u5fa9\u53f7\u5316\u306b\u540c\u3058\u9375\u3092\u4f7f\u7528\u3059\u308b\u65b9\u5f0f\u3067\u3042\u308b\u3002<\/li>\n<li>\u9375\u306e\u9577\u3055\u306b\u3088\u3063\u3066\u6697\u53f7\u5316\u306e\u5f37\u5ea6\u304c\u5909\u308f\u308a\u3001\u9577\u3044\u9375\u307b\u3069\u5f37\u5ea6\u304c\u9ad8\u3044\u304c\u3001\u51e6\u7406\u901f\u5ea6\u304c\u4f4e\u4e0b\u3059\u308b\u3002<\/li>\n<li>\u9375\u3092\u5171\u6709\u3059\u308b\u5074\u3068\u9375\u3092\u4fdd\u6301\u3059\u308b\u5074\u304c\u540c\u3058\u9375\u3092\u5171\u6709\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u305f\u3081\u3001\u9375\u306e\u914d\u9001\u65b9\u6cd5\u3084\u9375\u7ba1\u7406\u304c\u5fc5\u8981\u306b\u306a\u308b\u3002<\/li>\n<li>\u51e6\u7406\u901f\u5ea6\u304c\u901f\u3044\u305f\u3081\u3001\u5927\u91cf\u306e\u30c7\u30fc\u30bf\u3092\u9ad8\u901f\u306b\u6697\u53f7\u5316\u3067\u304d\u308b\u3002<\/li>\n<li>\u4ee3\u8868\u7684\u306a\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3068\u3057\u3066\u306f\u3001DES\u30013DES\u3001AES\u306a\u3069\u304c\u3042\u308b\u3002<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\u3068\u306f \u6697\u53f7\u5316\u3068\u5fa9\u53f7\u5316\u306b\u540c\u3058\u9375\u3092\u4f7f\u7528\u3059\u308b\u6697\u53f7\u5316\u65b9\u5f0f\u306e\u3053\u3068\u3002 \u6697\u53f7\u5316\u306b\u4f7f\u7528\u3055\u308c\u308b\u9375\u3068\u3001\u5fa9\u53f7\u5316\u306b\u4f7f\u7528\u3055\u308c\u308b\u9375\u306f\u540c\u3058\u3067\u3042\u308b\u305f\u3081\u3001\u9375\u3092\u4fdd\u6301\u3059\u308b\u5074\u3068\u9375\u3092\u4f7f\u7528\u3059\u308b\u5074\u304c\u540c\u3058\u9375\u3092\u5171\u6709\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3002\u3053\u306e\u65b9\u5f0f\u306f\u5171\u6709\u9375\u6697\u53f7\u65b9\u5f0f\u3068 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1093","post","type-post","status-publish","format-standard","hentry","category-cat-security-glossary"],"acf":[],"_links":{"self":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts\/1093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":0,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/tags?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}