tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TS 33.110 (SA3)
Key establishment between
a Universal Integrated Circuit Card (UICC)
and a terminal

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    28 p.
(P) V13.0.0    2016/01    29 p.
(P) V12.0.0    2014/10    29 p.
(P) V11.0.1    2012/10    29 p.
(P) V10.1.0    2011/06    30 p.
(P) V9.1.0    2011/06    30 p.
(P) V8.0.0    2008/12    30 p.
(P) V7.5.0    2008/03    30 p.


Rapporteur:  Mrs. Pauliac, Mireille
See also:  –


The smart card, tamper resistant device, has a primary role of storing credentials and performing sensitive cryptographic computations, it also provides portability of the user credentials. The smart card is rarely a stand-alone device; it usually interacts with a terminal. Sensitive applications are often split between a smart card and a terminal with sensitive data exchanged between the two. Therefore, the need to establish a secure channel between a UICC and a terminal that may host the UICC or be connected to the device hosting the UICC via a local interface has been identified by different standardization groups in order to protect the communication between the UICC and the terminal.

ThiS TS describes the security features and mechanisms to provision a shared key between a UICC and a terminal that may host the UICC or be connected to the device hosting the UICC via a local interface. Candidate applications to use this key establishment mechanism include but are not restricted to secure channel between a UICC and a terminal ETSI TS 102 484.

The scope of this specification includes an architecture overview and the detailed procedure how to establish the shared key between the UICC and the terminal.


 

Here        Top

 

 

1   Scope   PDF-p. 6
2   References
3   Definitions, symbols and abbreviations   PDF-p. 7
4   Key Establishment between a UICC and a terminal
A  (Normative)   Key Derivation Function definition   PDF-p. 15
B  (Normative)   Key establishment UICC-Terminal interface   PDF-p. 16
C  (Normative)   HTTP based key request procedure   PDF-p. 18      Up
D   Signalling flows for key request procedure   PDF-p. 20
E  (Normative)   XML schema for Key Request and Key Response   PDF-p. 23
F  (Normative)   TLS profiles   PDF-p. 25
G   Change history   PDF-p. 26

Up        Top