Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TS 33.110 (SA3)
Key establishment between
a Universal Integrated Circuit Card (UICC)
and a terminal

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  28 p.
V13.0.0  2016/01  29 p.
V12.0.0  2014/10  29 p.
V11.0.1  2012/10  29 p.
V10.1.0  2011/06  30 p.
V9.1.0  2011/06  30 p.
V8.0.0  2008/12  30 p.
V7.5.0  2008/03  30 p.


Rapporteur:  Mrs. Pauliac, Mireille
See also:  –

The smart card, tamper resistant device, has a primary role of storing credentials and performing sensitive cryptographic computations, it also provides portability of the user credentials. The smart card is rarely a stand-alone device; it usually interacts with a terminal. Sensitive applications are often split between a smart card and a terminal with sensitive data exchanged between the two. Therefore, the need to establish a secure channel between a UICC and a terminal that may host the UICC or be connected to the device hosting the UICC via a local interface has been identified by different standardization groups in order to protect the communication between the UICC and the terminal.

ThiS TS describes the security features and mechanisms to provision a shared key between a UICC and a terminal that may host the UICC or be connected to the device hosting the UICC via a local interface.


 

Here   Top

 

 

1  ScopePDF-p. 6
2  References
3  Definitions, symbols and abbreviationsPDF-p. 7
4  Key Establishment between a UICC and a terminal
A (Normative)  Key Derivation Function definitionPDF-p. 15
B (Normative)  Key establishment UICC-Terminal interfacePDF-p. 16
C (Normative)  HTTP based key request procedurePDF-p. 18Up
D  Signalling flows for key request procedurePDF-p. 20
E (Normative)  XML schema for Key Request and Key ResponsePDF-p. 23
F (Normative)  TLS profilesPDF-p. 25
G  Change historyPDF-p. 26

Up   Top