tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 35.231 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 1: Algorithm specification

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    29 p.
(P) V13.0.0    2016/01    29 p.
(P) V12.1.0    2014/06    29 p.

Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR    

The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather than being fully standardised).

Clause 4 introduces the algorithms and describes the notation used in the subsequent sections.

Clause 5 defines the inputs and outputs to the algorithms and to the Keccak permutation used in the definition of the algorithms.

Clause 6 defines the example algorithms.

Clause 7 explains various options and considerations for implementation of the algorithms, including some of the customization options.

Annex A contains diagrams illustrating the TUAK functions. A definition for the TUAK API is given in Annex B. Annex C gives a specification of the Keccak permutation which is used within the example algorithms. Annexes D and E contain source code in the ANSI C programming language: Annex D gives a complete and straightforward implementation of the algorithm set, Annex E gives an implementation of the Keccak permutation.


Here          Top