The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which
may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that
the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather
than being fully standardised).
Clause 4 introduces the algorithms and describes the notation used in the subsequent sections.
Clause 5 defines the inputs and outputs to the algorithms and to the Keccak permutation used in the definition of the
Clause 6 defines the example algorithms.
Clause 7 explains various options and considerations for implementation of the algorithms, including some of the
Annex A contains diagrams illustrating the TUAK functions. A definition for the TUAK API is given in Annex B.
Annex C gives a specification of the Keccak permutation which is used within the example algorithms. Annexes D and
E contain source code in the ANSI C programming language: Annex D gives a complete and straightforward
implementation of the algorithm set, Annex E gives an implementation of the Keccak permutation.