The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which
may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that
the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather
than being fully standardised).
Clause 3 introduces the algorithms and describes the notation used in the subsequent sections.
Clause 4 provides test data for the Keccak permutation used within TUAK.
Clause 5 provides test data for the authentication algorithms f1 and f1*.
Clause 6 provides test data for the algorithms f2, f3, f4, f5 and f5*.