tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 35.232 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 2: Implementers' test data

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    33 p.
(P) V13.0.0    2016/01    34 p.
(P) V12.1.0    2014/06    34 p.


Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR    


The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather than being fully standardised).

Clause 3 introduces the algorithms and describes the notation used in the subsequent sections.

Clause 4 provides test data for the Keccak permutation used within TUAK.

Clause 5 provides test data for the authentication algorithms f1 and f1*.

Clause 6 provides test data for the algorithms f2, f3, f4, f5 and f5*.


 

Here          Top