Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   None   Next

TS 33.102
3G Security – Architecture

V19.1.0 (Wzip)2025/06  78 p.
V18.0.0 (PDF)  2024/03  81 p.
V17.0.0  2022/03  81 p.
V16.0.0  2020/06  80 p.
V15.1.0  2018/12  79 p.
V14.1.0  2017/03  80 p.
V13.0.0  2016/01  79 p.
V12.2.0  2014/12  79 p.
V11.7.0  2014/12  79 p.
V10.2.0  2014/12  73 p.
V9.6.0  2014/12  73 p.
V8.7.0  2014/12  70 p.
V7.1.0  2006/12  66 p.
V6.5.0  2005/12  65 p.
V5.7.0  2005/12  63 p.
V4.5.0  2002/12  63 p.
V3.13.0  2002/12  65 p.
Rapporteur:
Miss Jerichow, Anja
Nokia Germany

essential Table of Contents for  TS 33.102  Word version:  19.1.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 1Overview of the security architecture
Figure 2Overview of the ME registration and connection principles within UMTS for the separate CN architecture case when the CN consists of both a CS service domain with evolved MSC/VLR, 3G_MSC/VLR, as the main serving node and an PS service domain with evolved SGSN/GGSN, 3G_SGSN and 3G GGSN, as the main serving nodes (Extract from TS 23.121 - Figure 4-8)
Figure 3TMSI allocation
Figure 4Identification by the permanent identity
Figure 5Authentication and key agreement
Figure 6Distribution of authentication data from HE to VLR/SGSN
Figure 7Generation of authentication vectors
Figure 8Successful UMTS Authentication and Key Agreement
Figure 9User authentication function in the USIM
Figure 10Construction of the parameter AUTS
Figure 11Distribution of IMSI and temporary authentication data within one serving network domain
Figure 12Resynchronisation mechanism
Figure 13Reporting authentication failure from VLR/SGSN to HLR
Figure 14Local authentication and connection set-up
Figure 15aRNC periodic local authentication procedure
Figure 16Derivation of MAC-I (or XMAC-I) on a signalling message
Figure 16aThe structure of COUNT-I
Figure 16bCiphering of user and signalling data transmitted over the radio access link
Figure 16cThe structure of COUNT-C for all transmission modes
Figure 18Authentication and key agreement of UMTS subscribers
Figure 19Authentication and key agreement for GSM subscribers
Figure 20SRVCC handover from GERAN to HSPA
Figure J.1-1Construction of the parameter AUTS with a f5** function

Top