Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.105
3G Security –
Cryptographic Algorithm Requirements

V19.0.0 (PDF)  2025/09  26 p.
V18.0.0  2024/03  26 p.
V17.0.0  2022/03  26 p.
V16.0.0  2020/06  26 p.
V15.0.0  2018/06  25 p.
V14.0.0  2017/03  26 p.
V13.0.0  2016/01  26 p.
V12.0.0  2014/09  26 p.
V11.0.0  2012/09  26 p.
V10.0.0  2011/04  26 p.
V9.0.0  2009/12  26 p.
V8.0.0  2008/12  26 p.
V7.0.0  2007/06  26 p.
V6.0.0  2004/06  26 p.
V5.0.0  2004/06  26 p.
V4.2.0  2004/06  26 p.
V3.8.0  2001/07  26 p.
Rapporteur:
Mr. Chikazawa, Takeshi
Mitsubishi Electric Corp

essential Table of Contents for  TS 33.105  Word version:  19.0.0

each title links to the equivalent title in the CONTENT
Here   Top

List of Figures and Tables

Figure 1Generation of quintets in the AuC
Figure 2Authentication and key derivation in the USIM
Figure 3Generation of re-synchronisation token in the USIM
Figure 4Re-synchronisation in the HLR/AuC
Figure 5Ciphering user and signalling data transmitted over the radio access link
Figure 6Derivation of MAC-I (or XMAC-I) on a signalling message

Top