Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.110
Key Establishment between
a Universal Integrated Circuit Card (UICC)
and a Terminal

V19.0.0 (PDF)  2025/09  29 p.
V18.0.0  2024/03  28 p.
V17.0.0  2022/03  28 p.
V16.0.0  2020/06  28 p.
V15.0.0  2018/06  28 p.
V14.0.0  2017/03  28 p.
V13.0.0  2016/01  29 p.
V12.0.0  2014/10  29 p.
V11.0.1  2012/10  29 p.
V10.1.0  2011/06  30 p.
V9.1.0  2011/06  30 p.
V8.0.0  2008/12  30 p.
V7.5.0  2008/03  30 p.
Rapporteur:
Mrs. Pauliac, Mireille
Gemalto N.V.

full Table of Contents for  TS 33.110  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 5
1Scope  p. 6
2References  p. 6
3Definitions, symbols and abbreviations  p. 7
3.1Definitions  p. 7
3.2Symbols  p. 7
3.3Abbreviations  p. 8
4Key Establishment between a UICC and a terminal  p. 8
4.1Reference model  p. 8
4.2Network elements  p. 9
4.2.1NAF Key Center  p. 9
4.3Key establishment architecture and reference points  p. 9
4.3.1Reference points  p. 9
4.3.2Reference point Ub  p. 9
4.3.3Reference point Ua  p. 9
4.4General requirements and principles for key establishment between a UICC and a Terminal  p. 10
4.4.1General requirements  p. 10
4.4.2Requirements on the terminal  p. 10
4.4.3Requirements on the UICC hosting device  p. 10
4.4.4Requirements on the UICC  p. 10
4.4.5Requirements on the NAF Key Center  p. 11
4.4.6Requirements on Ks_local key and associated parameters handling  p. 11
4.5Procedures  p. 11
4.5.1Initiation of key establishment between a UICC and a Terminal  p. 11
4.5.2Key establishment procedure  p. 12
A(Normative)  Key Derivation Function definition  p. 16
A.1Ks_local key derivation in key establishment  p. 16
A.2Input parameters for Ks_local key derivation  p. 16
B(Normative)  Key establishment UICC-Terminal interface  p. 17
B.1Local Key Establishment: Key Derivation procedure  p. 17
B.2Local Key Establishment: Key Availability Check procedure  p. 18
C(Normative)  HTTP based key request procedure  p. 19
C.1Introduction  p. 19
C.2Key request procedure  p. 19
C.2.1Key request  p. 19
C.2.2Error situations  p. 20
DSignalling flows for key request procedure  p. 21
D.1Introduction  p. 21
D.2Signalling flow demonstrating a successful key request procedure  p. 21
E(Normative)  XML schema for Key Request and Key Response  p. 24
E.1Introduction  p. 24
E.2Key Request Format  p. 24
E.2.1Data Format  p. 24
E.2.2Example  p. 24
E.3Key Response Format  p. 25
E.3.1Data Format  p. 25
E.3.2Example  p. 25
F(Normative)  TLS profiles  p. 26
F.1TLS profile for certificate based mutual authentication between Terminal and NAF Key Center  p. 26
F.1.1Introduction  p. 26
F.1.2Protection mechanisms  p. 26
F.2TLS profile for Shared key-based mutual authentication between Terminal and NAF Key Center  p. 26
F.2.1Introduction  p. 26
F.2.2Protection mechanisms  p. 26
$Change history  p. 28

Up   Top