Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.259
Key establishment
between a UICC Hosting Device
and a Remote Device

V19.0.0 (PDF)  2025/09  30 p.
V18.0.0  2024/03  30 p.
V17.0.0  2022/03  30 p.
V16.0.0  2020/06  30 p.
V15.0.0  2018/06  30 p.
V14.0.0  2017/03  30 p.
V13.0.0  2016/01  30 p.
V12.0.0  2014/09  29 p.
V11.0.0  2012/09  30 p.
V10.0.0  2011/04  30 p.
V9.0.0  2009/12  29 p.
V8.2.0  2008/12  29 p.
V7.2.0  2007/12  30 p.
Rapporteur:
Mr. Lehtovirta, Vesa
Ericsson LM

full Table of Contents for  TS 33.259  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 5
1Scope  p. 6
2References  p. 6
3Definitions and abbreviations  p. 7
3.1Definitions  p. 7
3.2Abbreviations  p. 8
4Key Establishment between a UICC Hosting Device and a Remote Device  p. 8
4.1Reference model  p. 8
4.2Network elements  p. 9
4.2.1General  p. 9
4.2.2NAF Key Centre  p. 9
4.3Key establishment architecture and reference points  p. 9
4.3.1General  p. 9
4.3.2Reference point Ub  p. 9
4.3.3Reference point Ua  p. 9
4.3.4Reference point Local interface  p. 10
4.4Requirements and principles for key establishment between a UICC Hosting Device and a Remote Device  p. 10
4.4.1General requirements  p. 10
4.4.2Requirements on the Remote Device  p. 10
4.4.3Requirements on the UICC Hosting Device  p. 10
4.4.4Requirements on the UICC  p. 11
4.4.5Requirements on the NAF Key Centre  p. 11
4.4.6Requirements on Ks_local_device key and associated parameters handling in Remote Device  p. 11
4.4.7Requirements on Ks_local_device key and associated parameters handling in UICC Hosting Device  p. 12
4.5Procedures  p. 12
4.5.1Initiation of key establishment between a UICC Hosting Device and a Remote Device  p. 12
4.5.2Key establishment procedure  p. 13
A(Normative)  Key Derivation Function definition  p. 17
A.1Platform specific key (Ks_local_device): Ks_local_device key derivation in key establishment  p. 17
A.2 Input parameters for Ks_local_device key derivation  p. 17
B(Normative)  HTTP based key request procedure  p. 18
B.1Introduction  p. 18
B.2Key request procedure  p. 18
B.2.1Key request  p. 18
B.2.2Error situations  p. 19
CSignalling flows for key request procedure  p. 20
C.1Introduction  p. 20
C.2Signalling flow demonstrating a successful key request procedure  p. 20
D(Normative)  XML schema for Key Request and Key Response  p. 23
D.1Introduction  p. 23
D.2Key Request Format  p. 23
D.2.1Data Format  p. 23
D.2.2Example  p. 23
D.3Key Response Format  p. 24
D.3.1Data Format  p. 24
D.3.2Example  p. 24
E(Normative)  TLS profiles  p. 25
FApplication specific key (Ks_local_device_appl)  p. 26
F.1Example of Ks_local_device_appl key derivation in key establishment  p. 26
GApplication specific key (Ks_local_device_appl): Key Derivation Function definition  p. 27
G.1Ks_local_device_appl key derivation in key establishment  p. 27
G.2 Input parameters for Ks_local_device_appl key derivation  p. 27
$Change history  p. 28

Up   Top