Tech-invite3GPPspaceIETF RFCsSIP
Top   in Index   Prev   Next

TR 33.901
Criteria for cryptographic Algorithm design process

3GPP‑Page   ETSI‑search   ToC  
V4.0.0 (Wzip)  2001/10  18 p.
V3.0.0  1999/06  15 p.
Dr. Blom, Rolf

full Table of Contents for  TR 33.901  Word version:  4.0.0

Here   Top

1  ScopeWord‑p. 5

This report discusses the possibilities for acquisition of the cryptographic algorithms that has to be standardised in UMTS. The focus is on the encryption function used in the data confidentiality mechanism and the message authentication function used in the signalling data integrity mechanism.
First certain aspects of the process and desired results for an algorithm specification and their pro's and cons will be given. These aspects will include the possible design strategies, the evaluation strategies, the possibilities for distribution of the algorithms and the options for the liability and responsibility for the algorithm.
Then a number of the most realistic scenarios for the algorithm specification will be presented. These scenarios will be used as a basis to make a final choice for the specification process for cryptographic algorithms in third generation mobile systems. Finally, a preferred procedure will be described.

2  ReferencesWord‑p. 5

3  IntroductionWord‑p. 5

4  Requirements, constraints, options and consequencesWord‑p. 7

5  Possible algorithm design process scenariosWord‑p. 10

6  Relevant aspects in an algorithm acquisition processWord‑p. 12

6.1  Design methodologyWord‑p. 12

6.2  Evaluation methodologyWord‑p. 12

7  Conclusions and recommendationWord‑p. 13

A1  Overview of ETSI Standard AlgorithmsWord‑p. 14

$  Change historyWord‑p. 16

Up   Top