Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.901
Criteria for cryptographic Algorithm design process

V4.0.0 (Wzip)  2001/10  18 p.
V3.0.0  1999/06  15 p.
Rapporteur:
Dr. Blom, Rolf

full Table of Contents for  TR 33.901  Word version:  4.0.0

1Scope  p. 5
2References  p. 5
3Introduction  p. 5
3.1Algorithms, export control and flexibility  p. 5
3.2Design and evaluation methods  p. 6
3.3Responsibility for algorithms.  p. 6
3.4ETSI algorithms and procedures  p. 6
4Requirements, constraints, options and consequences  p. 7
4.1Security architecture and mechanisms  p. 7
4.2Suitable / Tailored for use algorithms  p. 7
4.3Open and secret algorithms  p. 7
4.4Design Strategy  p. 8
4.4.1Select an off the shelf algorithm  p. 8
4.4.2Invite submissions  p. 8
4.4.3Commission a special group to design an algorithm  p. 9
4.5Evaluation Strategy  p. 9
4.6Evaluation Strategy  p. 10
5Possible algorithm design process scenarios  p. 10
5.1Use of a public off the shelf algorithm  p. 10
5.2Select a confidential off the shelf algorithm  p. 10
5.3Invite submissions for algorithms  p. 11
5.4Commission a special group to design an algorithm  p. 11
6Relevant aspects in an algorithm acquisition process  p. 12
6.1Design methodology  p. 12
6.2Evaluation methodology  p. 12
7Conclusions and recommendation  p. 13
A1Overview of ETSI Standard Algorithms  p. 14
$Change history  p. 16

Top