| Protocol/Function | Protocol Profile, Clauses | Cryptographic Algorithm(s) | Feature(s), Usage Type |
|---|---|---|---|
| COSE (RFC 8152) | clause P.3.3 of TS 33.220 | HMAC-based KDF with SHA-256 [31] | Session Key Derivation / Hash Function |
| AES-CCM-16-64-128 | Confidentiality and Integrity Protection | ||
| DTLS 1.2 (RFC 6347) | Clause 6.2.1 of TS 33.210 | See TLS 1.2 in this Table | Confidentiality and Integrity Protection |
| DTLS 1.3 (RFC 9147) | Clause 6.2.1 of TS 33.210 | See TLS 1.3 in this Table | Confidentiality and Integrity Protection |
| EAP-TLS (RFC 9190, RFC 5216) | Clause B.2.1 of TS 33.501 | AEAD_AES_128_GCM | Confidentiality and Integrity Protection |
| HKDF (RFC 5869) | Session Key Derivation | ||
| EAP TTLS (RFC 5281) | TS 33.501, Annex U Clause 6.2 of TS 33.210 for TLS | See TLS in this Table | Confidentiality and Integrity Protection |
| Session Key Derivation | |||
| ECIES ([7], [8]) | Clause C.3 of TS 33.501 | SHA-256,
HMAC-SHA-256 | Session Key Derivation |
| HMAC-SHA-256 | Integrity Protection | ||
| AES-128-CTR | Confidentiality Protection | ||
| IKEv2 (RFC 7296) | Clause 5.4 of TS 33.210 |
128-AES GCM SHA-256 (RFC 8442)
256-AES GCM SHA-384 (RFC 8442) | Confidentiality and Integrity Protection |
| Clauses 5, 6, 7 of TS 33.310 | SHA2-256/384 [47] | Hash Function | |
| IPsec ESP (RFC 4303, RFC 8221, RFC 8750) | TS 33.210 | ENCR_AES_CBC (RFC 3602) | Confidentiality Protection |
|
ENCR_AES_GCM_16 (RFC 4106)
ENCR_AES_GCM_16_IIV (RFC 8750) | Confidentiality and Integrity Protection | ||
|
AUTH_AES_128_GMAC (RFC 4543)
AUTH_HMAC_SHA2_256_128 (RFC 4868) | Authentication | ||
| JWE (RFC 7516) | Clauses 6.3.1, 6.3.2 of TS 33.210 | AES_128_GCM, AES_256_GCM | Confidentiality and Integrity Protection |
| JWS (RFC 7515) | Clauses 6.3.1, 6.3.3 of TS 33.210 | SHA-256 | Hash Function |
| KDF (Clause B.2 of TS 33.220) | Clause B.2.0 of TS 33.220 | HMAC-SHA-256 | Session Key Derivation |
| Clause C.3 of TS 33.501 | ANSI-X9.63-KDF | Session Key Derivation | |
| MIKEY-SAKKE (RFC 6509) | Appendix A of RFC 6509 | SHA-256 | Hash Function |
| NAS security (TS 33.501) | TS 33.501, Annex D | 128-NEA1, 128-NIA1
128-NEA2, 128-NIA2 128-NEA3, 128-NIA3 | Confidentiality and Integrity Protection |
| OAuth 2.0 (RFC 6749, RFC 6750) | Clause 6.2 of TS 33.210 for TLS | See TLS 1.2 and TLS 1.3 in this Table | Confidentiality and Integrity Protection |
| Hash Function | |||
| Clause 6.3 of TS 33.210 for JWE/JWS | See JWE and JWS in this Table | Confidentiality and Integrity Protection | |
| Hash Function | |||
| OCSP (RFC 6960) | Clause 6.1b of TS 33.310 | SHA-256
SHA-384 | Hash Function |
| PDCP security (TS 38.323) | TS 33.501, Annex D | 128-NEA1, 128-NIA1
128-NEA2, 128-NIA2 128-NEA3, 128-NIA3 | Confidentiality and Integrity Protection |
| PKI | Clause 6.1.1 of TS 33.310 | SHA-256
SHA-384 | Hash Function |
| TLS 1.2 (RFC 5246) | Clauses 6.2.1, 6.2.3 of TS 33.210 | AES_128_GCM, AES_256_GCM | Confidentiality and Integrity Protection |
| SHA256, SHA384 | Hash Function | ||
| TLS 1.3 (RFC 8446) | Clauses 6.2.1, 6.2.2 of TS 33.210 | AES_128_GCM, AES_256_GCM, CHACHA20_POLY1305 | Confidentiality and Integrity Protection |
| SHA-256, SHA-384 | Hash Function |
| Protocol/Function | Protocol Profile, Clauses | Cryptographic Algorithm(s) | Feature(s), Usage Type |
|---|---|---|---|
| DTLS 1.2 (RFC 6347) | Clause 6.2.1 of TS 33.210 | See TLS 1.2 in this Table | Confidentiality and Integrity Protection |
| DTLS 1.3 (RFC 9147) | Clause 6.2.1 of TS 33.210 | See TLS 1.2 in this Table | Confidentiality and Integrity Protection |
| EAP-TLS (RFC 9190, RFC 5216) | Clause B.2.1 of TS 33.501 | See TLS in this Table. | Authentication /
Digital Signature / Confidentiality Protection / Hash Function |
| TS 33.501 RFC 9190 (TLS 1.3) | ECDHE | Key Agreement | |
| EAP-TTLS (RFC 5281) | TS 33.501, Annex U Clause 6.2 of TS 33.210 for TLS | See TLS in this Table | Key Agreement |
| See TLS in this Table | Authentication /
Digital Signature / Confidentiality Protection / Hash Function | ||
| ECIES ([7], [8]) | Clause C.3 of TS 33.501 | ECDH | Key Agreement |
| IKEv2 (RFC 7296) | Clause 5.4 of TS 33.210 | DH | Key Agreement |
| Clauses 5, 6, 7 of TS 33.310 |
RSA Sha-256/384 (RFC 8017)
ECDSA SHA-256/384/512 (RFC 4754) RSASSA-PSS SHA-256 [47] | Digital Signature | |
| SHA2-256/384 [47] | Hash Function | ||
| JWE (RFC 7516) | Clauses 6.3.1, 6.3.2 of TS 33.210 | ECDH-ES | Key Agreement |
| JWS (RFC 7515) | Clauses 6.3.1, 6.3.3 of TS 33.210 | ECDSA | Digital Signature |
| MIKEY-SAKKE (RFC 6509) | RFC 6507 | ECCSI | Digital signature |
| RFC 6508 | SAKKE | Key agreement | |
| OAuth 2.0 (RFC 6749, RFC 6750) | Clause 6.2 of TS 33.210 for TLS | See TLS 1.2 and TLS 1.3 in this Table | Key Agreement |
| Digital Signature | |||
| Clause 6.3 of TS 33.210 for JWE/JWS | See JWE and JWS in this Table | Key Agreement | |
| Digital Signature | |||
| OCSP (RFC 6960) | Clause 6.1b of TS 33.310 | RSA
ECDSA | Authentication /
Digital Signature |
| PKI | Clause 6.1.1 of TS 33.310 | RSA,
ECDSA | Authentication /
Digital Signature |
| TLS 1.2 (RFC 5246) | Clauses 6.2.1, 6.2.3 of TS 33.210 | ECDHE | Key Agreement |
| ECDSA, RSA | Digital Signature | ||
| TLS 1.3 (RFC 8446) | Clauses 6.2.1, 6.2.2 of TS 33.210 | ECDHE | Key Agreement |
| ECDSA, RSA | Digital Signature |