Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.179
Word version: 13.11.0
1…
4…
7…
A…
B…
E…
7
End-to-end communication security
7.1
Overview
7.2
Key provisioning and management
7.3
Group call key distribution
7.4
Private call key distribution
7.5
Protection of media stream (SRTP)
7.6
Protection of offline floor and media control signalling (SRTCP)
7.7
Protection of MBMS subchannel control messages (SRTCP)
8
Inter/Intra domain interface security
8.1
General
9
Protection of floor control and sensitive application signalling
9.1
Key agreement for protection of floor control and sensitive application data (Client to Server)
9.2
Key agreement for protection of floor control and sensitive application data between servers
9.3
Protection of XML content
9.4
Key agreement for online floor control (SRTCP)
...
7
End-to-end communication security
7.1
Overview
7.2
Key provisioning and management
Word‑p. 26
7.2.1
General
7.2.2
Functional model for key management
7.2.2.0
General
7.2.2.1
Reference point CSC-8 (between key management server and the key management client within the MCPTT UE)
Word‑p. 27
7.2.2.2
Reference point CSC-9 (between the key management server and the key management client within the MCPTT Server)
7.2.2.3
Reference point CSC-10 (between the key management server and the key management client within a group management server)
7.2.3
Security procedures for key management
7.2.4
Provisioned key material to support end-to-end communication security
Word‑p. 29
7.3
Group call key distribution
7.3.1
General
7.3.2
Security procedures for GMK provisioning
Word‑p. 31
7.3.3
Key Identification and purpose tags
Word‑p. 32
7.3.4
Group creation procedure
7.3.5
Dynamic group keying
Word‑p. 33
7.3.5.1
General
7.3.5.2
Group regrouping procedures (within a single MCPTT system)
7.3.5.3
Group regrouping procedures (involving multiple MCPTT systems)
7.3.6
Derivation of SRTP/SRTCP master keys
Word‑p. 34
7.3.7
Group member GMK management
Word‑p. 35
7.4
Private call key distribution
7.4.1
General
7.4.2
Security procedures (on-network)
Word‑p. 37
7.4.3
Security procedures (off-network)
Word‑p. 38
7.4.4
Derivation of SRTP/SRTCP master keys
Word‑p. 39
7.4.5
Void
7.5
Protection of media stream (SRTP)
Word‑p. 40
7.5.1
General
7.5.2
Security procedures for media stream protection
Word‑p. 41
7.6
Protection of offline floor and media control signalling (SRTCP)
Word‑p. 42
7.6.1
General
7.6.2
Security procedures for offline floor and media control protection
Word‑p. 43
7.7
Protection of MBMS subchannel control messages (SRTCP)
Word‑p. 44
7.7.1
General
7.7.2
Key distribution
7.7.3
Derivation of SRTCP master keys
Word‑p. 45
8
Inter/Intra domain interface security
Word‑p. 46
8.1
General
9
Protection of floor control and sensitive application signalling
9.1
Key agreement for protection of floor control and sensitive application data (Client to Server)
9.1.1
Identity-based key management for Client Server Key (CSK)
9.1.2
Creation of the CSK
Word‑p. 47
9.1.3
Secure distribution of the CSK
9.1.3.0
General
9.1.3.1
MIKEY-SAKKE I_MESSAGE
9.1.3.2
Distribution of CSK during MCPTT Service Authorization and group subscription
Word‑p. 48
9.1.3.3
Obtaining CSK from the I_MESSAGE
9.1.3.4
Procedure
9.2
Key agreement for protection of floor control and sensitive application data between servers
Word‑p. 49
9.3
Protection of XML content
Word‑p. 50
9.3.1
General
9.3.2
Protected content
9.3.3
Key agreement
Word‑p. 51
9.3.4
Confidentiality protection using XML encryption (xmlenc)
9.3.4.1
General
9.3.4.2
XML content encryption
9.3.4.3
XML URI attribute encryption
Word‑p. 52
9.3.5
Integrity protection using XML signature (xmlsig)
Word‑p. 53
9.4
Key agreement for online floor control (SRTCP)
Word‑p. 54
9.4.1
General
9.4.2
Key agreement between MCPTT client and MCPTT Server
9.4.3
Key agreement between MCPTT Servers
9.4.4
Key agreement for multicast from MCPTT Server
9.4.5
Derivation of SRTCP key material