Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TR 35.934SA3
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*
Document 4: Report on the Design and Evaluation

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.1 (PDF)  2018/06  21 p.
V14.0.1  2018/06  21 p.
V13.0.0  2016/01  21 p.
V12.0.0  2014/12  21 p.

Rapporteur:  Mr. Barry, Aguibou

The present document (together with three accompanying documents, "Security Assessment of Tuak Algorithm Set", "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group" and "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group – extension report" describes the design rationale, and presents evaluation results, on the Tuak algorithm set [TS 35.231] – a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.

full Table of Contents for  TR 35.934  Word version:   15.0.1

Here   Top
1  ScopeWord-p. 6
2  References
3  Definitions and abbreviationsWord-p. 7
4  Structure of this reportWord-p. 8
5  Background to the design and evaluation work
6  Summary of algorithm requirementsWord-p. 9
7  Overview of the Tuak design
8  Design rationaleWord-p. 13
9  Independent security and performance evaluationWord-p. 17
10  More notes on implementation and side channel attacksWord-p. 18
11  ConclusionsUp
A  Change historyWord-p. 19

Up   Top