Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TR 35.934 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 4: Report on the design and evaluation

3GPP‑Page   ETSI‑search   full‑ToC    
use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.1 (PDF)  2018/06  21 p.
V14.0.1  2018/06  21 p.
V13.0.0  2016/01  21 p.
V12.0.0  2014/12  21 p.


Rapporteur:  Mr. Barry, Aguibou
See also:

The present document (together with three accompanying documents, "Security Assessment of Tuak Algorithm Set", "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group" and "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group – extension report" describes the design rationale, and presents evaluation results, on the Tuak algorithm set [TS 35.231] – a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.