The present document (together with three accompanying documents, "Security Assessment of Tuak Algorithm Set", "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation
group" and "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation
group – extension report" describes the design rationale,
and presents evaluation results, on the Tuak algorithm set [TS 35.231
] – a second example set of algorithms which may be used
as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.