The present document provides a reference to an independent security assessment of the Tuak algorithm set carried out by the University of Waterloo, Canada.
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
-
References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
-
For a specific reference, subsequent revisions do not apply.
-
For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TS 35.231: "Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification ".
[2]
"Security Assessment of TUAK Algorithm Set"; Guang Gong, Kalikinkar Mandal, Yin Tan, TengWu; Department of Electrical and Computer Engineering University of Waterloo, Canada (available at http://www.3gpp.org/ftp/Specs/archive/35_series/35.935/SAGE_report/Secassesment.zip)
The security assessment of the Tuak algorithm set [1] can be found here: [2].