Tech-invite3GPPspecsSIPRFCs
Overview21222324252627282931323334353637384‑5x

Top   in Index   Prev   None

TR 35.936
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*
Document 6: Security Assessment

Use "3GPP‑Page" to get the Word version, and "ETSI‑search" to get the PDF version
V16.0.0 (PDF)  2020/06  8 p.
V15.0.0  2018/06  8 p.
V14.0.0  2017/03  8 p.
V13.0.0  2016/01  8 p.
V12.1.0  2015/06  8 p.
Rapporteur:
Mr. Barry, Aguibou

Content for  TR 35.936  Word version:  16.0.0

Here   Top
1  ScopeWord‑p. 6
The present document provides a reference to an independent security assessment of the Tuak algorithm set carried out by the University of Waterloo, Canada.
2  References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]  TS 35.231   "Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification ".
[2]  "Security Assessment of TUAK Algorithm Set"; Guang Gong, Kalikinkar Mandal, Yin Tan, TengWu; Department of Electrical and Computer Engineering University of Waterloo, Canada (available at http://www.3gpp.org/ftp/Specs/archive/35_series/35.935/SAGE_report/Secassesment.zip)
Up
3  Definitions, symbols and abbreviations
3.1  Definitions
For the purposes of the present document, the terms and definitions given in TS 35.231 apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TS 35.231.
4  Security assessment of the Tuak algorithm set
The security assessment of the Tuak algorithm set [1] can be found here: [2].
$  Change HistoryWord‑p. 7

Up   Top