Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 35.936
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*
Document 6: Security Assessment

V18.0.0 (PDF)  2024/03  8 p.
V17.0.0  2022/03  8 p.
V16.0.0  2020/06  8 p.
V15.0.0  2018/06  8 p.
V14.0.0  2017/03  8 p.
V13.0.0  2016/01  8 p.
V12.1.0  2015/06  8 p.
Rapporteur:
Mr. Barry, Aguibou
VODAFONE Group Plc

Content for  TR 35.936  Word version:  18.0.0

Here   Top

1  Scopep. 6

The present document provides a reference to an independent security assessment of the Tuak algorithm set carried out by the University of Waterloo, Canada.

2  Referencesp. 6

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TS 35.231: "Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification ".
[2]
"Security Assessment of TUAK Algorithm Set"; Guang Gong, Kalikinkar Mandal, Yin Tan, TengWu; Department of Electrical and Computer Engineering University of Waterloo, Canada (available at http://www.3gpp.org/ftp/Specs/archive/35_series/35.935/SAGE_report/Secassesment.zip)
Up

3  Definitions, symbols and abbreviationsp. 6

3.1  Definitionsp. 6

For the purposes of the present document, the terms and definitions given in TS 35.231 apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TS 35.231.

4  Security assessment of the Tuak algorithm setp. 6

The security assessment of the Tuak algorithm set [1] can be found here: [2].

$  Change Historyp. 7


Up   Top