Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+

3GPP 35-series — Security Algorithms

Following the Plenary Meetings of Sep 2019
Updated TS/TR:
.231

Specification of the 3GPP
Confidentiality and Integrity Algorithms

The 3GPP Confidentiality and Integrity Algorithms f8 and f9 have been developed through the collaborative efforts of the European Telecommunications Standards Institute (ETSI), the Association of Radio Industries and Businesses (ARIB), the Telecommunications Technology Association (TTA), the T1 Committee.
The f8 and f9 Algorithms Specifications may be used only for the development and operation of 3G Mobile Communications and services. Every Beneficiary must sign a Restricted Usage Undertaking with the Custodian and demonstrate that he fulfils the approval criteria specified in the Restricted Usage Undertaking.
Furthermore, Mitsubishi Electric Corporation holds essential patents on the Algorithms. The Beneficiary must get a separate IPR License Agreement from Mitsubishi Electronic Corporation Japan.
TS 35.201SA3Rel‑3 → 15
Document 1:  f8 and f9 Specification

TS 35.202SA3Rel‑3 → 15
Document 2:  Kasumi Specification

TS 35.203SA3Rel‑3 → 15
Document 3:  Implementors' Test Data

TS 35.204SA3Rel‑3 → 15
Document 4:  Design Conformance Test Data
Top

Specification of the MILENAGE Algorithm Set:
an example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*

These documents have been prepared by the 3GPP Task Force, and contain an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in this document are used - all seven functions are operator-specifiable rather than being fully standardised).
TS 35.205SA3Rel‑4 → 15
Document 1:  General

TS 35.206SA3Rel‑4 → 15
Document 2:  Algorithm Specification

TS 35.207SA3Rel‑4 → 15
Document 3:  Implementors' Test Data

TS 35.208SA3Rel‑4 → 15
Document 4:  Design Conformance Test Data

TR 35.909SA3Rel‑4 → 15
Document 5:  Summary and Results of Design and Evaluation
Top

Specification of the 3GPP
Confidentiality and Integrity Algorithms UEA2 and UIA2

The technical provisions of these documents, subject to licensing conditions, are contained in the ETSI TC SAGE Specifications, available   here.
TS 35.215SA3Rel‑7 → 15
Document 1:  UEA2 and UIA2 Specifications

TS 35.216SA3Rel‑7 → 15
Document 2:  SNOW 3G Specification

TS 35.217SA3Rel‑7 → 15
Document 3:  Implementors' Test Data

TS 35.218SA3Rel‑7 → 15
Document 4:  Design Conformance Test Data

TR 35.919SA3Rel‑7 → 15
Document 5:  Design and Evaluation Report
Top

Specification of the 3GPP
Confidentiality and Integrity Algorithms EEA3 and EIA3

The technical provisions of these documents, subject to licensing conditions, are contained in the ETSI TC SAGE Specifications, available   here.
TS 35.221SA3Rel‑11 → 15
Document 1:  EEA3 and EIA3 Specifications

TS 35.222SA3Rel‑11 → 15
Document 2:  ZUC Specification

TS 35.223SA3Rel‑11 → 15
Document 3:  Implementors' Test Data

TR 35.924SA3Rel‑11 → 15
Document 4:  Design and Evaluation Report
Top

Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*

TS 35.231SA3Rel‑12 → 15
Document 1:  Algorithm Specification

TS 35.232SA3Rel‑12 → 15
Document 2:  Implementers' Test Data

TS 35.233SA3Rel‑12 → 15
Document 3:  Design Conformance Test Data

TR 35.934SA3Rel‑12 → 15
Document 4:  Report on the Design and Evaluation

TR 35.935SA3Rel‑12 → 15
Document 5:  Performance Evaluation

TR 35.936SA3Rel‑12 → 15
Document 6:  Security Assessment
Top