Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

3GPP 35-series — Security Algorithms


The technical specifications (TS) are displayed in blue, while the reports (TR) are shown in green.  TS that have been discontinued in earlier releases are indicated with a light blue color.  TR in the '9' range that have been stopped are highlighted in light green.  TS or TR with a yellow background indicate those updated at the latest  Q3-2024  Plenary Meetings.  The new ones are displayed with a single red dotted overline.
201202203204205206207208215216217218221222223231232233240241242243244245246247248909919924934935936
Specification of the 3GPP Confidentiality and Integrity Algorithms
TS 35.201 REL  3 → 18 Document 1:  f8 and f9 Specification
TS 35.202 REL  3 → 18 Document 2:  Kasumi Specification
TS 35.203 REL  3 → 18 Document 3:  Implementors' Test Data
TS 35.204 REL  3 → 18 Document 4:  Design Conformance Test Data
Specification of the MILENAGE Algorithm Set:
an example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5*
TS 35.205 REL  4 → 18 Document 1:  f8 and f9 Specification
TS 35.206 REL  4 → 18 Document 2:  Algorithm Specification
TS 35.207 REL  4 → 18 Document 3:  Implementors' Test Data
TS 35.208 REL  4 → 18 Document 4:  Design Conformance Test Data
TR 35.909 REL  4 → 18 Document 5:  Summary and Results of Design and Evaluation
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2
TS 35.215 REL  7 → 18 Document 1:  UEA2 and UIA2 Specifications
TS 35.216 REL  7 → 18 Document 2:  SNOW 3G Specification
TS 35.217 REL  7 → 18 Document 3:  Implementors' Test Data
TS 35.218 REL  7 → 18 Document 4:  Design Conformance Test Data
TR 35.919 REL  7 → 18 Document 5:  Design and Evaluation Report
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 and EIA3
TS 35.221 REL  11 → 18 Document 1:  EEA3 and EIA3 Specifications
TS 35.222 REL  11 → 18 Document 2:  ZUC Specification
TS 35.223 REL  11 → 18 Document 3:  Implementors' Test Data
TR 35.924 REL  11 → 18 Document 4:  Design and Evaluation Report
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5*
TS 35.231 REL  12 → 18 Document 1:  Algorithm Specification
TS 35.232 REL  12 → 18 Document 2:  Implementers' Test Data
TS 35.233 REL  12 → 18 Document 3:  Design Conformance Test Data
TR 35.934 REL  12 → 18 Document 4:  Report on the Design and Evaluation
TR 35.935 REL  12 → 18 Document 5:  Performance Evaluation
TR 35.936 REL  12 → 18 Document 6:  Security Assessment
Specification of the Snow 5G based 256-bits algorithm set:
Specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G
TS 35.240 REL  18 Document 1:  Algorithm Specification
TS 35.241 REL  18 Document 2:  Implementation Test Data
TS 35.242 REL  18 Document 3:  Design Conformance Test Data
Specification of the AES based 256-bits algorithm set:
Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G
TS 35.243 REL  18 Document 1:  Algorithm Specification
TS 35.244 REL  18 Document 2:  Implementation Test Data
TS 35.245 REL  18 Document 3:  Design Conformance Test Data
Specification of the ZUC based 256-bits algorithm set:
Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G
TS 35.246 REL  18 Document 1:  Algorithm Specification
TS 35.247 REL  18 Document 2:  Implementation Test Data
TS 35.248 REL  18 Document 3:  Design Conformance Test Data

Up