Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

21   22   23   24   25   26   27   28   29   30   31   32   33   34   35   36   37   38   41   42   43   44   45   46   48   49   50   51   52   55   Overview   TBs   Releases   Guide  

3GPP 35-series — Security Algorithms

18 TS
6 TR

TR → range 9 reports, sTR → range 7/8 studies
"living" TS →
"living" TR, or sTR for Rel-14 and after →
"static" TS (upgraded unchanged with at least the last frozen release, i.e. Rel-15) →
"static" TR, or sTR for Rel-13 and before →
discontinued TS/TR →

Following the Last Plenary Meetings of  2019-06
no Update



Specification of the 3GPP
Confidentiality and Integrity Algorithms

The 3GPP Confidentiality and Integrity Algorithms f8 and f9 have been developed through the collaborative efforts of the European Telecommunications Standards Institute (ETSI), the Association of Radio Industries and Businesses (ARIB), the Telecommunications Technology Association (TTA), the T1 Committee.
The f8 and f9 Algorithms Specifications may be used only for the development and operation of 3G Mobile Communications and services. Every Beneficiary must sign a Restricted Usage Undertaking with the Custodian and demonstrate that he fulfils the approval criteria specified in the Restricted Usage Undertaking.
Furthermore, Mitsubishi Electric Corporation holds essential patents on the Algorithms. The Beneficiary must get a separate IPR License Agreement from Mitsubishi Electronic Corporation Japan.
TS 35.201SA3Rel‑3 → 15
Document 1:  f8 and f9 Specification

TS 35.202SA3Rel‑3 → 15
Document 2:  Kasumi Specification

TS 35.203SA3Rel‑3 → 15
Document 3:  Implementors' Test Data

TS 35.204SA3Rel‑3 → 15
Document 4:  Design Conformance Test Data
Top

Specification of the MILENAGE Algorithm Set:
an example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*

These documents have been prepared by the 3GPP Task Force, and contain an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in this document are used - all seven functions are operator-specifiable rather than being fully standardised).
TS 35.205SA3Rel‑4 → 15
Document 1:  General

TS 35.206SA3Rel‑4 → 15
Document 2:  Algorithm Specification

TS 35.207SA3Rel‑4 → 15
Document 3:  Implementors' Test Data

TS 35.208SA3Rel‑4 → 15
Document 4:  Design Conformance Test Data

TR 35.909SA3Rel‑4 → 15
Document 5:  Summary and Results of Design and Evaluation
Top

Specification of the 3GPP
Confidentiality and Integrity Algorithms UEA2 and UIA2

The technical provisions of these documents, subject to licensing conditions, are contained in the ETSI TC SAGE Specifications, available   here.
TS 35.215SA3Rel‑7 → 15
Document 1:  UEA2 and UIA2 Specifications

TS 35.216SA3Rel‑7 → 15
Document 2:  SNOW 3G Specification

TS 35.217SA3Rel‑7 → 15
Document 3:  Implementors' Test Data

TS 35.218SA3Rel‑7 → 15
Document 4:  Design Conformance Test Data

TR 35.919SA3Rel‑7 → 15
Document 5:  Design and Evaluation Report
Top

Specification of the 3GPP
Confidentiality and Integrity Algorithms EEA3 and EIA3

The technical provisions of these documents, subject to licensing conditions, are contained in the ETSI TC SAGE Specifications, available   here.
TS 35.221SA3Rel‑11 → 15
Document 1:  EEA3 and EIA3 Specifications

TS 35.222SA3Rel‑11 → 15
Document 2:  ZUC Specification

TS 35.223SA3Rel‑11 → 15
Document 3:  Implementors' Test Data

TR 35.924SA3Rel‑11 → 15
Document 4:  Design and Evaluation Report
Top

Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*

TS 35.231SA3Rel‑12 → 15
Document 1:  Algorithm Specification

TS 35.232SA3Rel‑12 → 15
Document 2:  Implementers' Test Data

TS 35.233SA3Rel‑12 → 15
Document 3:  Design Conformance Test Data

TR 35.934SA3Rel‑12 → 15
Document 4:  Report on the Design and Evaluation

TR 35.935SA3Rel‑12 → 15
Document 5:  Performance Evaluation

TR 35.936SA3Rel‑12 → 15
Document 6:  Security Assessment
Top