Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 35.205
Word version: 16.0.0
0…
2…
2
References
3
Abbreviations
4
Structure of this report
5
Background to the 3GPP Authentication and Key Generation algorithms
6
SAGE 3GPP AF TF work plan
7
Outline of algorithm requirements specification
8
Algorithms design
9
Algorithm evaluation
10
Release of algorithm specification and test data by SAGE
$
Change History
2
References
3
Abbreviations
Word‑p. 6
4
Structure of this report
Word‑p. 7
5
Background to the 3GPP Authentication and Key Generation algorithms
6
SAGE 3GPP AF TF work plan
7
Outline of algorithm requirements specification
Word‑p. 8
7.1
The authentication and key generation functions
7.2
Use of the algorithms on the AuC side
7.3
Use of the algorithms in the USIM
Word‑p. 9
7.4
Use of the algorithms for resynchronisation in the USIM
7.5
Use of the algorithms for resynchronisation in the HLR/AuC
7.6
Implementation aspects
7.7
Generic requirements for 3GPP cryptographic functions and algorithms
Word‑p. 10
7.8
Subsequent requirements on the authentication and key generation functions
8
Algorithms design
Word‑p. 11
8.1
Design criteria
8.2
Chosen design for the framework
8.3
Analysis of the role of OP and OPc
Word‑p. 12
8.4
Choice of kernel
8.5
Design methodology
8.6
Specification and test data
Word‑p. 13
9
Algorithm evaluation
9.1
Evaluation criteria
9.2
Mathematical Evaluation of the modes
9.3
Statistical Evaluation
9.4
Side channel attacks evaluation
Word‑p. 14
9.5
Complexity evaluation
9.6
Evaluation report
10
Release of algorithm specification and test data by SAGE
10.1
SAGE 3GPP AF TF approval for release
10.2
Publication of the algorithm set specification
10.3
Export of the algorithm set specification
$
Change History
Word‑p. 15