Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 43.020 (SA3)
Security related Network Functions

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2018/06  125 p.
V14.3.0  2017/06  127 p.
V13.6.0  2017/06  126 p.
V12.1.0  2014/06  113 p.
V11.2.0  2014/06  113 p.
V10.2.0  2014/06  113 p.
V9.2.0  2014/06  112 p.
V8.0.0  2008/12  111 p.
V7.3.1  2008/07  111 p.
V6.5.1  2008/01  113 p.
V5.4.0  2007/12  98 p.
V4.5.0  2007/12  98 p.
GSM Rel-99 v8.6.0  2007/12  97 p.
GSM Rel-98 v7.2.0  1999/11  104 p.
GSM Rel-97 v6.1.0  1999/06  71 p.
GSM Rel-96 v5.2.1  1998/07  71 p.
GSM Phase-2 v4.4.1  1997/08  51 p.
GSM Phase-1 v3.3.2  1992/02  48 p.

Rapporteur:  Mr. Sahlin, Bengt

This TS specifies the network functions needed to provide the security related service and functions specified in TS 42.009. It does not address the cryptological algorithms that are needed to provide different security related features. This topic is addressed in annex C. Wherever a cryptological algorithm or mechanism is needed, this is signalled with a reference to annex C. The references refers only to functionalities, and some algorithms may be identical or use common hardware.

full Table of Contents for  TS 43.020  Word version:   15.0.0

 

Here   Top

 

 

0  ScopeWord-p. 10
1  General
2  Subscriber identity confidentialityWord-p. 12
3  Subscriber identity authenticationWord-p. 20
4  Confidentiality of signalling information elements, connectionless data and user information elements on physical connectionsWord-p. 26
5  Synthetic summaryWord-p. 31
A  Security issues related to signalling schemes and key managementWord-p. 32
B  Security information to be stored in the entities of the GSM systemWord-p. 47
C (Normative)  External specifications of security related algorithmsWord-p. 49
D (Normative)  Security related network functions for General Packet Radio ServiceWord-p. 53
D.1  General
D.2  Subscriber identity confidentialityUp
D.3  Subscriber identity authenticationWord-p. 59
D.4  Confidentiality of user information and signalling between MS and SGSNWord-p. 64
D.5  Synthetic summaryWord-p. 68
D.6  Security of the GPRS backbone
E (Normative)  GSM Cordless Telephony System (CTS), (Phase 1); Security related network functions; Stage 2Word-p. 69
E.1  Introduction
E.2  GeneralWord-p. 71
E.3  CTS local security systemWord-p. 72
E.4  CTS supervising security systemWord-p. 82
E.5  Other CTS security featuresWord-p. 90
E.6  FP Integrity
E.7  Type approval issues
E.8  Security information to be stored in the entities of the CTSWord-p. 93
E.9  External specification of security related algorithmsWord-p. 95
E.10  Coding of the FPAC and CTS-PINWord-p. 98
E.11  Guidelines for generation of random numbers (informative annex)
F (Normative)  Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS) [R6]Word-p. 99
G  Generation of VSTK_RAND [R6]Word-p. 111
H (Normative)  Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT) [R13]Word-p. 112
I  Change historyWord-p. 126

Up   Top