Tech-invite   3GPPspecs   RFCs   SIP   Search in Tech-invite

Top   in Index   Prev   Next

TS 43.020 (SA3)
Security related Network Functions

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2018/06  125 p.
V14.3.0  2017/06  127 p.
V13.6.0  2017/06  126 p.
V12.1.0  2014/06  113 p.
V11.2.0  2014/06  113 p.
V10.2.0  2014/06  113 p.
V9.2.0  2014/06  112 p.
V8.0.0  2008/12  111 p.
V7.3.1  2008/07  111 p.
V6.5.1  2008/01  113 p.
V5.4.0  2007/12  98 p.
V4.5.0  2007/12  98 p.
GSM Rel-99 v8.6.0  2007/12  97 p.
GSM Rel-98 v7.2.0  1999/11  104 p.
GSM Rel-97 v6.1.0  1999/06  71 p.
GSM Rel-96 v5.2.1  1998/07  71 p.
GSM Phase-2 v4.4.1  1997/08  51 p.
GSM Phase-1 v3.3.2  1992/02  48 p.


Rapporteur:  Mr. Sahlin, Bengt

This TS specifies the network functions needed to provide the security related service and functions specified in TS 42.009. It does not address the cryptological algorithms that are needed to provide different security related features. This topic is addressed in annex C. Wherever a cryptological algorithm or mechanism is needed, this is signalled with a reference to annex C. The references refers only to functionalities, and some algorithms may be identical or use common hardware.

full Table of Contents for  TS 43.020  Word version:   15.0.0

 

Here   Top

 

 

0  Scope [R4]Word-p. 10
1  General [R4]
2  Subscriber identity confidentiality [R4]Word-p. 12
3  Subscriber identity authentication [R4]Word-p. 20
4  Confidentiality of signalling information elements, connectionless data and user information elements on physical connections [R4]Word-p. 26
5  Synthetic summary [R4]Word-p. 31
A  Security issues related to signalling schemes and key management [R4]Word-p. 32
B  Security information to be stored in the entities of the GSM system [R4]Word-p. 47
C (Normative)  External specifications of security related algorithms [R4]Word-p. 49
D (Normative)  Security related network functions for General Packet Radio Service [R4]Word-p. 53
D.1  General
D.2  Subscriber identity confidentialityUp
D.3  Subscriber identity authenticationWord-p. 59
D.4  Confidentiality of user information and signalling between MS and SGSNWord-p. 64
D.5  Synthetic summaryWord-p. 68
D.6  Security of the GPRS backbone
E (Normative)  GSM Cordless Telephony System (CTS), (Phase 1); Security related network functions; Stage 2 [R4]Word-p. 69
E.1  Introduction
E.2  GeneralWord-p. 71
E.3  CTS local security systemWord-p. 72
E.4  CTS supervising security systemWord-p. 82
E.5  Other CTS security featuresWord-p. 90
E.6  FP Integrity
E.7  Type approval issues
E.8  Security information to be stored in the entities of the CTSWord-p. 93
E.9  External specification of security related algorithmsWord-p. 95
E.10  Coding of the FPAC and CTS-PINWord-p. 98
E.11  Guidelines for generation of random numbers (informative annex)
F (Normative)  Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS) [R6]Word-p. 99
G  Generation of VSTK_RAND [R6]Word-p. 111
H (Normative)  Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT) [R13]Word-p. 112
I  Change historyWord-p. 126

Up   Top