Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TS 35.231 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 1: Algorithm specification

ToC   3GPP‑Page   ETSI‑search   Help    
V15.0.0 (PDF)2018/06  29 p.
V14.0.0  2017/03  29 p.
V13.0.0  2016/01  29 p.
V12.1.0  2014/06  29 p.


Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR

The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather than being fully standardised).


 

Here   Top   None   None   Next
1…   6…