Tech-invite   World Map
3GPPspecs     Glossaries     IETF     RFCs     Groups     SIP     ABNFs
Top        in Index        Prev        Next

TS 35.233 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 3: Design conformance test data

ToC      3GPP‑Page      ETSI‑search      Help       
V14.0.0 (PDF)    2017/03    19 p.
V13.0.0    2016/01    19 p.
V12.1.0    2014/06    19 p.


Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR    

This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in this document are used — all seven functions are operator-specifiable rather than being fully standardised).

Clause 3 introduces the algorithms and describes the notation used in the subsequent sections.

Clause 4 provides test data for the Keccak permutation used within TUAK.

Clause 5 provides test data for the MILENAGE authentication and key generation algorithms f1, f1*, f2, f3, f4, f5 and f5*.


 

Here        Top