tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TS 35.233 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 3: Design conformance test data

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    19 p.
(P) V13.0.0    2016/01    19 p.
(P) V12.1.0    2014/06    19 p.


Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR    


This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in this document are used — all seven functions are operator-specifiable rather than being fully standardised).

Clause 3 introduces the algorithms and describes the notation used in the subsequent sections.

Clause 4 provides test data for the Keccak permutation used within TUAK.

Clause 5 provides test data for the MILENAGE authentication and key generation algorithms f1, f1*, f2, f3, f4, f5 and f5*.


 

Here        Top