Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TS 35.233 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 3: Design conformance test data

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  19 p.
V13.0.0  2016/01  19 p.
V12.1.0  2014/06  19 p.


Rapporteur:  Mr. Evans, Tim P.
See also:  Tuak-related TS/TR

This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that the particular algorithms specified in this document are used — all seven functions are operator-specifiable rather than being fully standardised).

Clause 3 introduces the algorithms and describes the notation used in the subsequent sections.

Clause 4 provides test data for the Keccak permutation used within TUAK.

Clause 5 provides test data for the MILENAGE authentication and key generation algorithms f1, f1*, f2, f3, f4, f5 and f5*.


 

Here   Top