tech-invite   World Map
3GPP     Specs     Glossaries     UICC       IETF     RFCs     Groups     SIP     ABNFs       T+       Search     Home
Top        in Index        Prev        Next

TR 35.909 (SA3)
MILENAGE example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Summary and results of design and evaluation

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    30 p.
(P) V13.0.0    2016/01    30 p.
(P) V12.0.0    2014/09    30 p.
(P) V11.0.0    2012/09    30 p.
(P) V10.0.0    2011/04    30 p.
(P) V9.0.0    2009/12    30 p.
(P) V8.0.0    2008/12    30 p.
(P) V7.0.0    2007/06    30 p.
(P) V6.0.0    2005/01    30 p.
(P) V5.0.0    2002/06    30 p.
(P) V4.0.0    2001/05    30 p.


Rapporteur:  Prof. Walker, Michael
See also:  – Milenage-related TS/TR    


This TR has been produced by ETSI SAGE Task Force 172 on the design of an example set for 3GPP Authentication and Key Generation Algorithms. The work described in this TR was undertaken in response to a request made by 3GPP TSG SA.

SAGE Version 1.0 of this TR was submitted to the 3GPP SA WG3 group in December 2000. Version 1.1 (with updated C code in Annex 4) was approved by TSG SA#10 in December 2000.

This TR contains a detailed summary of the work performed during the design and evaluation of the 3GPP Authentication Functions denoted as the MILENAGE algorithm set.


 

Here        Top

 

 

1   Scope   PDF-p. 6
2   References
3   Abbreviations   PDF-p. 7
4   Structure of this report   PDF-p. 8
5   Background to the design and evaluation work
6   Summary of algorithm requirements   PDF-p. 9
7   Design criteria   PDF-p. 11
8   The 3GPP MILENAGE algorithms   PDF-p. 13
9   Rationale for the chosen design
10   Evaluation   PDF-p. 16
10.1   Evaluation criteria
10.2   Operational Context   PDF-p. 17
10.3   Analysis
10.4   Statistical evaluation   PDF-p. 22
10.5   Published attacks on Rijndael      Up
10.6   Complexity evaluation   PDF-p. 23
10.7   External complexity evaluations
10.8   Evaluation of side channel attacks   PDF-p. 25
11   Conclusions   PDF-p. 27
A   Change history   PDF-p. 28

Up        Top