tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TR 35.934 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 4: Report on the design and evaluation

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    21 p.
(P) V13.0.0    2016/01    21 p.
(P) V12.0.0    2014/12    21 p.


Rapporteur:  Mr. Barry, Aguibou
See also:  Tuak-related TS/TR    


The present document (together with three accompanying documents, "Security Assessment of Tuak Algorithm Set", "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group" and "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group – extension report" describes the design rationale, and presents evaluation results, on the Tuak algorithm set [TS 35.231] – a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.



 

Here        Top

 

 

1   Scope   PDF-p. 6
2   References
3   Definitions and abbreviations   PDF-p. 7
4   Structure of this report   PDF-p. 8
5   Background to the design and evaluation work
6   Summary of algorithm requirements   PDF-p. 9
7   Overview of the Tuak design
8   Design rationale   PDF-p. 13
9   Independent security and performance evaluation   PDF-p. 17
10   More notes on implementation and side channel attacks   PDF-p. 18
11   Conclusions      Up
A   Change history   PDF-p. 19

Up        Top