Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TR 35.934 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 4: Report on the design and evaluation

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  21 p.
V13.0.0  2016/01  21 p.
V12.0.0  2014/12  21 p.


Rapporteur:  Mr. Barry, Aguibou
See also:  Tuak-related TS/TR

The present document (together with three accompanying documents, "Security Assessment of Tuak Algorithm Set", "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group" and "Performance Evaluation of the Tuak algorithm in support of the ETSI SAGE standardisation group – extension report" describes the design rationale, and presents evaluation results, on the Tuak algorithm set [TS 35.231] – a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.


 

Here   Top

 

 

1  ScopePDF-p. 6
2  References
3  Definitions and abbreviationsPDF-p. 7
4  Structure of this reportPDF-p. 8
5  Background to the design and evaluation work
6  Summary of algorithm requirementsPDF-p. 9
7  Overview of the Tuak design
8  Design rationalePDF-p. 13
9  Independent security and performance evaluationPDF-p. 17
10  More notes on implementation and side channel attacksPDF-p. 18
11  ConclusionsUp
A  Change historyPDF-p. 19

Up   Top