Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 16.1.0
0…
2…
A…
E…
F…
F
Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS)
F.1
Introduction
F.2
Security Requirements
F.3
Storage of the Master Group Keys and overview of flows
F.4
Key derivation
F.5
Encryption of voice group calls
F.6
Specification of the Key Modification Function (KMF)
G
Generation of VSTK_RAND
H
Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)
H.1
Introduction
H.2
Authentication and key agreement
H.3
Ciphering and integrity mode negotiation
H.4
Protection of GMM messages
H.5
Algorithms for ciphering and integrity protection
H.6
Derivation of Kc128 and Ki128
H.7
Integrity protection of user plane
H.8
Definition of MAC-GMM in GMM Authentication and Ciphering Request and GMM Authentication and Ciphering Response messages
H.9
Protected negotiation of IOV values
$
Change history
F
(Normative) Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS)
|R6|
Word‑p. 99
F.1
Introduction
F.1.1
Scope
F.1.2
References
F.1.3
Definitions and Abbreviations
Word‑p. 100
F.1.3.1
Definitions
F.1.3.2
Abbreviations
F.2
Security Requirements
F.3
Storage of the Master Group Keys and overview of flows
Word‑p. 101
F.3.1
Distribution of ciphering data during establishment of a voice/broadcast group call
F.3.2
Signalling information required for the voice group call uplink access in the anchor MSC (normal case, subsequent talker on dedicated channel)
Word‑p. 104
F.3.3
Signalling information required to transfer the originator or subsequent talker from a dedicated channel to a group call channel
Word‑p. 106
F.4
Key derivation
F.4.1
Key derivation within the USIM / GCR
Word‑p. 107
F.4.2
Key derivation within the ME/BSS
Word‑p. 108
F.4.3
Encryption algorithm selection
Word‑p. 109
F.4.4
Algorithm requirements
F.4.4.1
A8_V
F.4.4.2
KMF
F.5
Encryption of voice group calls
Word‑p. 110
F.6
Specification of the Key Modification Function (KMF)
G
Generation of VSTK_RAND
|R6|
Word‑p. 111
H
(Normative) Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)
|R13|
Word‑p. 112
H.1
Introduction
H.1.1
General
H.1.2
Considerations on bidding down attacks
H.2
Authentication and key agreement
H.3
Ciphering and integrity mode negotiation
H.4
Protection of GMM messages
Word‑p. 118
H.5
Algorithms for ciphering and integrity protection
Word‑p. 119
H.5.0
General
H.5.1
Null ciphering algorithm
H.5.2
Ciphering algorithm
H.5.2.1
Inputs and outputs
H.5.2.1.1
General
H.5.2.1.2
CONSTANT-F
Word‑p. 120
H.5.2.2
GEA5
H.5.3
Integrity algorithm
H.5.3.1
Inputs and outputs
H.5.3.1.1
General
H.5.3.1.2
INPUT-I
Word‑p. 121
H.5.3.1.3
CONSTANT-F
H.5.3.2
GIA4
Word‑p. 122
H.5.3.3
GIA5
H.6
Derivation of Kc128 and Ki128
H.7
Integrity protection of user plane
H.8
Definition of MAC-GMM in GMM Authentication and Ciphering Request and GMM Authentication and Ciphering Response messages
H.8.1
Inputs and outputs
H.9
Protected negotiation of IOV values
Word‑p. 123
H.9.1
Protected IOV container
H.9.2
LLC XID procedure with protected IOV container
Word‑p. 124
$
Change history
Word‑p. 126