For the purposes of the present document, the following terms and definitions apply:
ISIM:
application residing on the UICC, an IC card specified in
TS 31.101
In particular,
TS 31.101 specifies the application independent properties of the UICC/terminal interface such as the physical characteristics and the logical structure
The AID of ISIM is defined in ETSI TS 101 220 [23] and is stored in EFDIR.
ADM:
access condition to an EF which is under the control of the authority which creates this file
For the purposes of the present document, the following symbols apply:
||
Concatenation
⊕
Exclusive or
f1
Message authentication function used to compute MAC
f1*
A message authentication code (MAC) function with the property that no valuable information can be inferred from the function values of f1* about those of f1, ... , f5 and vice versa
f2
Message authentication function used to compute RES and XRES
f3
Key generating function used to compute CK
f4
Key generating function used to compute IK
f5
Key generating function used to compute AK
For the purposes of the present document, the following abbreviations apply:
3GPP
3rd Generation Partnership Project
AC
Access Condition
ADF
Application Dedicated File
AID
Application IDentifier
AK
Anonymity Key
AKA
Authentication and Key Agreement
ALW
ALWays
AMF
Authentication Management Field
ASN.1
Abstract Syntax Notation One
AuC
Authentication Centre
AUTN
AUthentication TokeN
BER-TLV
Basic Encoding Rule - TLV
B-TID
Bootstrapping Transaction IDentifier
CK
Cipher Key
DF
Dedicated File
EF
Elementary File
FFS
For Further Study
FQDN
Fully Qualified Domain Name
HE
Home Environment
HN
Home Network
IARI
IMS Application Reference Identifier
ICC
Integrated Circuit Card
ID
IDentifier
IK
Integrity Key
IM
IP Multimedia
IMPI
IM Private Identity
IMPU
IM PUblic identity
IMS
IP Multimedia Subsystem
ISIM
IM Services Identity Module
K
long-term secret Key shared between the ISIM and the AuC
KSI
Key Set Identifier
LI
Language Indication
LSB
Least Significant Bit
MAC
Message Authentication Code
MCData
Mission Critical Data
MCPTT
Mission Critical Push To Talk
MCS
Mission Critical Services
MCVideo
Mission Critical Video
MF
Master File
MiD
Multi-iDentity
MSB
Most Significant Bit
MuD
Multi-Device
NAI
Network Access Identifier
NEV
NEVer
PIN
Personal Identification Number
PL
Preferred Languages
PS_DO
PIN Status Data Object
RAND
RANDom challenge
RES
user RESponse
RFU
Reserved for Future Use
RST
ReSeT
SDP
Session Description Protocol
SFI
Short EF Identifier
SIP
Session Initiation Protocol
SQN
SeQuence Number
SW
Status Word
TLV
Tag Length Value
UE
User Equipment
WebRTC
Web Real-Time Communication
WWSF
WebRTC Web Server Function
XRES
eXpected user RESponse
The following coding conventions apply to the present document.
All lengths are presented in bytes, unless otherwise stated. Each byte is represented by bits b8 to b1, where b8 is the most significant bit (MSB) and b1 is the least significant bit (LSB). In each representation, the leftmost bit is the MSB.
The coding of Data Objects in the present document is according to
TS 31.101.
'XX':
Single quotes indicate hexadecimal values. Valid elements for hexadecimal values are the numbers '0' to '9' and 'A' to 'F'.