Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 33.200
3G Security –
Network Domain Security (NDS) –
Mobile Application Part (MAP) Application Layer Security
3GPP‑Page
ETSI‑search
ToC
↓
V6.1.0 (PDF)
2005/04 24 p.
V5.1.0
2002/12 21 p.
V4.3.0
2002/03 21 p.
Rapporteur:
Dr. Escott, Adrian
full Table of Contents for
TS 33.200
Word version: 6.1.0
0
Introduction
p. 4
1
Scope
p. 5
2
References
p. 5
3
Definitions, symbols and abbreviations
p. 5
3.1
Definitions
p. 5
3.2
Symbols
p. 6
3.3
Abbreviations
p. 6
3.4
Conventions
p. 6
4
Principles of MAP application layer security
p. 7
5
MAP security (MAPsec)
p. 7
5.1
Security services provided by MAPsec
p. 7
5.2
Properties and tasks of MAPsec enabled network elements
p. 7
5.3
Policy requirements for the MAPsec Security Policy Database (SPD)
p. 8
5.4
MAPsec security association attribute definition
p. 8
5.5
MAPsec structure of protected messages
p. 9
5.5.1
MAPsec security header
p. 10
5.5.2
Protected payload
p. 10
5.5.2.1
Protection Mode 0
p. 10
5.5.2.2
Protection Mode 1
p. 10
5.5.2.3
Protection Mode 2
p. 11
5.6
MAPsec algorithms
p. 11
5.6.1
Mapping of MAPsec-SA encryption algorithm identifiers
p. 11
5.6.1.1
Description of MEA-1
p. 11
5.6.2
Mapping of MAPsec-SA integrity algorithm identifiers
p. 11
5.6.2.1
Description of MIA-1
p. 11
5.6.3
Construction of IV
p. 12
6
MAPsec protection profiles
p. 12
6.1
Granularity of protection
p. 12
6.2
MAPsec protection groups
p. 12
6.2.1
MAPsec protection groups
p. 12
6.2.1.1
MAP-PG(0) - No Protection
p. 12
6.2.1.2
MAP-PG(1) - Protection for Reset
p. 13
6.2.1.3
MAP-PG(2) - Protection for Authentication Information except Handover Situations
p. 13
6.2.1.4
MAP-PG(3) - Protection for Authentication Information in Handover Situations
p. 13
6.2.1.5
MAP-PG(4) - Protection of non location dependant HLR data
p. 14
6.3
MAPsec protection profiles
p. 14
A
Guidelines for manual key management
p. 15
A.1
Inter-domain Security Association and Key Management Procedures
p. 15
A.2
Local Security Association Distribution
p. 15
B
(Normative) MAPsec message flows
p. 16
C
(Normative) Using TCAP handshake for SMS transfer
p. 19
C.1
Mobile Terminated SMS
p. 19
C.2
Mobile Originated SMS
p. 20
$
Change History
p. 22