Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.110
Word version: 18.0.0
0…
4…
4
Key Establishment between a UICC and a terminal
4.1
Reference model
4.2
Network elements
4.3
Key establishment architecture and reference points
4.4
General requirements and principles for key establishment between a UICC and a Terminal
4.5
Procedures
A
Key Derivation Function definition
A.1
Ks_local key derivation in key establishment
A.2
Input parameters for Ks_local key derivation
B
Key establishment UICC-Terminal interface
B.1
Local Key Establishment: Key Derivation procedure
B.2
Local Key Establishment: Key Availability Check procedure
C
HTTP based key request procedure
C.1
Introduction
C.2
Key request procedure
D
Signalling flows for key request procedure
D.1
Introduction
D.2
Signalling flow demonstrating a successful key request procedure
E
XML schema for Key Request and Key Response
E.1
Introduction
E.2
Key Request Format
E.3
Key Response Format
F
TLS profiles
F.1
TLS profile for certificate based mutual authentication between Terminal and NAF Key Center
F.2
TLS profile for Shared key-based mutual authentication between Terminal and NAF Key Center
$
Change history
4
Key Establishment between a UICC and a terminal
p. 8
4.1
Reference model
p. 8
4.2
Network elements
p. 9
4.2.1
NAF Key Center
p. 9
4.3
Key establishment architecture and reference points
p. 9
4.3.1
Reference points
p. 9
4.3.2
Reference point Ub
p. 9
4.3.3
Reference point Ua
p. 9
4.4
General requirements and principles for key establishment between a UICC and a Terminal
p. 10
4.4.1
General requirements
p. 10
4.4.2
Requirements on the terminal
p. 10
4.4.3
Requirements on the UICC hosting device
p. 10
4.4.4
Requirements on the UICC
p. 10
4.4.5
Requirements on the NAF Key Center
p. 11
4.4.6
Requirements on Ks_local key and associated parameters handling
p. 11
4.5
Procedures
p. 11
4.5.1
Initiation of key establishment between a UICC and a Terminal
p. 11
4.5.2
Key establishment procedure
p. 12
A
(Normative) Key Derivation Function definition
p. 16
A.1
Ks_local key derivation in key establishment
p. 16
A.2
Input parameters for Ks_local key derivation
p. 16
B
(Normative) Key establishment UICC-Terminal interface
p. 17
B.1
Local Key Establishment: Key Derivation procedure
p. 17
B.2
Local Key Establishment: Key Availability Check procedure
p. 18
C
(Normative) HTTP based key request procedure
p. 19
C.1
Introduction
p. 19
C.2
Key request procedure
p. 19
C.2.1
Key request
p. 19
C.2.2
Error situations
p. 20
D
Signalling flows for key request procedure
p. 21
D.1
Introduction
p. 21
D.2
Signalling flow demonstrating a successful key request procedure
p. 21
E
(Normative) XML schema for Key Request and Key Response
p. 24
E.1
Introduction
p. 24
E.2
Key Request Format
p. 24
E.2.1
Data Format
p. 24
E.2.2
Example
p. 24
E.3
Key Response Format
p. 25
E.3.1
Data Format
p. 25
E.3.2
Example
p. 25
F
(Normative) TLS profiles
p. 26
F.1
TLS profile for certificate based mutual authentication between Terminal and NAF Key Center
p. 26
F.1.1
Introduction
p. 26
F.1.2
Protection mechanisms
p. 26
F.2
TLS profile for Shared key-based mutual authentication between Terminal and NAF Key Center
p. 26
F.2.1
Introduction
p. 26
F.2.2
Protection mechanisms
p. 26
$
Change history
p. 28