Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.259
Word version: 18.0.0
0…
4…
4
Key Establishment between a UICC Hosting Device and a Remote Device
A
Key Derivation Function definition
B
HTTP based key request procedure
C
Signalling flows for key request procedure
D
XML schema for Key Request and Key Response
E
TLS profiles
F
Application specific key (Ks_local_device_appl)
G
Application specific key (Ks_local_device_appl): Key Derivation Function definition
$
Change history
4
Key Establishment between a UICC Hosting Device and a Remote Device
p. 8
4.1
Reference model
p. 8
4.2
Network elements
p. 9
4.2.1
General
p. 9
4.2.2
NAF Key Centre
p. 9
4.3
Key establishment architecture and reference points
p. 9
4.3.1
General
p. 9
4.3.2
Reference point Ub
p. 9
4.3.3
Reference point Ua
p. 9
4.3.4
Reference point Local interface
p. 10
4.4
Requirements and principles for key establishment between a UICC Hosting Device and a Remote Device
p. 10
4.4.1
General requirements
p. 10
4.4.2
Requirements on the Remote Device
p. 10
4.4.3
Requirements on the UICC Hosting Device
p. 10
4.4.4
Requirements on the UICC
p. 11
4.4.5
Requirements on the NAF Key Centre
p. 11
4.4.6
Requirements on Ks_local_device key and associated parameters handling in Remote Device
p. 11
4.4.7
Requirements on Ks_local_device key and associated parameters handling in UICC Hosting Device
p. 12
4.5
Procedures
p. 12
4.5.1
Initiation of key establishment between a UICC Hosting Device and a Remote Device
p. 12
4.5.2
Key establishment procedure
p. 13
A
(Normative) Key Derivation Function definition
p. 17
A.1
Platform specific key (Ks_local_device): Ks_local_device key derivation in key establishment
p. 17
A.2
Input parameters for Ks_local_device key derivation
p. 17
B
(Normative) HTTP based key request procedure
p. 18
B.1
Introduction
p. 18
B.2
Key request procedure
p. 18
B.2.1
Key request
p. 18
B.2.2
Error situations
p. 19
C
Signalling flows for key request procedure
p. 20
C.1
Introduction
p. 20
C.2
Signalling flow demonstrating a successful key request procedure
p. 20
D
(Normative) XML schema for Key Request and Key Response
p. 23
D.1
Introduction
p. 23
D.2
Key Request Format
p. 23
D.2.1
Data Format
p. 23
D.2.2
Example
p. 23
D.3
Key Response Format
p. 24
D.3.1
Data Format
p. 24
D.3.2
Example
p. 24
E
(Normative) TLS profiles
p. 25
F
Application specific key (Ks_local_device_appl)
p. 26
F.1
Example of Ks_local_device_appl key derivation in key establishment
p. 26
G
Application specific key (Ks_local_device_appl): Key Derivation Function definition
p. 27
G.1
Ks_local_device_appl key derivation in key establishment
p. 27
G.2
Input parameters for Ks_local_device_appl key derivation
p. 27
$
Change history
p. 28