Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.303
Word version: 18.0.0
1…
4…
A…
A
Key derivation functions
E
Key Request and Response messages
F
Network options for PC3 security
G
Protection of Restricted Discovery and Public Safety Discovery messages
$
Change history
A
(Normative) Key derivation functions
p. 66
A.1
KDF interface and input parameter construction
p. 66
A.1.1
General
p. 66
A.1.2
FC value allocations
p. 66
A.2
Calculation of the MIC value
p. 66
A.3
Calculation of PTK
p. 66
A.4
Calculation of keys from PTK and KD-sess
p. 67
A.5
Calculation of scrambling bits for discovery
p. 67
A.6
Calculation of message-specific confidentiality keystream for discovery
p. 67
A.7
Calculation of KD for UE-to-network relays
p. 68
A.8
Calculation of discovery keys from PSDK
p. 68
B
Void
C
Void
D
Void
E
(Normative) Key Request and Response messages
p. 73
E.1
Introduction
p. 73
E.2
Transport protocol for messages between UE and ProSe Key Management Function
p. 73
E.3
XML Schema
p. 73
E.4
Semantics
p. 77
E.4.1
General
p. 77
E.4.2
Semantics of <KEY_REQUEST>
p. 77
E.4.3
Semantics of <KEY_RESPONSE>
p. 78
E.5
General message format and information elements coding
p. 80
E.5.2
-
p. 80
E.5.2.2
Parameters in ProSe key management messages
p. 80
E.5.2.2.1
Transaction ID
p. 80
E.5.2.2.2
Supported Algorithm
p. 81
E.5.2.2.3
Group ID
p. 81
E.5.2.2.4
PGK ID
p. 81
E.5.2.2.5
Error Code
p. 81
E.5.2.2.6
Group Member ID
p. 82
E.5.2.2.7
Algorithm Info
p. 82
E.5.2.2.8
PMK ID
p. 82
E.5.2.2.9
PMK
p. 82
E.5.2.2.10
PRUK ID
p. 82
E.5.2.2.11
PRUK
p. 82
E.5.2.2.12
IMSI
p. 82
E.5.2.2.13
Relay Service Code
p. 83
E.5.2.2.14
MSISDN
p. 83
E.5.2.2.15
Nonce 1
p. 83
E.5.2.2.16
RAND
p. 83
E.5.2.2.17
AUTS
p. 83
E.5.2.2.18
Key KD
p. 83
E.5.2.2.19
KD Freshness parameter
p. 83
E.5.2.2.20
GPI
p. 83
E.5.2.2.21
Remote UE other identity
p. 83
E.5.2.2.22
Public Safety Discovery Security Capabilities
p. 83
E.5.2.2.23
Relay Service Code
p. 84
E.5.2.2.24
PSDK ID
p. 84
E.5.2.2.25
Discovery Group ID
p. 84
E.5.2.2.26
Protection Profile
p. 84
E.5.2.2.27
Encrypted bit mask
p. 84
E.5.2.2.28
Key Type ID
p. 84
E.5.2.2.29
Current time
p. 85
E.5.2.2.30
Max Offset
p. 85
F
Network options for PC3 security
p. 85
F.1
General
p. 85
F.2
Prose Function using standalone BSF
p. 85
F.3
BSF - Prose Function/NAF colocation
p. 86
F.4
Prose Function with bootstrapping entity
p. 87
G
Protection of Restricted Discovery and Public Safety Discovery messages
p. 88
G.1
General
p. 88
G.2
Different combinations of security mechanisms
p. 89
$
Change history
p. 90