Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.834  Word version:  16.1.0

Top   Top   None   None   Next
1…   4…

 

1  Scopep. 7

The present document is a study on the remote update of 3GPP long term secret keys held in a SIM / USIM.
It:
  • Identifies which Long Term Keys should be updatable within this proposed feature.
  • Identifies the 3GPP/non 3GPP elements that would be affected by the update of these keys.
  • Identifies the Key Issues relating to the updating of long term keys.
  • Identifies potential requirements for the updating of long term keys.
  • Identifies the applicability of Long Term Key Updating to GSM, UMTS, LTE and 5G and how the requirements may change across these technologies.
  • Identifies solutions for the updating of long term keys.
  • Evaluates solutions for the updating of long term keys.
  • Concludes on the best solutions(s) for the updating of long term keys.
  • Makes recommendations for further work.
This study will consider existing and new solutions that can be used for the update of 3GPP Long Term Keys.
The management of subscriptions is out of scope for the present document.
Up

2  Referencesp. 7

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
GPC_SPE_093: "GlobalPlatform Card Specification v.2.2 Amendment F: Secure Channel Protocol '11'".
[3]
TS 33.102: "3G Security; Security architecture".
[4]
TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
[5]
TS 31.115: "Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications".
[6]
ETSI TS 102 225: "Smart Cards; Secured packet structure for UICC based applications".
[7]
TS 31.102: "Characteristics of the Universal Subscriber Identity Module (USIM) application".
[8]
TS 35.205: "3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*;Document 1: General".
[9]
TS 35.231: "Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification".
[10]
GSMA SGP.22: "RSP Technical Specification".
[11]
GSMA SGP.02: " Remote Provisioning Architecture for Embedded UICC Technical Specification".
[12]
ETSI TS 102 226: "Smart Cards; Remote APDU structure for UICC based applications".
[13]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[14]
TS 31.116: "Remote APDU Structure for (U)SIM Toolkit applications".
[15]
TS 31.111: "Universal Subscriber Identity Module (USIM) Application Toolkit (USAT)".
[16]
TS 33.163: "Battery Efficient Security for very low Throughput Machine Type Communication (MTC) devices (BEST)".
[17]
GSMA SGP.01: "Embedded SIM Remote Provisioning Architecture".
Up

3  Definitions and abbreviationsp. 8

3.1  Definitionsp. 8

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
DEK:
Key used to update USIM OTA keys detailed in ETSI TS 102 226 [12]
eSIM:
A USIM provisioning mechanism specified in GSMA SGP.22 [10] and GSMA SGP.02 [11]
KIC:
OTA ciphering key specified in ETSI TS 102 225 [6]
KID:
OTA digital signing key specified in ETSI TS 102 225 [6]
MILENAGE:
authentication and key generation algorithm as specified in TS 35.205
OP:
128-bit value chosen by the home network operator which is stored in the AuC/HSS that is used with MILENAGE
OPc:
is defined as 128-bit value that is derived from OP and K
OTA:
protocol specified in ETSI TS 102 225 [6]
PoR:
Proof of Receipt as specified in ETSI TS 102 225 [6]
TOP:
128-bit value chosen by the home network operator which is stored in the AuC/HSS that is used with TUAK
TOPc:
is defined as 128-bit value that is derived from TOP and K
TUAK:
authentication and key generation algorithm as specified in TS 35.231
Up

3.2  Abbreviationsp. 9

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
KDF
Key Derivation Function
LTK
Long term Key
M2M
Machine to Machine
MNO
Mobile Network Operator
PKI
Public Key Infrastructure

Up   Top   ToC