Specification of the 3GPP Confidentiality and Integrity Algorithms | ||
TS 35.201 | REL 3 → 18 | Document 1: f8 and f9 Specification |
TS 35.202 | REL 3 → 18 | Document 2: Kasumi Specification |
TS 35.203 | REL 3 → 18 | Document 3: Implementors' Test Data |
TS 35.204 | REL 3 → 18 | Document 4: Design Conformance Test Data |
Specification of the MILENAGE Algorithm Set:
an example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5* | ||
TS 35.205 | REL 4 → 18 | Document 1: f8 and f9 Specification |
TS 35.206 | REL 4 → 18 | Document 2: Algorithm Specification |
TS 35.207 | REL 4 → 18 | Document 3: Implementors' Test Data |
TS 35.208 | REL 4 → 18 | Document 4: Design Conformance Test Data |
TR 35.909 | REL 4 → 18 | Document 5: Summary and Results of Design and Evaluation |
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2 | ||
TS 35.215 | REL 7 → 18 | Document 1: UEA2 and UIA2 Specifications |
TS 35.216 | REL 7 → 18 | Document 2: SNOW 3G Specification |
TS 35.217 | REL 7 → 18 | Document 3: Implementors' Test Data |
TS 35.218 | REL 7 → 18 | Document 4: Design Conformance Test Data |
TR 35.919 | REL 7 → 18 | Document 5: Design and Evaluation Report |
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 and EIA3 | ||
TS 35.221 | REL 11 → 18 | Document 1: EEA3 and EIA3 Specifications |
TS 35.222 | REL 11 → 18 | Document 2: ZUC Specification |
TS 35.223 | REL 11 → 18 | Document 3: Implementors' Test Data |
TR 35.924 | REL 11 → 18 | Document 4: Design and Evaluation Report |
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5* | ||
TS 35.231 | REL 12 → 18 | Document 1: Algorithm Specification |
TS 35.232 | REL 12 → 18 | Document 2: Implementers' Test Data |
TS 35.233 | REL 12 → 18 | Document 3: Design Conformance Test Data |
TR 35.934 | REL 12 → 18 | Document 4: Report on the Design and Evaluation |
TR 35.935 | REL 12 → 18 | Document 5: Performance Evaluation |
TR 35.936 | REL 12 → 18 | Document 6: Security Assessment |
Specification of the Snow 5G based 256-bits algorithm set:
Specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G | ||
TS 35.240 | REL 18 | Document 1: Algorithm Specification |
TS 35.241 | REL 18 | Document 2: Implementation Test Data |
TS 35.242 | REL 18 | Document 3: Design Conformance Test Data |
Specification of the AES based 256-bits algorithm set:
Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G | ||
TS 35.243 | REL 18 | Document 1: Algorithm Specification |
TS 35.244 | REL 18 | Document 2: Implementation Test Data |
TS 35.245 | REL 18 | Document 3: Design Conformance Test Data |
Specification of the ZUC based 256-bits algorithm set:
Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G | ||
TS 35.246 | REL 18 | Document 1: Algorithm Specification |
TS 35.247 | REL 18 | Document 2: Implementation Test Data |
TS 35.248 | REL 18 | Document 3: Design Conformance Test Data |