Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 35.205
Word version: 18.0.0
0…
2…
2
References
3
Abbreviations
4
Structure of this report
5
Background to the 3GPP Authentication and Key Generation algorithms
6
SAGE 3GPP AF TF work plan
7
Outline of algorithm requirements specification
8
Algorithms design
9
Algorithm evaluation
10
Release of algorithm specification and test data by SAGE
$
Change History
2
References
p. 5
3
Abbreviations
p. 6
4
Structure of this report
p. 7
5
Background to the 3GPP Authentication and Key Generation algorithms
p. 7
6
SAGE 3GPP AF TF work plan
p. 7
7
Outline of algorithm requirements specification
p. 8
7.1
The authentication and key generation functions
p. 8
7.2
Use of the algorithms on the AuC side
p. 8
7.3
Use of the algorithms in the USIM
p. 9
7.4
Use of the algorithms for resynchronisation in the USIM
p. 9
7.5
Use of the algorithms for resynchronisation in the HLR/AuC
p. 9
7.6
Implementation aspects
p. 9
7.7
Generic requirements for 3GPP cryptographic functions and algorithms
p. 10
7.8
Subsequent requirements on the authentication and key generation functions
p. 10
8
Algorithms design
p. 11
8.1
Design criteria
p. 11
8.2
Chosen design for the framework
p. 11
8.3
Analysis of the role of OP and OPc
p. 12
8.4
Choice of kernel
p. 12
8.5
Design methodology
p. 12
8.6
Specification and test data
p. 13
9
Algorithm evaluation
p. 13
9.1
Evaluation criteria
p. 13
9.2
Mathematical Evaluation of the modes
p. 13
9.3
Statistical Evaluation
p. 13
9.4
Side channel attacks evaluation
p. 14
9.5
Complexity evaluation
p. 14
9.6
Evaluation report
p. 14
10
Release of algorithm specification and test data by SAGE
p. 14
10.1
SAGE 3GPP AF TF approval for release
p. 14
10.2
Publication of the algorithm set specification
p. 14
10.3
Export of the algorithm set specification
p. 14
$
Change History
p. 15