Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 35.232  Word version:  17.0.0

Top   Top   None   None   Next
0…   2…

 

0  Introductionp. 4

The present document is second of three, which between them form the entire specification of the example algorithms, entitled:
  • 3GPP TS 35.231: "Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation Functions f1, f1*, f2, f3, f4, f5 and f5*;
    Document 1: Algorithm specification ".
  • 3GPP TS 35.232: " Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*;
    Document 2: Implementers' test data".
  • 3GPP TS 35.233: "specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*;
    Document 3: Design conformance test data".
Up

1  Scopep. 5

The present document and the other Technical Specifications in the series, TS 35.231 and TS 35.233, contain an example set of algorithms which could be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* for 3GPP systems. In particular, the present document defines the test data:
  • for the Keccak permutation used within Tuak,
  • for the authentication algorithms f1 and f1*,
  • for the algorithms f2, f3, f4, f5 and f5*.
Up

Up   Top   ToC