Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 18.0.0
0…
2…
A…
E…
F…
2
Subscriber identity confidentiality
2.1
Generality
2.2
Identifying method
2.3
Procedures
3
Subscriber identity authentication
3.1
Generality
3.2
The authentication procedure
3.3
Subscriber Authentication Key management
4
Confidentiality of signalling information elements, connectionless data and user information elements on physical connections
4.1
Generality
4.2
The ciphering method
4.3
Key setting
4.4
Ciphering key sequence number
4.5
Starting of the ciphering and deciphering processes
4.6
Synchronization
4.7
Handover
4.8
Negotiation of A5 algorithm
4.9
Support of A5 Algorithms in MS
4.10
Support of A5 Algorithms in the BSS
5
Synthetic summary
...
2
Subscriber identity confidentiality
p. 12
2.1
Generality
p. 12
2.2
Identifying method
p. 12
2.3
Procedures
p. 12
2.3.1
Location updating in the same MSC area
p. 12
2.3.2
Location updating in a new MSCs area, within the same VLR area
p. 13
2.3.3
Location updating in a new VLR; old VLR reachable
p. 14
2.3.4
Location Updating in a new VLR; old VLR not reachable
p. 15
2.3.5
Reallocation of a new TMSI
p. 16
2.3.6
Local TMSI unknown
p. 17
2.3.7
Location updating in a new VLR in case of a loss of information
p. 18
2.3.8
Unsuccessful TMSI allocation
p. 18
2.3.9
Combined location area updating with the routing area updating
p. 19
3
Subscriber identity authentication
p. 20
3.1
Generality
p. 20
3.2
The authentication procedure
p. 20
3.3
Subscriber Authentication Key management
p. 21
3.3.1
General authentication procedure
p. 21
3.3.2
Authentication at location updating in a new VLR, using TMSI
p. 22
3.3.3
Authentication at location updating in a new VLR, using IMSI
p. 23
3.3.4
Authentication at location updating in a new VLR, using TMSI, TMSI unknown in "old" VLR
p. 24
3.3.5
Authentication at location updating in a new VLR, using TMSI, old VLR not reachable
p. 25
3.3.6
Authentication with IMSI if authentication with TMSI fails
p. 25
3.3.7
Re-use of security related information in failure situations
p. 25
4
Confidentiality of signalling information elements, connectionless data and user information elements on physical connections
p. 26
4.1
Generality
p. 26
4.2
The ciphering method
p. 27
4.3
Key setting
p. 27
4.4
Ciphering key sequence number
p. 28
4.5
Starting of the ciphering and deciphering processes
p. 28
4.6
Synchronization
p. 29
4.7
Handover
p. 29
4.8
Negotiation of A5 algorithm
p. 29
4.9
Support of A5 Algorithms in MS
p. 30
4.10
Support of A5 Algorithms in the BSS
|R13|
p. 30
5
Synthetic summary
p. 31