Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 16.1.0
0…
2…
A…
E…
F…
2
Subscriber identity confidentiality
2.1
Generality
2.2
Identifying method
2.3
Procedures
3
Subscriber identity authentication
3.1
Generality
3.2
The authentication procedure
3.3
Subscriber Authentication Key management
4
Confidentiality of signalling information elements, connectionless data and user information elements on physical connections
4.1
Generality
4.2
The ciphering method
4.3
Key setting
4.4
Ciphering key sequence number
4.5
Starting of the ciphering and deciphering processes
4.6
Synchronization
4.7
Handover
4.8
Negotiation of A5 algorithm
4.9
Support of A5 Algorithms in MS
4.10
Support of A5 Algorithms in the BSS
5
Synthetic summary
...
2
Subscriber identity confidentiality
Word‑p. 12
2.1
Generality
2.2
Identifying method
2.3
Procedures
2.3.1
Location updating in the same MSC area
2.3.2
Location updating in a new MSCs area, within the same VLR area
Word‑p. 13
2.3.3
Location updating in a new VLR; old VLR reachable
Word‑p. 14
2.3.4
Location Updating in a new VLR; old VLR not reachable
Word‑p. 15
2.3.5
Reallocation of a new TMSI
Word‑p. 16
2.3.6
Local TMSI unknown
Word‑p. 17
2.3.7
Location updating in a new VLR in case of a loss of information
Word‑p. 18
2.3.8
Unsuccessful TMSI allocation
2.3.9
Combined location area updating with the routing area updating
Word‑p. 19
3
Subscriber identity authentication
Word‑p. 20
3.1
Generality
3.2
The authentication procedure
3.3
Subscriber Authentication Key management
Word‑p. 21
3.3.1
General authentication procedure
3.3.2
Authentication at location updating in a new VLR, using TMSI
Word‑p. 22
3.3.3
Authentication at location updating in a new VLR, using IMSI
Word‑p. 23
3.3.4
Authentication at location updating in a new VLR, using TMSI, TMSI unknown in "old" VLR
Word‑p. 24
3.3.5
Authentication at location updating in a new VLR, using TMSI, old VLR not reachable
Word‑p. 25
3.3.6
Authentication with IMSI if authentication with TMSI fails
3.3.7
Re-use of security related information in failure situations
4
Confidentiality of signalling information elements, connectionless data and user information elements on physical connections
Word‑p. 26
4.1
Generality
4.2
The ciphering method
Word‑p. 27
4.3
Key setting
4.4
Ciphering key sequence number
Word‑p. 28
4.5
Starting of the ciphering and deciphering processes
4.6
Synchronization
Word‑p. 29
4.7
Handover
4.8
Negotiation of A5 algorithm
4.9
Support of A5 Algorithms in MS
Word‑p. 30
4.10
Support of A5 Algorithms in the BSS
|R13|
5
Synthetic summary
Word‑p. 31