Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 18.0.0
0…
2…
A…
E…
F…
A
Security issues related to signalling schemes and key management
A.1
Introduction
A.2
Short description of the schemes
A.3
List of abbreviations
B
Security information to be stored in the entities of the GSM system
B.1
Introduction
B.2
Entities and security information
C
External specifications of security related algorithms
C.0
Scope
C.1
Specifications for Algorithm A5
C.2
Algorithm A3
C.3
Algorithm A8
D
Security related network functions for General Packet Radio Service
D.1
General
D.2
Subscriber identity confidentiality
D.3
Subscriber identity authentication
D.4
Confidentiality of user information and signalling between MS and SGSN
D.5
Synthetic summary
D.6
Security of the GPRS backbone
...
A
Security issues related to signalling schemes and key management
p. 32
A.1
Introduction
p. 32
A.2
Short description of the schemes
p. 32
A.3
List of abbreviations
p. 33
B
Security information to be stored in the entities of the GSM system
p. 47
B.1
Introduction
p. 47
B.2
Entities and security information
p. 47
B.2.1
Home Location Register (HLR)
p. 47
B.2.2
Visitor Location Register (VLR)
p. 47
B.2.3
Mobile services Switching Centre (MSC)/Base Station System (BSS)
p. 47
B.2.4
Mobile Station (MS)
p. 48
B.2.5
Authentication Centre (AuC)
p. 48
C
(Normative) External specifications of security related algorithms
p. 49
C.0
Scope
p. 49
C.1
Specifications for Algorithm A5
p. 49
C.1.1
Purpose
p. 49
C.1.2
Implementation indications
p. 49
C.1.3
External specifications of Algorithm A5
p. 51
C.1.3.1
A5 algorithms with 64-bit keys
|R9|
p. 51
C.1.3.2
A5 algorithms with 128-bit keys
|R9|
p. 51
C.1.4
Internal specification of Algorithm A5
p. 51
C.1.5
Definition of NPBB for different modulations
p. 51
C.2
Algorithm A3
p. 51
C.2.1
Purpose
p. 52
C.2.2
Implementation and operational requirements
p. 52
C.3
Algorithm A8
p. 52
C.3.1
Purpose
p. 52
C.3.2
Implementation and operational requirements
p. 52
D
(Normative) Security related network functions for General Packet Radio Service
p. 53
D.1
General
p. 53
D.2
Subscriber identity confidentiality
p. 53
D.2.1
Generality
p. 53
D.2.2
Identifying method
p. 54
D.2.3
Procedures
p. 54
D.2.3.1
Routing area updating in the same SGSN area
p. 54
D.2.3.2
Routing area updating in a new SGSN; old SGSN reachable
p. 55
D.2.3.3
Routing area updating in a new SGSN; old SGSN not reachable
p. 56
D.2.3.4
Reallocation of a TLLI
p. 56
D.2.3.5
Local TLLI unknown
p. 57
D.2.3.6
Routing area updating in a new SGSN in case of a loss of information
p. 58
D.2.3.7
Unsuccessful TLLI allocation
p. 58
D.3
Subscriber identity authentication
p. 59
D.3.1
Generality
p. 59
D.3.2
The authentication procedure
p. 59
D.3.3
Subscriber Authentication Key management
p. 59
D.3.3.1
General authentication procedure
p. 59
D.3.3.2
Authentication at routing area updating in a new SGSN, using TLLI
p. 60
D.3.3.3
Authentication at routing area updating in a new SGSN, using IMSI
p. 61
D.3.3.4
Authentication at routing area updating in a new SGSN, using TLLI, TLLI unknown in 'old' SGSN
p. 62
D.3.3.5
Authentication at routing area updating in a new SGSN, using TLLI, old SGSN not reachable
p. 63
D.3.3.6
Authentication with IMSI if authentication with TLLI fails
p. 63
D.3.3.7
Re-use of security related information in failure situations
p. 63
D.4
Confidentiality of user information and signalling between MS and SGSN
p. 64
D.4.1
Generality
p. 64
D.4.2
The ciphering method
p. 64
D.4.3
Key setting
p. 64
D.4.4
Ciphering key sequence number
p. 65
D.4.5
Starting of the ciphering and deciphering processes
p. 65
D.4.6
Synchronisation
p. 66
D.4.7
Inter SGSN routing area update
p. 66
D.4.8
Negotiation of GPRS-A5 algorithm
p. 66
D.4.9
Support of GPRS-A5 Algorithms in MS
|R6|
p. 67
D.5
Synthetic summary
p. 68
D.6
Security of the GPRS backbone
p. 68