Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 16.1.0
0…
2…
A…
E…
F…
A
Security issues related to signalling schemes and key management
A.1
Introduction
A.2
Short description of the schemes
A.3
List of abbreviations
B
Security information to be stored in the entities of the GSM system
B.1
Introduction
B.2
Entities and security information
C
External specifications of security related algorithms
C.0
Scope
C.1
Specifications for Algorithm A5
C.2
Algorithm A3
C.3
Algorithm A8
D
Security related network functions for General Packet Radio Service
D.1
General
D.2
Subscriber identity confidentiality
D.3
Subscriber identity authentication
D.4
Confidentiality of user information and signalling between MS and SGSN
D.5
Synthetic summary
D.6
Security of the GPRS backbone
...
A
Security issues related to signalling schemes and key management
Word‑p. 32
A.1
Introduction
A.2
Short description of the schemes
A.3
List of abbreviations
Word‑p. 33
B
Security information to be stored in the entities of the GSM system
Word‑p. 47
B.1
Introduction
B.2
Entities and security information
B.2.1
Home Location Register (HLR)
B.2.2
Visitor Location Register (VLR)
B.2.3
Mobile services Switching Centre (MSC)/Base Station System (BSS)
B.2.4
Mobile Station (MS)
Word‑p. 48
B.2.5
Authentication Centre (AuC)
C
(Normative) External specifications of security related algorithms
Word‑p. 49
C.0
Scope
C.1
Specifications for Algorithm A5
C.1.1
Purpose
C.1.2
Implementation indications
C.1.3
External specifications of Algorithm A5
Word‑p. 51
C.1.3.1
A5 algorithms with 64-bit keys
|R9|
C.1.3.2
A5 algorithms with 128-bit keys
|R9|
C.1.4
Internal specification of Algorithm A5
C.1.5
Definition of NPBB for different modulations
C.2
Algorithm A3
C.2.1
Purpose
Word‑p. 52
C.2.2
Implementation and operational requirements
C.3
Algorithm A8
C.3.1
Purpose
C.3.2
Implementation and operational requirements
D
(Normative) Security related network functions for General Packet Radio Service
Word‑p. 53
D.1
General
D.2
Subscriber identity confidentiality
D.2.1
Generality
D.2.2
Identifying method
Word‑p. 54
D.2.3
Procedures
D.2.3.1
Routing area updating in the same SGSN area
D.2.3.2
Routing area updating in a new SGSN; old SGSN reachable
Word‑p. 55
D.2.3.3
Routing area updating in a new SGSN; old SGSN not reachable
Word‑p. 56
D.2.3.4
Reallocation of a TLLI
D.2.3.5
Local TLLI unknown
Word‑p. 57
D.2.3.6
Routing area updating in a new SGSN in case of a loss of information
Word‑p. 58
D.2.3.7
Unsuccessful TLLI allocation
D.3
Subscriber identity authentication
Word‑p. 59
D.3.1
Generality
D.3.2
The authentication procedure
D.3.3
Subscriber Authentication Key management
D.3.3.1
General authentication procedure
D.3.3.2
Authentication at routing area updating in a new SGSN, using TLLI
Word‑p. 60
D.3.3.3
Authentication at routing area updating in a new SGSN, using IMSI
Word‑p. 61
D.3.3.4
Authentication at routing area updating in a new SGSN, using TLLI, TLLI unknown in 'old' SGSN
Word‑p. 62
D.3.3.5
Authentication at routing area updating in a new SGSN, using TLLI, old SGSN not reachable
Word‑p. 63
D.3.3.6
Authentication with IMSI if authentication with TLLI fails
D.3.3.7
Re-use of security related information in failure situations
D.4
Confidentiality of user information and signalling between MS and SGSN
Word‑p. 64
D.4.1
Generality
D.4.2
The ciphering method
D.4.3
Key setting
D.4.4
Ciphering key sequence number
Word‑p. 65
D.4.5
Starting of the ciphering and deciphering processes
D.4.6
Synchronisation
Word‑p. 66
D.4.7
Inter SGSN routing area update
D.4.8
Negotiation of GPRS-A5 algorithm
D.4.9
Support of GPRS-A5 Algorithms in MS
|R6|
Word‑p. 67
D.5
Synthetic summary
Word‑p. 68
D.6
Security of the GPRS backbone