Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 18.0.0
0…
2…
A…
E…
F…
E
GSM Cordless Telephony System (CTS), (Phase 1); Security related network functions; Stage 2
E.1
Introduction
E.2
General
E.3
CTS local security system
E.4
CTS supervising security system
E.5
Other CTS security features
E.6
FP Integrity
E.7
Type approval issues
E.8
Security information to be stored in the entities of the CTS
E.9
External specification of security related algorithms
E.10
Coding of the FPAC and CTS-PIN
E.11
Guidelines for generation of random numbers (informative annex)
E
(Normative) GSM Cordless Telephony System (CTS), (Phase 1); Security related network functions; Stage 2
p. 69
E.1
Introduction
p. 69
E.1.1
Scope
p. 69
E.1.2
References
p. 69
E.1.3
Definitions and Abbreviations
p. 69
E.1.3.1
Definitions
p. 69
E.1.3.2
Abbreviations
p. 70
E.2
General
p. 71
E.3
CTS local security system
p. 72
E.3.1
Mobile Subscriber identity confidentiality
p. 72
E.3.1.1
Identifying method
p. 72
E.3.1.2
Procedures
p. 72
E.3.1.2.1
CTSMSI assignment
p. 72
E.3.1.2.2
CTSMSI update
p. 73
E.3.1.2.3
CTS local identification
p. 73
E.3.2
Identity authentication
p. 73
E.3.2.1
The mutual authentication procedure
p. 73
E.3.2.1.1
Authentication failure
p. 74
E.3.2.2
Authentication Key management.
p. 74
E.3.3
Confidentiality of user information and signalling between CTS-MS and CTS-FP
p. 75
E.3.3.1
The ciphering method
p. 75
E.3.3.2
Key setting
p. 75
E.3.3.3
Starting of the ciphering and deciphering processes
p. 76
E.3.3.4
Synchronisation
p. 77
E.3.4
Structured procedures with CTS local security relevance
p. 77
E.3.4.1
Local Part of the Enrolment of a CTS-MS onto a CTS-FP
p. 77
E.3.4.1.1
Local part of the enrolment procedure
p. 77
E.3.4.2
General Access procedure
p. 80
E.3.4.2.1
Attachment
p. 80
E.3.4.2.2
CTS local security data update
p. 81
E.3.4.3
De-enrolment of a CTS-MS
p. 81
E.3.4.3.1
De-enrolment initiated by the CTS-FP
p. 81
E.3.4.3.2
De-enrolment initiated by a CTS-MS
p. 81
E.4
CTS supervising security system
p. 82
E.4.1
Supervision data and supervision data protection
p. 82
E.4.1.1
Structure of supervision data
p. 82
E.4.1.2
Supervision data protection
p. 82
E.4.1.3
Key management
p. 83
E.4.2
CTS subscriber identity
p. 83
E.4.3
Identity authentication with the CTS operator and the PLMN
p. 83
E.4.3.1
Authentication of the CTS-FP
p. 83
E.4.3.2
Authentication of the CTS-MS
p. 84
E.4.4
Secure operation control
p. 85
E.4.4.1
GSM layer 3 signalling
p. 85
E.4.4.2
CTS application signalling via the Fixed Network
p. 85
E.4.4.3
CTS operation control procedures
p. 86
E.4.4.3.1
Initialisation of a CTS-FP
p. 86
E.4.4.3.2
De-initialisation of a CTS-FP
p. 86
E.4.4.3.3
Enrolment
p. 87
E.4.4.3.3.1
Enrolment conducted via the CTS fixed network interface
p. 87
E.4.4.3.4
Supervising security in the CTS-FP/CTS-SN access procedure
p. 88
E.4.4.3.4.1
Update of operation data
p. 88
E.4.5
Equipment checking
p. 89
E.4.6
FP-SIM card checking
p. 89
E.5
Other CTS security features
p. 90
E.5.1
Secure storage of sensitive data and software in the CTS MS
p. 90
E.5.1.1
Inside CTS-ME
p. 90
E.5.2
Secure storage of sensitive data and software in CTS-FP
p. 90
E.5.3
CTS-FP reprogramming protection
p. 90
E.6
FP Integrity
p. 90
E.6.1
Threats
p. 91
E.6.1.1
Changing of FP software
p. 91
E.6.1.2
Changing of IFPEI
p. 92
E.6.1.3
Changing of IFPSI and operator and subscription related keys (KiFP, KOP)
p. 92
E.6.1.4
Changing of timers and timer limits
p. 92
E.6.1.5
Changing of radio usage parameters
p. 92
E.6.2
Protection and storage mechanisms
p. 92
E.6.2.1
Static or semi static values
p. 92
E.6.2.2
Timers
p. 92
E.6.2.3
Physical protection
p. 92
E.7
Type approval issues
p. 92
E.8
Security information to be stored in the entities of the CTS
p. 93
E.8.1
Entities and security information
p. 93
E.8.1.1
CTS-HLR
p. 93
E.8.1.2
CTS-SN
p. 93
E.8.1.3
CTS-AuC
p. 93
E.8.1.4
CTS Fixed Part Equipment (CTS-FPE)
p. 94
E.8.1.5
Fixed Part SIM card (FP-SIM)
p. 94
E.8.1.6
CTS Mobile Equipment (CTS-ME)
p. 94
E.8.1.7
Mobile Station SIM card (MS-SIM)
p. 94
E.9
External specification of security related algorithms
p. 95
E.9.1
Algorithm B1
p. 95
E.9.1.1
Purpose
p. 95
E.9.1.2
Implementation and operational requirements
p. 96
E.9.2
Algorithm B2
p. 96
E.9.2.1
Purpose
p. 96
E.9.2.2
Implementation and operational requirements
p. 96
E.9.3
Algorithms B3 and B4
p. 97
E.9.3.1
Purpose
p. 97
E.9.3.2
Implementation and operational requirements
p. 97
E.9.4
Algorithms B5 and B6
p. 97
E.9.4.1
Purpose
p. 97
E.9.4.2
Implementation and operational requirements
p. 97
E.10
Coding of the FPAC and CTS-PIN
p. 98
E.11
Guidelines for generation of random numbers (informative annex)
p. 98