Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.020
Word version: 18.0.0
0…
2…
A…
E…
F…
F
Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS)
F.1
Introduction
F.2
Security Requirements
F.3
Storage of the Master Group Keys and overview of flows
F.4
Key derivation
F.5
Encryption of voice group calls
F.6
Specification of the Key Modification Function (KMF)
G
Generation of VSTK_RAND
H
Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)
H.1
Introduction
H.2
Authentication and key agreement
H.3
Ciphering and integrity mode negotiation
H.4
Protection of GMM messages
H.5
Algorithms for ciphering and integrity protection
H.6
Derivation of Kc128 and Ki128
H.7
Integrity protection of user plane
H.8
Definition of MAC-GMM in GMM Authentication and Ciphering Request and GMM Authentication and Ciphering Response messages
H.9
Protected negotiation of IOV values
$
Change history
F
(Normative) Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS)
|R6|
p. 99
F.1
Introduction
p. 99
F.1.1
Scope
p. 99
F.1.2
References
p. 99
F.1.3
Definitions and Abbreviations
p. 100
F.1.3.1
Definitions
p. 100
F.1.3.2
Abbreviations
p. 100
F.2
Security Requirements
p. 100
F.3
Storage of the Master Group Keys and overview of flows
p. 101
F.3.1
Distribution of ciphering data during establishment of a voice/broadcast group call
p. 101
F.3.2
Signalling information required for the voice group call uplink access in the anchor MSC (normal case, subsequent talker on dedicated channel)
p. 104
F.3.3
Signalling information required to transfer the originator or subsequent talker from a dedicated channel to a group call channel
p. 106
F.4
Key derivation
p. 106
F.4.1
Key derivation within the USIM / GCR
p. 107
F.4.2
Key derivation within the ME/BSS
p. 108
F.4.3
Encryption algorithm selection
p. 109
F.4.4
Algorithm requirements
p. 109
F.4.4.1
A8_V
p. 109
F.4.4.2
KMF
p. 109
F.5
Encryption of voice group calls
p. 110
F.6
Specification of the Key Modification Function (KMF)
p. 110
G
Generation of VSTK_RAND
|R6|
p. 111
H
(Normative) Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT)
|R13|
p. 112
H.1
Introduction
p. 112
H.1.1
General
p. 112
H.1.2
Considerations on bidding down attacks
p. 112
H.2
Authentication and key agreement
p. 112
H.3
Ciphering and integrity mode negotiation
p. 112
H.4
Protection of GMM messages
p. 118
H.5
Algorithms for ciphering and integrity protection
p. 119
H.5.0
General
p. 119
H.5.1
Null ciphering algorithm
p. 119
H.5.2
Ciphering algorithm
p. 119
H.5.2.1
Inputs and outputs
p. 119
H.5.2.1.1
General
p. 119
H.5.2.1.2
CONSTANT-F
p. 120
H.5.2.2
GEA5
p. 120
H.5.3
Integrity algorithm
p. 120
H.5.3.1
Inputs and outputs
p. 120
H.5.3.1.1
General
p. 120
H.5.3.1.2
INPUT-I
p. 121
H.5.3.1.3
CONSTANT-F
p. 121
H.5.3.2
GIA4
p. 122
H.5.3.3
GIA5
p. 122
H.6
Derivation of Kc128 and Ki128
p. 122
H.7
Integrity protection of user plane
p. 122
H.8
Definition of MAC-GMM in GMM Authentication and Ciphering Request and GMM Authentication and Ciphering Response messages
p. 122
H.8.1
Inputs and outputs
p. 122
H.9
Protected negotiation of IOV values
p. 123
H.9.1
Protected IOV container
p. 123
H.9.2
LLC XID procedure with protected IOV container
p. 124
$
Change history
p. 126