id
stringlengths
5
12
title
stringlengths
8
250
type
stringclasses
2 values
version
stringclasses
560 values
working_group
stringclasses
30 values
url
stringlengths
67
81
scope
stringlengths
0
65.7k
33.528
Security Assurance Specification (SCAS) for the Policy Control Function (PCF)
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.528/33528-j00.zip
33.529
Security Assurance Specification (SCAS) for the Short Message Service Function (SMSF) network product class
TS
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.529/33529-j10.zip
The present document contains objectives, security assurance requirements and test cases specific to the SMSF network product class. It refers to the Catalogue of General Security Assurance Requirements. It formulates specific adaptations of the requirements and test cases given in the catalogue. It also specifies requ...
33.530
Security Assurance Specification (SCAS) for the Unified Data Repository (UDR)
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.530/33530-j00.zip
The present document contains requirements and test cases that are specific to the UDR network product class. It refers to the Catalogue of General Security Assurance Requirements [2] and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases uniq...
33.533
Security aspects of ranging based services and sidelink positioning
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.533/33533-j00.zip
33.535
Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.535/33535-j00.zip
33.536
Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.536/33536-j00.zip
33.537
Security Assurance Specification (SCAS) for the Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF)
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.537/33537-j00.zip
The present document contains requirements and test cases that are specific to the AAnF network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique ...
33.545
Security aspects of NR Femto
TS
19.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.545/33545-j30.zip
33.558
Security aspects of enhancement of support for enabling edge applications
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.558/33558-j00.zip
The present document specifies the security features and mechanisms to support the application architecture for enabling Edge Applications in 5G, i.e. security for the interfaces, procedures for the authentication and authorization between the entities of the application architecture, and procedures for the EES capabil...
33.700-22
Study on security aspects of Common API Framework (CAPIF) Phase3
TR
19.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.700-22/33700-22-j20.zip
33.700-29
Study on security aspects of 5G satellite access in the 5G architecture phase 3
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.700-29/33700-29-j10.zip
The present document studies the security and privacy aspects of 5G satellite access phase 3. It is comprised of the following parts: - Identify and study the security and privacy key issues of the regenerative payload generic architecture in 5GS/EPS. - Identify and study the security and privacy key issues of the Stor...
33.700-32
Study on security aspects of user identities and authentication
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.700-32/33700-32-j10.zip
The present document studies the security and privacy aspects for the creation and usage of user identities as studied in 3GPP TR 23.700-32 [2], with the following focus: 1) Study authentication and authorization of: a) a user identifier associated with a subscription and used on a UE (i.e., human user) and b) an ident...
33.700-41
Study on enabling a cryptographic algorithm transition to 256bits
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.700-41/33700-41-j00.zip
The present document aims to address key requirements for introducing support for 256-bit symmetric algorithms into the 5G System as well as the coexistence of 128-bit and 256-bit cryptographic algorithms. Considering findings and conclusions from preceding work, the following points should be addressed as part of the ...
33.701
Study on mitigations against bidding down Attacks
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.701/33701-j00.zip
The present document focuses on mitigating bidding down attack, i.e. how to prevent UEs that are currently connected to LTE/5G from establishing a connection with a GERAN/UTRAN FBS considering for example the decommissioning of GERAN and UTRAN networks. In particular, the present document aims at: - Identifying attack ...
33.702
Security for mobility over non-3GPP access to avoid full primary authentication
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.702/33702-j00.zip
The following objectives are studied in the present document: - Study the security aspects and procedure enhancements needed to support UE connecting to a new target TNAP within the same TNGF without performing full primary authentication. - Study the security aspects and procedure enhancements needed to support AUN3 c...
33.713
Study on security aspects of Ambient Internet of Things (AIoT) Services in 5G
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.713/33713-j00.zip
33.721
Study on security aspects of 5G mobile metaverse services
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.721/33721-j10.zip
33.727
Lawful Intercept Handling of Protected Services
TR
0.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.727/33727-001.zip
Offering communication services with end-to-end (E2E) cryptographic protection is becoming more desirable and more common. 3GPP-defined services (such as those of the IMS framework) have so far largely relied on trustworthy network infrastructure, complemented by strong cryptographic access security and hop-by-hop prot...
33.743
Study on Security Aspects of Enhancement for Proximity-based Services (ProSe) in the 5G System (5GS) phase 3
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.743/33743-j00.zip
The present document investigates and identifies the security (including privacy) threats, corresponding security (including privacy) requirements and potential solutions for Proximity Based Services (ProSe) in 5G System (5GS) phase 3, based on the architecture and system level enhancements studied in TR 23.700-03 [1],...
33.745
Study on security aspects of 5G Next Radio (NR) Femto
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.745/33745-j10.zip
The present document studies the potential security enhancements for supporting 5G NR Femto. More specifically, the study investigates potential security enhancements in the following areas: - With the gap analysis, study the potential updates or enhancements needed for 5G NR Femto over TS 33.320[2]. - Study the securi...
33.749
Study on security aspects of enhancement of support for edge computing in the 5G Core (5GC) phase 3
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.749/33749-j00.zip
The present document studies the security enhancements on the support for Edge Computing in the 5G Core network defined in TR 23.700-49 [2], and enhanced architecture for enabling Edge Applications defined in TS 23.558 [3]. Specifically, the present document focuses on the following: 1) Study the security aspects on th...
33.754
Study on security aspects for multi-access(DualSteer +Access Traffic Steering, Switch and Splitting support in the 5G system architecture phase 4 (ATSSS Ph-4)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.754/33754-j00.zip
The present document aims to address the security aspects of Multi-Access, focusing on DualSteer devices and ATSSS Phase 4 (ATSSS Ph-4) enhancements, as identified in the FS_MASSS study in TR 23.700-54 [2]. The scope of this study includes the following key areas: - Examine the security implications of a simplified arc...
33.757
Study on security for a PLMN hosting a Non-Public Network (NPN)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.757/33757-j00.zip
The present document studies the security when a PLMN hosts an NPN with dedicated NFs deployed in the customer domain. A NPN customer may deploy on-premises NFs, or hosted NFs which reside in third-party premises, or both. A PLMN hosting an NPN is an example of a Public Network Integrated NPN (PNI-NPN). The term PNI-NP...
33.759
Study on security enhancements of Uncrewed Aerial Systems (UAS) Phase 3
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.759/33759-j00.zip
The present document identifies potential security and privacy issues and provides potential security solutions to support additional scenarios and requirements for UAV (Uncrewed Aerial Vehicle) and UAM (Urban Air Mobility) including: - identify potential security issues and provide solutions for the enhanced NEF servi...
33.766
Study on security aspects of energy savings in 5G
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.766/33766-j00.zip
The present document studies the security and privacy aspects of energy savings. More especially the document: - Identifies key issues concerning the privacy and security aspects of collecting energy related information. - Identifies key issues concerning the privacy and security impacts of exposure of energy related i...
33.776
Study of Automatic Certificate Management Environment (ACME) for the Service Based Architecture (SBA)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.776/33776-j00.zip
The scope of this document is to identify key issues and study solutions addressed using ACME for automated certificate management in SBA. Areas of study include: - Automated certificate management protocol and procedures for certificate life cycle events (i.e., enrolment,  renewal, and revocation) within 5G SBA (i.e.,...
33.784
Study on security aspects of core network enhanced support for Artificial Intelligence/Machine Learning (AI/ML)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.784/33784-j00.zip
The present document studies the security aspects of enablers for network automation for the 5G system based on the outcome of TR 38.843[2] and TR 23.700-84[3]. More specifically, this document identifies security issues and requirements and provides corresponding security solutions related to the following scenarios: ...
33.790
Study on the security support for the next generation real time communication services phase 2
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.790/33790-j10.zip
33.794
Study on enablers for Zero Trust Security
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.794/33794-j10.zip
The present document studies enablers for Zero-Trust Security in the 5G System. The document specifically includes security analysis with recommendations, key issues, potential security requirements and solutions with respect to the following objectives: 1. Data exposure for security evaluation and monitoring - Identif...
33.905
Recommendations for Trusted Open Platforms
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-j00.zip
33.916
Security Assurance Methodology (SECAM) for 3GPP network products
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-j00.zip
33.919
3G Security; Generic Authentication Architecture (GAA); System description
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-j00.zip
33.924
Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-j00.zip
33.926
Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes
TR
19.4.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-j40.zip
The present document captures the network product class descriptions, threats and critical assets that have been identified in the course of the work on 3GPP security assurance specifications. The main body of the present document contains generic aspects that are believed to apply to more than one network product clas...
33.927
Security Assurance Specification (SCAS); threats and critical assets in 3GPP virtualized network product classes
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.927/33927-j00.zip
33.928
ADMF logic for provisioning Lawful Interception (LI)
TR
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.928/33928-j10.zip
33.929-1
Lawful Interception (LI) implementation guidance; LI for IMS based services
TR
0.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-1/33929-1-001.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the LI for IMS based services that focus on illus...
33.929-2
Lawful Interception (LI) implementation guidance; LI for IMS based STIR/SHAKEN
TR
0.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-2/33929-2-001.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the LI for IMS based STIR/SHAKEN that focus on il...
33.929-3
Lawful Interception (LI) implementation guidance; LI for messaging services
TR
0.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-3/33929-3-001.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the illustrations related LI for Messaging Servic...
33.929-4
Lawful Interception (LI) implementation guidance; LI for data in 5G core
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-4/33929-4-002.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3], TS 33.128 [4] and TR 33.928 [5]. The present document that covers the illustrations for LI for ...
33.929-5
Lawful Interception (LI) implementation guidance; LI for ID association caching
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-5/33929-5-002.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3], TS 33.128 [4] and TR 33.928 [5]. The present document that covers illustrations of ID Associati...
33.929-6
Lawful Interception (LI) implementation guidance; LI for IMS based RCS
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-6/33929-6-002.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the LI for IMS based RCS that include the illustr...
33.929-7
Lawful Interception (LI) implementation guidance; LI location acquisition capabilities
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-7/33929-7-002.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the LI for Location Services that include the ill...
33.929-8
Lawful Interception (LI) implementation guidance; LI for MMS
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-8/33929-8-002.zip
The present document provides architectural diagrams, conceptual scenarios, flow-diagrams, examples, and other background information which can be useful to implement the LI functions defined in TS 33.126 [2], TS 33.127 [3] and TS 33.128 [4]. The present document covers the LI for MMS that include the illustrations cov...
33.929-9
Lawful Interception (LI) implementation guidance; LI for PTC
TR
0.0.2
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.929-9/33929-9-002.zip
33.935
Study on detailed Long Term Key Update Process (LTKUP) detailed solutions
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.935/33935-j00.zip
33.936
Security Assurance Methodology (SECAM) for 3GPP virtualized network products
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.936/33936-j00.zip
33.937
Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-j00.zip
33.938
3GPP Cryptographic Inventory
TR
19.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.938/33938-j20.zip
33.969
Study on security aspects of Public Warning System (PWS)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-j00.zip
33.980
Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA)
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-j00.zip
33.995
Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-j00.zip
34.109
Terminal logical test interface; Special conformance testing functions
TS
19.0.0
R2
https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-j00.zip
34.124
Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-j00.zip
34.131
Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API)
TS
19.0.0
C6
https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-j00.zip
34.229-2
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification
TS
19.3.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-j30.zip
34.229-3
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS)
TS
19.2.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-j20.zip
34.926
Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment
TR
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-j00.zip
35.201
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-j00.zip
35.202
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-j00.zip
35.203
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-j00.zip
35.204
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-j00.zip
35.205
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-j00.zip
This report is a description of the work undertaken by an ETSI SAGE Task Force on the design of the Milenage Algorithm Set: an example set of 3GPP Authentication and Key Generation Functions. The 3GPP Authentication and Key Generation Functions are not standardized. An example set of these algorithms has been produced ...
35.206
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-j00.zip
35.207
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-j00.zip
35.208
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-j00.zip
35.215
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-j00.zip
35.216
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-j00.zip
35.217
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-j00.zip
35.218
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-j00.zip
35.221
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-j00.zip
35.222
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-j00.zip
35.223
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-j00.zip
35.231
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-j00.zip
The present document and the other Technical Specifications in the series, TS 35.232 [15] and 35.233 [16] contain an example set of algorithms which could be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* for 3GPP systems. All seven functions are operator-specifiable rather than...
35.232
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.232/35232-j00.zip
35.233
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.233/35233-j00.zip
35.234
Specification of the MILENAGE-256 algorithm set; An example set of 256-bit 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 1: General
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.234/35234-j00.zip
The present document contains a high level specification of the MILENAGE-256 algorithm set which constitutes an example set of 3GPP authentication and key generation functions with a 256-bit target security level. The example set is based on the block cipher Rijndael-256-256 with 256-bit key and 256-bit block size [8, ...
35.235
Specification of the MILENAGE-256 algorithm set; An example set of 256-bit 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 2: algorithm specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.235/35235-j00.zip
This document contains a detailed specification of the general framework for the MILENAGE-256 algorithm set, together with specification for the cryptographic kernel used to instantiate the algorithm set. The main new requirement for the MILENAGE-256 algorithm set, compared to previous 3GPP authentication and key gener...
35.236
Specification of the MILENAGE-256 algorithm set; An example set of 256-bit 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 3: Implementors’ test data and design conformance test data
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.236/35236-j00.zip
The present document provides test data (also known as test vectors) that implementors can use to help verify that their implementations are correct, according to the technical specifications of MILENAGE-256 algorithm set [2,3]. A reference implementation in C/C++ is also provided in the Annex.
35.246
Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 1: algorithm specification
TS
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.246/35246-j00.zip
The present document contains the algorithm specification which could be used as the encryption and integrity protection function 256-NEA6, 256-NIA6 and the combined authenticated encryption 256-NCA6 protection function for 3GPP systems.
35.249
Specification of an example algorithm for f5** function for MILENAGE and Tuak; Algorithm specification and test data
TS
19.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.249/35249-j10.zip
The present document presents an optional security enhancement for the MILENAGE [5, 6, 12, 13] and Tuak example algorithm set [7, 14, 15] for the 3GPP authentication and key agreement functions. The enhancement addresses a subscriber traceability issue discovered by academic researchers [9] and is provided as an altern...
35.909
3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-j00.zip
35.919
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.919/35919-j00.zip
35.924
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.924/35924-j00.zip
35.934
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.934/35934-j00.zip
35.935
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.935/35935-j00.zip
35.936
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.936/35936-j00.zip
35.937
Specification of the MILENAGE-256 algorithm set; An example set of 256-bit 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 4: summary and results of design and evaluation
TR
19.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.937/35937-j00.zip
The present document contains a detailed summary of the work performed during the design and evaluation of MILENAGE-256 algorithm set. It contains results and findings from this work and should be read as a supplement to the specifications of the algorithms [3] and the general project report [2]. The example set is bas...
36.102
Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception for satellite access
TS
19.2.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.102/36102-j20.zip
36.106
Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater radio transmission and reception
TS
19.1.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.106/36106-j10.zip
36.108
Evolved Universal Terrestrial Radio Access (E-UTRA); Satellite Access Node radio transmission and reception
TS
19.2.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.108/36108-j20.zip
36.111
Location Measurement Unit (LMU) performance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.111/36111-j00.zip
36.112
Location Measurement Unit (LMU) conformance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.112/36112-j00.zip
36.113
Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) and repeater ElectroMagnetic Compatibility (EMC)
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.113/36113-j00.zip
36.116
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay radio transmission and reception
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.116/36116-j00.zip
36.117
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay conformance testing
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.117/36117-j00.zip
36.124
Evolved Universal Terrestrial Radio Access (E-UTRA); Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.124/36124-j00.zip
36.143
Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater conformance testing
TS
19.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.143/36143-j00.zip
36.171
Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements for Support of Assisted Global Navigation Satellite System (A-GNSS)
TS
19.1.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.171/36171-j10.zip
36.181
Evolved Universal Terrestrial Radio Access (E-UTRA); Satellite Access Node conformance testing
TS
19.2.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.181/36181-j20.zip