id stringlengths 5 12 | title stringlengths 8 250 | type stringclasses 2
values | version stringclasses 560
values | working_group stringclasses 30
values | url stringlengths 67 81 | scope stringlengths 0 65.7k |
|---|---|---|---|---|---|---|
33.738 | Study on security aspects of enablers for network automation for the 5G system phase 3 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.738/33738-i10.zip | The present document studies the security aspects of enablers for network automation for the 5G system based on the outcome of TR 23.700-81 [6]. More specifically, the present document will identify security issues and requirements and provide corresponding security solutions related to the following scenarios:
- Secur... |
33.739 | Study on security enhancement of support for edge computing phase 2 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.739/33739-i10.zip | The present document studies the security aspects related to the new features and procedures resulting from the continuation of the work on Edge Computing support in 5G Systems, i.e. 5G System Enhancements for Edge Computing in 3GPP TR 23.700-48 [2], and enhanced architecture for enabling Edge Applications in 3GPP TR 2... |
33.740 | Study on security aspects of Proximity Based Services (ProSe) in 5G System (5GS) phase 2 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.740/33740-i10.zip | The present document studies the security and privacy aspects of proximity based services in 5G system phase 2. It ensures that the security solutions are aligned with the work in SA2 (i.e. TR 23.700-33 [2]), RANs, SA1 (i.e. TS 22.278 [3], TS 22.261 [4], and TS 22.115 [5]) and SA3 (i.e. TS 33.503 [6] and TR 33.870 [7])... |
33.741 | Study on home network triggered primary authentication | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.741/33741-i01.zip | The present document studies the use cases which needs Home Network initiated primary authentication and the associated security threats and requirements. As part of this investigation, the study aims at identifying which network function in the HN is better suitable to trigger the primary authentication, corresponding... |
33.809 | Study on 5G security enhancements against False Base Stations (FBS) | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.809/33809-i10.zip | The present document studies the potential threats and privacy issues associated with false base station scenarios.
The present document identifies the potential solutions for mitigating the risks caused by false base station. |
33.848 | Study on security impacts of virtualisation | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.848/33848-i00.zip | The present document considers the consequences of virtualisation on 3GPP architectures, in order to identify threats and subsequent security requirements. 3GPP function security relies on the underlying implementation technology and physical environment being secure. In legacy deployments, physical rack security and s... |
33.858 | Study on security aspects of enhanced support of Non-Public Networks (NPN) phase 2 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.858/33858-i10.zip | The aim of the present document is to study the security aspects for any potential enhancements to be developed based on the outcome of the study in TR 23.700-08 [2]. For each of the objectives in the scope of the study in TR 23.700-08 [2], potential security aspects that are to be covered in this study are as follows:... |
33.870 | Study of privacy of identifiers over radio access | TR | 0.8.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.870/33870-080.zip | The present document achieves the following objectives:
Analysis of 3GPP identifiers that represent either targets of privacy attacks themselves or may aid adversaries in privacy attacks.
Analysis of the feasibility of privacy attacks; the analysis should consider newer methodologies such as those involving AI/ML
Analy... |
33.874 | Study on enhanced security for network slicing phase 2 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.874/33874-i10.zip | The present document identifies key issues, potential security and privacy requirements and solutions with respect to network slicing Phase 2 work TS 23.501 [2], TS 23.502 [3], TS 23.503 [4] and studies TR 23.700-40 [5] and TR 38.832 [6], specifically,
- Define the security requirements and security services for new NF... |
33.875 | Study on enhanced security aspects of the 5G Service Based Architecture (SBA) | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.875/33875-i10.zip | The present document studies enhanced security aspects of the 5G Service Based Architecture. It will analyse potential threats, study necessary security enhancements, and document decisions of solutions to be adopted or not adopted after evaluating the risks versus the complexity.
In particular, the following topics ar... |
33.876 | Study on automated certificate management in Service-Based Architecture (SBA) | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.876/33876-i01.zip | The objectives of this study are to identify key issues, potential security and privacy requirements and solutions with respect to
- Standardise the use of a single automated certificate management protocol and procedures for certificate life cycle events within intra-PLMN 5G SBA (i.e. to be used by all 5GC NFs includi... |
33.877 | Study on the security aspects of Artificial Intelligence (AI)/Machine Learning (ML) for the Next Generation Radio Access Network (NG-RAN) | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.877/33877-i00.zip | The study aims at identifying key issues and solutions in order to address the security aspects of employing AI/ML techniques in RAN. The motivation of this study is to provide potential security handling for the procedures of the NG-RAN AI/ML framework [2]. The NG-RAN AI/ML framework includes functional entities and i... |
33.882 | Study on personal Internet of Things (IoT) networks security aspects | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.882/33882-i01.zip | The present document studies how 5G security architecture and procedures can be enhanced to support Personal IoT Network. The aim of the present document is to study the security aspects of Personal IoT Networks for any potential enhancements in alignment with the outcome of SA2 study in TR 23.700-88 [2]. The study wil... |
33.883 | Study on security enhancements for 5G multicast-broadcast services phase 2 | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.883/33883-i01.zip | The present document is to identify key issues, potential security and privacy requirements and solutions with respect to enhancement for 5G multicast-broadcast services. Specifically:
- Study the security enhancement enabling UE's receiving Multicast MBS Session data in RRC Inactive state. Analysis whether existing se... |
33.884 | Study on security of application enablement aspects for subscriber-aware northbound API access | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.884/33884-i01.zip | The scope of present document is based on the requirements for SNA (TS 22.261 clause 6.10.2) [2] and on the Study on application enablement aspects for subscriber-aware northbound API access (TR 23.700-95) [3].
The objective of this study is to:
1. Identify potential new security requirements related to API invocation ... |
33.886 | Study on enhanced security for network slicing phase 3 | TR | 18.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.886/33886-i10.zip | The present document identifies key security issues, potential security and privacy requirements and solutions with respect to network slicing Phase 3 work. Specifically,
- It studies potential security impact/requirements/solutions (e.g. Steering of Roaming) to support the HPLMN to provide a roaming UE the VPLMN slice... |
33.887 | Study on security aspects for support for 5G Wireless and Wireline Convergence (5WWC) phase 2 | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.887/33887-i01.zip | The objectives of the present document are to identify key issues, potential security and privacy requirements and solutions with respect to:
- Whether and how to identify, authenticate and authorize the Authenticable Non-3GPP devices behind the Residential Gateway (RG) connecting to the network.
- Whether and how to i... |
33.890 | Study on security support for next generation real time communication services | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.890/33890-i00.zip | The present document studies security aspects for any potential enhancements based on the ongoing study in TR 23.700-87 [2]. For each of the key issues in the scope of the SA WG2 study, the security aspects that are to be covered in this study are as follows:
- Analysing the potential security aspects on how to verify ... |
33.891 | Study on security of phase 2 for Uncrewed Aerial System (UAS), Uncrewed Aerial Vehicle (UAV) and Urban Air Mobility (UAM) | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.891/33891-i00.zip | The present document investigates and identifies the security and privacy threats and corresponding security requirements for Uncrewed Aerial Vehicles (UAVs) and Urban Air Mobility (UAM) that derive from the architecture and system level enhancements studied in TR 23.700-58 [2]. Furthermore, the present document consid... |
33.892 | Study on UE Route Selection Policy (URSP) rules to securely identify applications | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.892/33892-i00.zip | The present document analyses mechanisms to ensure the identity of a genuine application in order to apply the URSP rule accordingly, such that malicious applications cannot get access towards the operator regulated resources. The present document identifies key issues and develops solutions for enhancements that enabl... |
33.893 | Study on security aspects of ranging-based services and sidelink positioning | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.893/33893-i01.zip | The present document investigates the security and privacy aspects of Ranging based services and sidelink positioning in 5G system. The study is based on the architectural and functional requirements on Ranging based services and sidelink positioning services, so as to ensure that the proposed solutions address the sec... |
33.894 | Study on applicability of the zero trust security principles in mobile networks | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.894/33894-i00.zip | The present document studies some Zero Trust Security principles that can be applied to the 5G System core network. The present document will further analyse potential threats, study necessary security enhancements, and document various decisions related to solutions as to be adopted or not adopted after evaluating the... |
33.896 | Study of security aspects on user consent for 3GPP services phase 2 | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.896/33896-i01.zip | The present document is to investigate potential enhancements of 5GS that would enable broader use cases in relation with user consent.
The following aspects are in the scope of the study:
1. Investigating the potential issues and solutions with user consent for:
- eNA in case of roaming.
- MEC in case of roaming.
- NT... |
33.898 | Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.898/33898-i01.zip | The present document will study, based on requirements as specified in clauses 6.40 and 7.10 of TS 22.261 [2] and architecture and key issues captured in TR 23.700-80 [3], 5GS assistance to support Artificial Intelligence (AI) / Machine Learning (ML) model distribution, transfer, training for various applications, e.g.... |
33.905 | Recommendations for Trusted Open Platforms | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-i00.zip | |
33.916 | Security Assurance Methodology (SECAM) for 3GPP network products | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-i00.zip | |
33.919 | 3G Security; Generic Authentication Architecture (GAA); System description | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-i00.zip | |
33.924 | Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-i00.zip | |
33.926 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes | TR | 18.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-i40.zip | The present document captures the network product class descriptions, threats and critical assets that have been identified in the course of the work on 3GPP security assurance specifications. The main body of the present document contains generic aspects that are believed to apply to more than one network product clas... |
33.927 | Security Assurance Specification (SCAS); threats and critical assets in 3GPP virtualized network product classes | TR | 18.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.927/33927-i20.zip | |
33.928 | ADMF logic for provisioning Lawful Interception (LI) | TR | 18.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.928/33928-i60.zip | |
33.935 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.935/33935-i00.zip | |
33.936 | Security Assurance Methodology (SECAM) for 3GPP virtualized network products | TR | 18.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.936/33936-i01.zip | |
33.937 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-i00.zip | |
33.969 | Study on security aspects of Public Warning System (PWS) | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-i00.zip | |
33.980 | Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-i00.zip | |
33.995 | Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-i00.zip | |
34.109 | Terminal logical test interface; Special conformance testing functions | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-i00.zip | |
34.124 | Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-i00.zip | |
34.131 | Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API) | TS | 18.0.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-i00.zip | |
34.229-2 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification | TS | 18.1.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-i10.zip | |
34.229-3 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS) | TS | 18.3.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-i30.zip | |
34.926 | Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment | TR | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-i00.zip | |
35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-i00.zip | |
35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-i00.zip | |
35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-i00.zip | |
35.204 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-i00.zip | |
35.205 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-i00.zip | This report is a description of the work undertaken by an ETSI SAGE Task Force on the design of the Milenage Algorithm Set: an example set of 3GPP Authentication and Key Generation Functions.
The 3GPP Authentication and Key Generation Functions are not standardized. An example set of these algorithms has been produced ... |
35.206 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-i00.zip | |
35.207 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-i00.zip | |
35.208 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-i00.zip | |
35.215 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-i00.zip | |
35.216 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-i00.zip | |
35.217 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-i00.zip | |
35.218 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-i00.zip | |
35.221 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-i00.zip | |
35.222 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-i00.zip | |
35.223 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-i00.zip | |
35.231 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-i00.zip | The present document and the other Technical Specifications in the series, TS 35.232 [15] and 35.233 [16] contain an example set of algorithms which could be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* for 3GPP systems. All seven functions are operator-specifiable rather than... |
35.232 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.232/35232-i00.zip | |
35.233 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.233/35233-i00.zip | |
35.240 | Specification of the Snow 5G based 256-bits algorithm set: specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 1: algorithm specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.240/35240-i00.zip | The present document contains the algorithm specification which could be used as the encryption and integrity protection function 256-NEA4, 256-NIA4 and the combined authenticated encryption 256-NCA4 protection function for 3GPP systems. |
35.241 | Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity algorithm, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 2: implementation test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.241/35241-i00.zip | The present document contains the implementation test data of the encryption and integrity protection function 256-NEA4, 256-NIA4 and the combined authenticated encryption 256-NCA4 protection function for 3GPP systems. |
35.242 | Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 3: design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.242/35242-i00.zip | The present document contains the design conformance test data of the encryption and integrity protection function 256-NEA1, 256-NIA1 and the combined authenticated encryption 256-NCA1 protection function for 3GPP systems. |
35.243 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 1: algorithm specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.243/35243-i00.zip | The present document contains the algorithm specification which could be used as the encryption and integrity protection function 256-NEA5, 256-NIA5 and the combined authenticated encryption 256-NCA5 protection function for 3GPP systems. |
35.244 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 2: implementation test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.244/35244-i00.zip | The present document contains the implementation test data of the encryption and integrity protection function 256-NEA5, 256-NIA5 and the combined authenticated encryption 256-NCA5 protection function for 3GPP systems. |
35.245 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 3: design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.245/35245-i00.zip | The present document contains the design conformance test data of the encryption and integrity protection function 256-NEA5, 256-NIA5 and the combined authenticated encryption 256-NCA5 protection function for 3GPP systems. |
35.246 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 1: algorithm specification | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.246/35246-i00.zip | The present document contains the algorithm specification which could be used as the encryption and integrity protection function 256-NEA6, 256-NIA6 and the combined authenticated encryption 256-NCA6 protection function for 3GPP systems. |
35.247 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 2: implementation test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.247/35247-i00.zip | The present document contains the implementers’ test data of the encryption and integrity protection function 256-NEA6, 256-NIA6 and the combined authenticated encryption 256-NCA6 protection function for 3GPP systems. |
35.248 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 3: design conformance test data | TS | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.248/35248-i00.zip | The present document contains the design conformance test data of the encryption and integrity protection function 256-NEA6, 256-NIA6 and the combined authenticated encryption 256-NCA6 protection function for 3GPP systems. |
35.909 | 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-i00.zip | |
35.919 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.919/35919-i00.zip | |
35.924 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.924/35924-i00.zip | |
35.934 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.934/35934-i00.zip | |
35.935 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.935/35935-i00.zip | |
35.936 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment | TR | 18.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.936/35936-i00.zip | |
36.102 | Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception for satellite access | TS | 18.11.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.102/36102-ib0.zip | |
36.106 | Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater radio transmission and reception | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.106/36106-i00.zip | |
36.108 | Evolved Universal Terrestrial Radio Access (E-UTRA); Satellite Access Node radio transmission and reception | TS | 18.10.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.108/36108-ia0.zip | |
36.111 | Location Measurement Unit (LMU) performance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN) | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.111/36111-i00.zip | |
36.112 | Location Measurement Unit (LMU) conformance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN) | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.112/36112-i00.zip | |
36.113 | Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) and repeater ElectroMagnetic Compatibility (EMC) | TS | 18.1.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.113/36113-i10.zip | |
36.116 | Evolved Universal Terrestrial Radio Access (E-UTRA); Relay radio transmission and reception | TS | 18.1.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.116/36116-i10.zip | |
36.117 | Evolved Universal Terrestrial Radio Access (E-UTRA); Relay conformance testing | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.117/36117-i00.zip | |
36.124 | Evolved Universal Terrestrial Radio Access (E-UTRA); Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.124/36124-i00.zip | |
36.143 | Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater conformance testing | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.143/36143-i00.zip | |
36.171 | Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements for Support of Assisted Global Navigation Satellite System (A-GNSS) | TS | 18.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.171/36171-i00.zip | |
36.181 | Evolved Universal Terrestrial Radio Access (E-UTRA); Satellite Access Node conformance testing | TS | 18.8.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.181/36181-i80.zip | |
36.201 | Evolved Universal Terrestrial Radio Access (E-UTRA); LTE physical layer; General description | TS | 18.0.0 | R1 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.201/36201-i00.zip | |
36.214 | Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer; Measurements | TS | 18.1.0 | R1 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.214/36214-i10.zip | |
36.216 | Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer for relaying operation | TS | 18.0.0 | R1 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.216/36216-i00.zip | |
36.302 | Evolved Universal Terrestrial Radio Access (E-UTRA); Services provided by the physical layer | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.302/36302-i00.zip | |
36.304 | Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) procedures in idle mode | TS | 18.4.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.304/36304-i40.zip | |
36.305 | Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Stage 2 functional specification of User Equipment (UE) positioning in E-UTRAN | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.305/36305-i00.zip | |
36.306 | Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio access capabilities | TS | 18.6.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.306/36306-i60.zip | |
36.307 | Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements on User Equipments (UEs) supporting a release-independent frequency band | TS | 18.7.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.307/36307-i70.zip | The present document specifies requirements for Rel-18 UEs supporting release independent features like:
- additional E-UTRA operating frequency bands on top of Rel-18 of TS 36.101 [2], TS 36.102 [6] and TS 36.133 [3];
- additional E-UTRA CA configurations (intra-band/inter-band) on top of Rel-18 of TS 36.101 [2] and T... |
36.314 | Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.314/36314-i00.zip | |
36.321 | Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification | TS | 18.5.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.321/36321-i50.zip | |
36.322 | Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Link Control (RLC) protocol specification | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.322/36322-i00.zip | |
36.323 | Evolved Universal Terrestrial Radio Access (E-UTRA); Packet Data Convergence Protocol (PDCP) specification | TS | 18.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.323/36323-i00.zip |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.