id stringlengths 5 12 | title stringlengths 8 250 | type stringclasses 2
values | version stringclasses 560
values | working_group stringclasses 30
values | url stringlengths 67 81 | scope stringlengths 0 65.7k |
|---|---|---|---|---|---|---|
33.122 | Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.122/33122-g40.zip | |
33.126 | Lawful Interception requirements | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.126/33126-g50.zip | The present document specifies Stage 1 Lawful Interception requirements for 3GPP networks and services.
Regional interception requirements can be satisfied by meeting the correct subset of requirements from the present document. Which CSP services are subject to Lawful Interception is defined by national regulations.
T... |
33.116 | Security Assurance Specification (SCAS) for the MME network product class | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.116/33116-g10.zip | The present document contains objectives, requirements and test cases that are specific to the MME network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.127 | Lawful Interception (LI) architecture and functions | TS | 16.14.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.127/33127-ge0.zip | |
33.128 | Security; Protocol and procedures for Lawful Interception (LI); Stage 3 | TS | 16.21.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.128/33128-gl0.zip | |
33.163 | Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.163/33163-g20.zip | |
33.180 | Security of the Mission Critical (MC) service | TS | 16.13.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.180/33180-gd0.zip | |
33.141 | Presence service; Security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.141/33141-g00.zip | |
33.185 | Security aspect for LTE support of Vehicle-to-Everything (V2X) services | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.185/33185-g00.zip | |
33.187 | Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.187/33187-g00.zip | |
33.203 | 3G security; Access security for IP-based services | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.203/33203-g10.zip | The scope for this technical specification is to specify the security features and mechanisms for secure access to the IM subsystem (IMS) for the 3G mobile telecommunication system.
Since the scope also encompasses the use of these security features and mechanisms for secure access to IMS in the context of fixed broadb... |
33.210 | Network Domain Security (NDS); IP network layer security | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.210/33210-g50.zip | |
33.204 | 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.204/33204-g00.zip | |
33.216 | Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class | TS | 16.7.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.216/33216-g70.zip | The present document contains objectives, requirements and test cases that are specific to the eNB network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.220 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.220/33220-g40.zip | |
33.221 | Generic Authentication Architecture (GAA); Support for subscriber certificates | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.221/33221-g00.zip | |
33.223 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.223/33223-g00.zip | |
33.224 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.224/33224-g00.zip | |
33.222 | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.222/33222-g10.zip | |
33.246 | 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.246/33246-g00.zip | The Technical Specification covers the security procedures of the Multimedia Broadcast/Multicast Service (MBMS) for 3GPP systems (UTRAN, GERAN and E-UTRAN). MBMS is a 3GPP system network bearer service over which many different applications could be carried. The actual method of protection may vary depending on the typ... |
33.234 | 3G security; Wireless Local Area Network (WLAN) interworking security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.234/33234-g00.zip | |
33.250 | Security assurance specification for the PGW network product class | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.250/33250-g00.zip | The present document contains requirements and test cases that are specific to the PGW network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique t... |
33.259 | Key establishment between a UICC hosting device and a remote device | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.259/33259-g00.zip | |
33.303 | Proximity-based Services (ProSe); Security aspects | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.303/33303-g00.zip | |
33.320 | Security of Home Node B (HNB) / Home evolved Node B (HeNB) | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.320/33320-g00.zip | |
33.310 | Network Domain Security (NDS); Authentication Framework (AF) | TS | 16.16.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-gg0.zip | |
33.401 | 3GPP System Architecture Evolution (SAE); Security architecture | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/33401-g40.zip | |
33.402 | 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/33402-g00.zip | |
33.434 | Security aspects of Service Enabler Architecture Layer (SEAL) for verticals | TS | 16.3.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.434/33434-g31.zip | The present document specifies the security features and mechanisms to support the Service Enabler Architecture Layer (SEAL) in 5G. Specifically security architecture, functional model(s), security aspects of SEAL reference points (e.g. SEAL-UU, etc.), Key Management (KM) procedures, Identity Management (IdM) procedure... |
33.501 | Security architecture and procedures for 5G System | TS | 16.18.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-gi0.zip | |
33.328 | IP Multimedia Subsystem (IMS) media plane security | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.328/33328-g10.zip | |
33.511 | Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class | TS | 16.12.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.511/33511-gc0.zip | |
33.512 | 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF) | TS | 16.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.512/33512-g60.zip | The present document contains objectives, requirements and test cases that are specific to the AMF network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.514 | 5G Security Assurance Specification (SCAS) for the Unified Data Management (UDM) network product class | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.514/33514-g50.zip | The present document contains requirements and test cases that are specific to the UDM network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases. It also specifies the requirements and test cases unique to the UDM ne... |
33.515 | 5G Security Assurance Specification (SCAS) for the Session Management Function (SMF) network product class | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.515/33515-g40.zip | The present document contains requirements and test cases that are specific to the SMF network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique t... |
33.513 | 5G Security Assurance Specification (SCAS); User Plane Function (UPF) | TS | 16.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.513/33513-g30.zip | The present document contains requirements and test cases that are specific to the UPF network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases. It also specifies the requirements and test cases unique to the UPF ne... |
33.517 | 5G Security Assurance Specification (SCAS) for the Security Edge Protection Proxy (SEPP) network product class | TS | 16.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.517/33517-g30.zip | The present document contains objectives, requirements and test cases that are specific to the SEPP network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test c... |
33.516 | 5G Security Assurance Specification (SCAS) for the Authentication Server Function (AUSF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.516/33516-g20.zip | |
33.518 | 5G Security Assurance Specification (SCAS) for the Network Repository Function (NRF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.518/33518-g20.zip | The present document contains objectives, requirements and test cases that are specific to the NRF network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.536 | Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.536/33536-g50.zip | |
33.807 | Study on the security of the wireless and wireline convergence for the 5G system architecture | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.807/33807-g01.zip | The scope of the present document is:
- Study for security between a 5G-RG and 5GC.
- Study for security for a 3GPP UE and non 3GPP UE behind a 5G-RG or a FN RG.
- Study for security for supporting legacy RG. The scope is limited based on the conclusion of the study in TR 23.716 [2].
- Study for security for trusted no... |
33.519 | 5G Security Assurance Specification (SCAS) for the Network Exposure Function (NEF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.519/33519-g20.zip | |
33.814 | Study on the security of the enhancement to the 5G Core (5GC) location services | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.814/33814-g01.zip | The scope of the present document is to analyse the security aspects of location service in 5G system and ensure the security solutions are aligned with the work in SA1 (i.e. in TS 22.261 [2] and TR 22.872 [3]) and SA2 (i.e. in TR 23.731 [4]). The work is comprised of the following parts:
- Study the security key issue... |
33.813 | Study on security aspects of network slicing enhancement | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.813/33813-g00.zip | |
33.815 | Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS) | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.815/33815-g01.zip | The present document will examine potential security and privacy threat scenarios enabled by PARLOS, evaluate whether solutions need to be found for these and, if required, identify security solutions and approaches which can mitigate the identified security and privacy threat scenarios while meeting the US regulatory ... |
33.819 | Study on security enhancements of 5G System (5GS) for vertical and Local Area Network (LAN) services | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.819/33819-g10.zip | The present document studies security enhancements to 5GS that are required to fulfil Stage-1 service requirements in vertical domains defined in TS 22.261 [1] and TS 22.104 [2] and addresses the solutions described by TR 23.734 [3] and TR 23.725 [4] studies.
Potential security requirements are provided and possible se... |
33.825 | Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for the 5G System (5GS) | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.825/33825-g01.zip | The present document:
- Investigates and identifies the security key issues for meeting the low latency requirement.
- Investigates and identifies the security key issues for meeting the ultra-high reliability requirement.
- Provides potential security requirements to address the identified security issues.
- Provides ... |
33.808 | KDF negotiation for 5GS security – phase2 | TR | 0.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.808/33808-030.zip | The scope of this document is the following:
• Study security for allowing KDF negotiation between UE and 5GS network entities
◦ Study the need for KDF negotiation between UE and 5GS network functions, e.g., UE and 5G RAN, UE and SEAF, etc.
◦ Security for potential KDF negotiation procedures between UE and 5GS network ... |
33.834 | Study on Long Term Key Update Procedures (LTKUP) | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.834/33834-g10.zip | The present document is a study on the remote update of 3GPP long term secret keys held in a SIM / USIM.
It:
- Identifies which Long Term Keys should be updatable within this proposed feature.
- Identifies the 3GPP/non 3GPP elements that would be affected by the update of these keys.
- Identifies the Key Issues relatin... |
33.836 | Study on security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.836/33836-g10.zip | The scope of the present document is to provide security and privacy analysis of eV2X system architecture, derive potential security and privacy requirements, and evaluate security and privacy solutions for protection of it. The security aspects to be considered are as follows:
- Security and privacy for new interfaces... |
33.841 | Study on the support of 256-bit algorithms for 5G | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.841/33841-g10.zip | The present document details the following:
- An assessment of threats and potential countermeasures posed due to quantum computing and a resulting assessment of relevant countermeasures in the 5G system.
- An assessment of the timelines for the introduction of any countermeasures, in particular the increase of key len... |
33.845 | Study on storage and transport of 5G Core (5GC) security parameters for Authentication Credential Repository Processing Function (ARPF) authentication | TR | 0.7.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.845/33845-070.zip | The present document details the following:
- The security assumptions relating to security communication in 5G.
- The security assumptions related to protecting subscriber privacy.
- The home network parameters that are relevant to securing the communication in 5G and protecting subscriber privacy.
- Key Issues, threa... |
33.835 | Study on authentication and key management for applications based on 3GPP credential in 5G | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.835/33835-g10.zip | The present document specifies key issues, derived requirements and potential solutions to support authentication and key management aspects for applications and 3GPP services based on 3GPP credentials in 5G, including the IoT use case. It analyses issues and requirements for:
- providing authentication and key managem... |
33.853 | Study on key issues and potential solutions for integrity protection of the User Plane (UP) | TR | 1.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.853/33853-160.zip | The present document studies the key issues and potential solutions for integrity protecting the user plane, including potential enhancements needed to support UP IP up to the full data rate, in the following combinations as defined in 3GPP TR 38.801 [2] (clause 7.2):
- Option 1 - eUTRA with EPC
- Option 2 - NR standal... |
33.861 | Study on evolution of Cellular Internet of Things (CIoT) security for the 5G System | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.861/33861-g10.zip | The present document studies the following:
- Capture massive MTC related 5G requirements in other 3GPP documents and further analyse them from security point of view.
- Study security for supporting EPS CIoT/MTC functionalities in 5GS, e.g.:
- security for infrequent and frequent small data transmission
- security for... |
33.856 | Study on security aspects of single radio voice continuity from 5G to UTRAN | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.856/33856-g10.zip | The present document studies the security aspects of single radio voice continuity from 5G to UTRAN CS. In particular, the goal of the present document is to study the impacts on 3GPP security architecture which may result from 5GS to UTRAN CS voice continuity, e.g. security context mapping from 5G and UTRAN, security ... |
33.905 | Recommendations for Trusted Open Platforms | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-g00.zip | |
33.855 | Study on security aspects of the 5G Service Based Architecture (SBA) | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.855/33855-g10.zip | 3GPP TS 23.501 [2] defines 5G services with a new service based architecture (SBA) approach.
The present document reviews the interactions in this new architecture, determines key issues relating to the security of SBA elements and interfaces, details potential solutions and recommends normative work . |
33.848 | Study on security impacts of virtualisation | TR | 0.15.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.848/33848-0f0.zip | The present document considers the consequences of virtualisation on 3GPP architectures, in order to identify threats and subsequent security requirements. 3GPP function security relies on the underlying implementation technology and physical environment being secure. In legacy deployments, physical rack security and s... |
33.919 | 3G Security; Generic Authentication Architecture (GAA); System description | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-g00.zip | |
33.916 | Security Assurance Methodology (SECAM) for 3GPP network products | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-g10.zip | |
33.924 | Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-g00.zip | |
33.935 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.935/33935-g00.zip | |
33.937 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-g00.zip | |
33.969 | Study on security aspects of Public Warning System (PWS) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-g00.zip | |
33.980 | Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-g00.zip | |
33.926 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes | TR | 16.8.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-g80.zip | The present document captures the network product class descriptions, threats and critical assets that have been identified in the course of the work on 3GPP security assurance specifications. The main body of the present document contains generic aspects that are believed to apply to more than one network product clas... |
34.109 | Terminal logical test interface; Special conformance testing functions | TS | 16.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-g00.zip | |
33.995 | Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-g00.zip | |
34.124 | Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 16.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-g00.zip | |
34.121-1 | User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 1: Conformance specification | TS | 16.2.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-1/34121-1-g20.zip | The present document specifies the UTRA measurement procedures for the conformance test of the user equipment (UE) that contain transmitting characteristics, receiving characteristics and performance requirements in addition to requirements for support of RRM (Radio Resource Management) in FDD mode. In addition it spec... |
34.131 | Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API) | TS | 16.0.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-g00.zip | |
34.229-2 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification | TS | 16.11.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-gb0.zip | |
34.229-3 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS) | TS | 16.9.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-g90.zip | |
34.926 | Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment | TR | 16.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-g00.zip | |
35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-g00.zip | |
35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-g00.zip | |
35.204 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-g00.zip | |
35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-g00.zip | |
35.206 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-g00.zip | |
35.207 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-g00.zip | |
35.208 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-g00.zip | |
35.215 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-g00.zip | |
35.205 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-g00.zip | This report is a description of the work undertaken by an ETSI SAGE Task Force on the design of the Milenage Algorithm Set: an example set of 3GPP Authentication and Key Generation Functions.
The 3GPP Authentication and Key Generation Functions are not standardized. An example set of these algorithms has been produced ... |
35.217 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-g00.zip | |
35.218 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-g00.zip | |
35.221 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-g00.zip | |
35.216 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-g00.zip | |
35.223 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-g00.zip | |
35.222 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-g00.zip | |
35.232 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.232/35232-g00.zip | |
35.909 | 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-g00.zip | |
35.231 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-g00.zip | The present document and the other Technical Specifications in the series, TS 35.232 [15] and 35.233 [16] contain an example set of algorithms which could be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* for 3GPP systems. All seven functions are operator-specifiable rather than... |
35.233 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.233/35233-g00.zip | |
35.935 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.935/35935-g00.zip | |
35.934 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.934/35934-g00.zip | |
35.936 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.936/35936-g00.zip | |
35.924 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.924/35924-g00.zip | |
36.106 | Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater radio transmission and reception | TS | 16.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/36_series/36.106/36106-g00.zip | |
35.919 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.919/35919-g00.zip |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.