hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.8 Group identifier level 1 | .............................................................................................................................. 90 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.9 Group identifier level 2 | .............................................................................................................................. 91 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.10 Service provider name | ................................................................................................................................ 91 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.11 Enhanced multi level precedence and pre-emption service | ........................................................................ 91 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.12 Cell broadcast message identifier ranges | ................................................................................................... 91 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.13 Short message status report | ........................................................................................................................ 91 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.14 APN Control List | ....................................................................................................................................... 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.15 Depersonalisation Control Keys | ................................................................................................................. 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.3.16 Co-operative Network List | ......................................................................................................................... 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.4 USAT related procedures | ................................................................................................................................ 92 5.4.1 Data Download via SMS-PP...................................................................................................................... 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.4.2 Image Request | ............................................................................................................................................ 92 5.4.3 Data Download via SMS-CB ..................................................................................................................... 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.4.4 Call Control by USIM | ................................................................................................................................ 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 5.4.5 MO-SMS control by USIM | ........................................................................................................................ 92 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 6 Security features | .................................................................................................................................... 93 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 6.1 Authentication and key agreement procedure | .................................................................................................. 93 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 6.2 Cryptographic Functions | ................................................................................................................................. 93 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 6.3 GSM Conversion Functions | ............................................................................................................................. 94 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 6.4 User verification and file access conditions | ..................................................................................................... 94 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7 USIM Commands | .................................................................................................................................. 95 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.1 AUTHENTICATE | ........................................................................................................................................... 95 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.1.1 Command description | ................................................................................................................................ 95 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.1.1.1 3G security context | ............................................................................................................................... 95 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.1.1.2 GSM security context | ........................................................................................................................... 96 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.1.2 Command parameters and data | .................................................................................................................. 96 ETSI ETSI TS 131 102 V3.1.0 (2000-04) 6 3G TS 31.102 version 3.1.0 Release 1999 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.2 Encipher IMSI | ................................................................................................................................................. 97 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.2.1 Command description | ................................................................................................................................ 97 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.2.2 Command parameters and data | .................................................................................................................. 98 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.3 Status Conditions Returned by the UICC | ........................................................................................................ 98 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.3.1 Security management | ................................................................................................................................. 98 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.3.2 Status Words of the Commands | ................................................................................................................. 99 |
cea2a854216faabefff4a74b190cf435 | 131 102 | 7.4 VERIFY command | ........................................................................................................................................ 100 Annex A (informative): EF changes via Data Download or USAT applications.................................... 101 Annex B (normative): Image Coding Schemes............................ |
3023b3863bed645c0eef46881ae16afe | 125 402 | 1 Scope | ........................................................................................................................................................6 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 2 References | ................................................................................................................................................6 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 3 Definitions, symbols and abbreviations | ...................................................................................................6 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 3.1 Definitions | ............................................................................................................................................................... 6 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 3.2 Symbols | ................................................................................................................................................................... 6 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 3.3 Abbreviations | .......................................................................................................................................................... 7 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4 Synchronisation Issues | .............................................................................................................................7 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.1 General | .................................................................................................................................................................... 7 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.2 Network Synchronisation | ........................................................................................................................................ 9 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.3 Node Synchronisation | ............................................................................................................................................. 9 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.4 Transport Channel Synchronisation | ........................................................................................................................ 9 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.5 Radio Interface Synchronisation | ............................................................................................................................. 9 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 4.6 Time Alignment Handling | ....................................................................................................................................... 9 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 5 Synchronisation Counters and Parameters | .............................................................................................10 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6 Node Synchronisation | ............................................................................................................................13 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6.1 General | .................................................................................................................................................................. 13 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6.1.1 RNC-Node B Node Synchronisation | ............................................................................................................... 13 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6.1.2 Inter Node B Node Synchronisation | ................................................................................................................ 15 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6.1.2.1 TDD Node B Synchronisation Ports | ................................................................................................................ 15 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 6.1.2.2 TDD Inter Node B Node Synchronisation procedure | ...................................................................................... 17 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 7 Transport Channel Synchronisation | .......................................................................................................18 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 7.1 General | .................................................................................................................................................................. 18 7.2 Timing adjustment and Time of Arrival monitoring on Iub/Iur interfaces............................................................ 19 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8 Radio Interface Synchronisation | ............................................................................................................22 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.1 General | .................................................................................................................................................................. 22 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.2 FDD Radio Interface Synchronisation | ................................................................................................................... 22 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.2.1 General | ............................................................................................................................................................. 22 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.2.2 Neighbour cell list timing information | ............................................................................................................. 24 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3 TDD Radio Interface Synchronisation | .................................................................................................................. 24 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.1 General | ............................................................................................................................................................. 24 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.2 Radio Frame Synchronisation | .......................................................................................................................... 24 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.3 Multi Frame Synchronisation | .......................................................................................................................... 25 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4 Timing Advance | .............................................................................................................................................. 25 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.1 Measurement of the timing offset on the physical channels | ............................................................................ 25 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.2 Assignment of correct timing advance value when establishing new channels | ............................................... 26 8.3.4.2.1 Switch to DCH/DCH state ......................................................................................................................... 26 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.2.2 Switch to USCH state | ................................................................................................................................. 26 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.3 Correction of timing advance value for channels in operation | ........................................................................ 26 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.3.1 UE in Traffic using at least one uplink DCH | ............................................................................................. 26 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.3.2 UE in Traffic using only USCH | ................................................................................................................. 27 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 8.3.4.4 Setting of timing advance value for target cell at handover | ............................................................................. 27 9 Usage of Synchronisation Counters and Parameters to support Transport Channel and Radio Interface Synchronisation ......................................................................................................................27 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.1 General | .................................................................................................................................................................. 27 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2 Calculations performed in the UTRAN | ................................................................................................................. 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2.1 UE in common channel state | ........................................................................................................................... 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2.2 UE changes state from common CH state to dedicated CH state: 1 RL | .......................................................... 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2.3 UE changes state from common CH state to dedicated CH state: several RL's (FDD only) | ........................... 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2.4 UE in dedicated CH state request to add a new RL or moves to another cell | .................................................. 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.2.5 Handover from other RAN to UMTS | .............................................................................................................. 30 3G TS 25.402 version 3.1.0 Release 1999 ETSI 4 3G TS 25.402 V 3.1.0 ETSI TS 125 402 V3.1.0 (2000-03) |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.3 Calculations performed in the UE | ......................................................................................................................... 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.3.1 First RL | ............................................................................................................................................................ 30 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.3.2 Additional RL's or UE moves into a new cell | .................................................................................................. 31 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 9.4 Synchronisation of L1 configuration changes | ....................................................................................................... 31 |
3023b3863bed645c0eef46881ae16afe | 125 402 | 10 Time Alignment Handling | .....................................................................................................................31 Annex A (informative): Change history...............................................................................................33 History............................................................. |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 1 Scope | The present document describes the additional security measures put in place in the TETRA security standards, ETSI TS 100 392-7 [i.1] version 4.1.1 and later, and ETSI TS 100 396-6 [i.2] version 2.1.1 and later. Clause 4 describes the security measures in turn, and the threats that led to the inclusion of each of measu... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 2 References | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 2.1 Normative references | Normative references are not applicable in the present document. |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 3 Definition of terms, symbols and abbreviations | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 3.1 Terms | For the purposes of the present document, the terms given in ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1] apply. ETSI ETSI TR 104 291 V1.1.1 (2026-04) 7 |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 3.2 Symbols | Void. |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: BL-ACK Basic Link ACKnowledgement BS Base Station CCK Common Cipher Key CVD Coordinated Vulnerability Disclosure DCK Derived Cipher Key DCKX eXtended Derived Cipher Key DMO Direct Mode Operation ESI Encrypted Short Identity GCK Group Cipher Ke... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4 Security enhancements | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.1 New authentication and air interface encryption algorithms | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.1.1 Threat | This threat applies to TMO and DMO. The cost of computing falls year on year. The computing power needed to carry out a brute force attack on a key, which might have been out of the reach of a well-resourced attacker when an algorithm was designed, may become affordable decades later. Quantum computing, when feasible o... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.1.2 Countermeasure | New authentication algorithms in the TAA2 algorithm set uses an increased length of authentication key of 256 bits compared to 128 bits used with the original authentication algorithms. New air interface encryption algorithms TEA5, TEA6 and TEA7 have encryption keys 192 bits long, a considerable increase in length comp... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.2 Requirement for different RAND values | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.2.1 Threat | This threat applies to TMO using the original TAA1 authentication algorithms only. Authentication requires that the SwMI and MS both know the MS's secret authentication key K, which is used to generate session keys, and together with random numbers generated by SwMI and MS can allow each to prove that the other has kno... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.2.2 Countermeasure | ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1], clause 4.1.4, note 2 will cause the authentication to be abandoned and restarted if the random numbers chosen by SwMI and MS are found to be equal. The DCKX derivation algorithm used for authentication and encryption with the TEA set B algorithms is not vulnerable to this a... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.3 TDMA frame number validation - uplink | |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.3.1 Threat | This threat applies to TMO only. The encryption process is synchronized by the TDMA frame numbering system which is broadcast by the BS. The counter value for each slot, frame, multiframe and hyperframe is fed into the encryption algorithm as an Initialization Value (IV) on both uplink and downlink to ensure that the k... |
702f3180cf38120ac6ffce92a3b68174 | 104 291 | 4.3.2 Countermeasure | ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1], clause 6.3.2.0a specifies that the MS should only treat the frame numbering received from the BS as valid following an authentication of the SwMI or following a mutual authentication. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.