hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
cea2a854216faabefff4a74b190cf435
131 102
5.3.8 Group identifier level 1
.............................................................................................................................. 90
cea2a854216faabefff4a74b190cf435
131 102
5.3.9 Group identifier level 2
.............................................................................................................................. 91
cea2a854216faabefff4a74b190cf435
131 102
5.3.10 Service provider name
................................................................................................................................ 91
cea2a854216faabefff4a74b190cf435
131 102
5.3.11 Enhanced multi level precedence and pre-emption service
........................................................................ 91
cea2a854216faabefff4a74b190cf435
131 102
5.3.12 Cell broadcast message identifier ranges
................................................................................................... 91
cea2a854216faabefff4a74b190cf435
131 102
5.3.13 Short message status report
........................................................................................................................ 91
cea2a854216faabefff4a74b190cf435
131 102
5.3.14 APN Control List
....................................................................................................................................... 92
cea2a854216faabefff4a74b190cf435
131 102
5.3.15 Depersonalisation Control Keys
................................................................................................................. 92
cea2a854216faabefff4a74b190cf435
131 102
5.3.16 Co-operative Network List
......................................................................................................................... 92
cea2a854216faabefff4a74b190cf435
131 102
5.4 USAT related procedures
................................................................................................................................ 92 5.4.1 Data Download via SMS-PP...................................................................................................................... 92
cea2a854216faabefff4a74b190cf435
131 102
5.4.2 Image Request
............................................................................................................................................ 92 5.4.3 Data Download via SMS-CB ..................................................................................................................... 92
cea2a854216faabefff4a74b190cf435
131 102
5.4.4 Call Control by USIM
................................................................................................................................ 92
cea2a854216faabefff4a74b190cf435
131 102
5.4.5 MO-SMS control by USIM
........................................................................................................................ 92
cea2a854216faabefff4a74b190cf435
131 102
6 Security features
.................................................................................................................................... 93
cea2a854216faabefff4a74b190cf435
131 102
6.1 Authentication and key agreement procedure
.................................................................................................. 93
cea2a854216faabefff4a74b190cf435
131 102
6.2 Cryptographic Functions
................................................................................................................................. 93
cea2a854216faabefff4a74b190cf435
131 102
6.3 GSM Conversion Functions
............................................................................................................................. 94
cea2a854216faabefff4a74b190cf435
131 102
6.4 User verification and file access conditions
..................................................................................................... 94
cea2a854216faabefff4a74b190cf435
131 102
7 USIM Commands
.................................................................................................................................. 95
cea2a854216faabefff4a74b190cf435
131 102
7.1 AUTHENTICATE
........................................................................................................................................... 95
cea2a854216faabefff4a74b190cf435
131 102
7.1.1 Command description
................................................................................................................................ 95
cea2a854216faabefff4a74b190cf435
131 102
7.1.1.1 3G security context
............................................................................................................................... 95
cea2a854216faabefff4a74b190cf435
131 102
7.1.1.2 GSM security context
........................................................................................................................... 96
cea2a854216faabefff4a74b190cf435
131 102
7.1.2 Command parameters and data
.................................................................................................................. 96 ETSI ETSI TS 131 102 V3.1.0 (2000-04) 6 3G TS 31.102 version 3.1.0 Release 1999
cea2a854216faabefff4a74b190cf435
131 102
7.2 Encipher IMSI
................................................................................................................................................. 97
cea2a854216faabefff4a74b190cf435
131 102
7.2.1 Command description
................................................................................................................................ 97
cea2a854216faabefff4a74b190cf435
131 102
7.2.2 Command parameters and data
.................................................................................................................. 98
cea2a854216faabefff4a74b190cf435
131 102
7.3 Status Conditions Returned by the UICC
........................................................................................................ 98
cea2a854216faabefff4a74b190cf435
131 102
7.3.1 Security management
................................................................................................................................. 98
cea2a854216faabefff4a74b190cf435
131 102
7.3.2 Status Words of the Commands
................................................................................................................. 99
cea2a854216faabefff4a74b190cf435
131 102
7.4 VERIFY command
........................................................................................................................................ 100 Annex A (informative): EF changes via Data Download or USAT applications.................................... 101 Annex B (normative): Image Coding Schemes............................
3023b3863bed645c0eef46881ae16afe
125 402
1 Scope
........................................................................................................................................................6
3023b3863bed645c0eef46881ae16afe
125 402
2 References
................................................................................................................................................6
3023b3863bed645c0eef46881ae16afe
125 402
3 Definitions, symbols and abbreviations
...................................................................................................6
3023b3863bed645c0eef46881ae16afe
125 402
3.1 Definitions
............................................................................................................................................................... 6
3023b3863bed645c0eef46881ae16afe
125 402
3.2 Symbols
................................................................................................................................................................... 6
3023b3863bed645c0eef46881ae16afe
125 402
3.3 Abbreviations
.......................................................................................................................................................... 7
3023b3863bed645c0eef46881ae16afe
125 402
4 Synchronisation Issues
.............................................................................................................................7
3023b3863bed645c0eef46881ae16afe
125 402
4.1 General
.................................................................................................................................................................... 7
3023b3863bed645c0eef46881ae16afe
125 402
4.2 Network Synchronisation
........................................................................................................................................ 9
3023b3863bed645c0eef46881ae16afe
125 402
4.3 Node Synchronisation
............................................................................................................................................. 9
3023b3863bed645c0eef46881ae16afe
125 402
4.4 Transport Channel Synchronisation
........................................................................................................................ 9
3023b3863bed645c0eef46881ae16afe
125 402
4.5 Radio Interface Synchronisation
............................................................................................................................. 9
3023b3863bed645c0eef46881ae16afe
125 402
4.6 Time Alignment Handling
....................................................................................................................................... 9
3023b3863bed645c0eef46881ae16afe
125 402
5 Synchronisation Counters and Parameters
.............................................................................................10
3023b3863bed645c0eef46881ae16afe
125 402
6 Node Synchronisation
............................................................................................................................13
3023b3863bed645c0eef46881ae16afe
125 402
6.1 General
.................................................................................................................................................................. 13
3023b3863bed645c0eef46881ae16afe
125 402
6.1.1 RNC-Node B Node Synchronisation
............................................................................................................... 13
3023b3863bed645c0eef46881ae16afe
125 402
6.1.2 Inter Node B Node Synchronisation
................................................................................................................ 15
3023b3863bed645c0eef46881ae16afe
125 402
6.1.2.1 TDD Node B Synchronisation Ports
................................................................................................................ 15
3023b3863bed645c0eef46881ae16afe
125 402
6.1.2.2 TDD Inter Node B Node Synchronisation procedure
...................................................................................... 17
3023b3863bed645c0eef46881ae16afe
125 402
7 Transport Channel Synchronisation
.......................................................................................................18
3023b3863bed645c0eef46881ae16afe
125 402
7.1 General
.................................................................................................................................................................. 18 7.2 Timing adjustment and Time of Arrival monitoring on Iub/Iur interfaces............................................................ 19
3023b3863bed645c0eef46881ae16afe
125 402
8 Radio Interface Synchronisation
............................................................................................................22
3023b3863bed645c0eef46881ae16afe
125 402
8.1 General
.................................................................................................................................................................. 22
3023b3863bed645c0eef46881ae16afe
125 402
8.2 FDD Radio Interface Synchronisation
................................................................................................................... 22
3023b3863bed645c0eef46881ae16afe
125 402
8.2.1 General
............................................................................................................................................................. 22
3023b3863bed645c0eef46881ae16afe
125 402
8.2.2 Neighbour cell list timing information
............................................................................................................. 24
3023b3863bed645c0eef46881ae16afe
125 402
8.3 TDD Radio Interface Synchronisation
.................................................................................................................. 24
3023b3863bed645c0eef46881ae16afe
125 402
8.3.1 General
............................................................................................................................................................. 24
3023b3863bed645c0eef46881ae16afe
125 402
8.3.2 Radio Frame Synchronisation
.......................................................................................................................... 24
3023b3863bed645c0eef46881ae16afe
125 402
8.3.3 Multi Frame Synchronisation
.......................................................................................................................... 25
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4 Timing Advance
.............................................................................................................................................. 25
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.1 Measurement of the timing offset on the physical channels
............................................................................ 25
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.2 Assignment of correct timing advance value when establishing new channels
............................................... 26 8.3.4.2.1 Switch to DCH/DCH state ......................................................................................................................... 26
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.2.2 Switch to USCH state
................................................................................................................................. 26
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.3 Correction of timing advance value for channels in operation
........................................................................ 26
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.3.1 UE in Traffic using at least one uplink DCH
............................................................................................. 26
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.3.2 UE in Traffic using only USCH
................................................................................................................. 27
3023b3863bed645c0eef46881ae16afe
125 402
8.3.4.4 Setting of timing advance value for target cell at handover
............................................................................. 27 9 Usage of Synchronisation Counters and Parameters to support Transport Channel and Radio Interface Synchronisation ......................................................................................................................27
3023b3863bed645c0eef46881ae16afe
125 402
9.1 General
.................................................................................................................................................................. 27
3023b3863bed645c0eef46881ae16afe
125 402
9.2 Calculations performed in the UTRAN
................................................................................................................. 30
3023b3863bed645c0eef46881ae16afe
125 402
9.2.1 UE in common channel state
........................................................................................................................... 30
3023b3863bed645c0eef46881ae16afe
125 402
9.2.2 UE changes state from common CH state to dedicated CH state: 1 RL
.......................................................... 30
3023b3863bed645c0eef46881ae16afe
125 402
9.2.3 UE changes state from common CH state to dedicated CH state: several RL's (FDD only)
........................... 30
3023b3863bed645c0eef46881ae16afe
125 402
9.2.4 UE in dedicated CH state request to add a new RL or moves to another cell
.................................................. 30
3023b3863bed645c0eef46881ae16afe
125 402
9.2.5 Handover from other RAN to UMTS
.............................................................................................................. 30 3G TS 25.402 version 3.1.0 Release 1999 ETSI 4 3G TS 25.402 V 3.1.0 ETSI TS 125 402 V3.1.0 (2000-03)
3023b3863bed645c0eef46881ae16afe
125 402
9.3 Calculations performed in the UE
......................................................................................................................... 30
3023b3863bed645c0eef46881ae16afe
125 402
9.3.1 First RL
............................................................................................................................................................ 30
3023b3863bed645c0eef46881ae16afe
125 402
9.3.2 Additional RL's or UE moves into a new cell
.................................................................................................. 31
3023b3863bed645c0eef46881ae16afe
125 402
9.4 Synchronisation of L1 configuration changes
....................................................................................................... 31
3023b3863bed645c0eef46881ae16afe
125 402
10 Time Alignment Handling
.....................................................................................................................31 Annex A (informative): Change history...............................................................................................33 History.............................................................
702f3180cf38120ac6ffce92a3b68174
104 291
1 Scope
The present document describes the additional security measures put in place in the TETRA security standards, ETSI TS 100 392-7 [i.1] version 4.1.1 and later, and ETSI TS 100 396-6 [i.2] version 2.1.1 and later. Clause 4 describes the security measures in turn, and the threats that led to the inclusion of each of measu...
702f3180cf38120ac6ffce92a3b68174
104 291
2 References
702f3180cf38120ac6ffce92a3b68174
104 291
2.1 Normative references
Normative references are not applicable in the present document.
702f3180cf38120ac6ffce92a3b68174
104 291
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i...
702f3180cf38120ac6ffce92a3b68174
104 291
3 Definition of terms, symbols and abbreviations
702f3180cf38120ac6ffce92a3b68174
104 291
3.1 Terms
For the purposes of the present document, the terms given in ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1] apply. ETSI ETSI TR 104 291 V1.1.1 (2026-04) 7
702f3180cf38120ac6ffce92a3b68174
104 291
3.2 Symbols
Void.
702f3180cf38120ac6ffce92a3b68174
104 291
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: BL-ACK Basic Link ACKnowledgement BS Base Station CCK Common Cipher Key CVD Coordinated Vulnerability Disclosure DCK Derived Cipher Key DCKX eXtended Derived Cipher Key DMO Direct Mode Operation ESI Encrypted Short Identity GCK Group Cipher Ke...
702f3180cf38120ac6ffce92a3b68174
104 291
4 Security enhancements
702f3180cf38120ac6ffce92a3b68174
104 291
4.1 New authentication and air interface encryption algorithms
702f3180cf38120ac6ffce92a3b68174
104 291
4.1.1 Threat
This threat applies to TMO and DMO. The cost of computing falls year on year. The computing power needed to carry out a brute force attack on a key, which might have been out of the reach of a well-resourced attacker when an algorithm was designed, may become affordable decades later. Quantum computing, when feasible o...
702f3180cf38120ac6ffce92a3b68174
104 291
4.1.2 Countermeasure
New authentication algorithms in the TAA2 algorithm set uses an increased length of authentication key of 256 bits compared to 128 bits used with the original authentication algorithms. New air interface encryption algorithms TEA5, TEA6 and TEA7 have encryption keys 192 bits long, a considerable increase in length comp...
702f3180cf38120ac6ffce92a3b68174
104 291
4.2 Requirement for different RAND values
702f3180cf38120ac6ffce92a3b68174
104 291
4.2.1 Threat
This threat applies to TMO using the original TAA1 authentication algorithms only. Authentication requires that the SwMI and MS both know the MS's secret authentication key K, which is used to generate session keys, and together with random numbers generated by SwMI and MS can allow each to prove that the other has kno...
702f3180cf38120ac6ffce92a3b68174
104 291
4.2.2 Countermeasure
ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1], clause 4.1.4, note 2 will cause the authentication to be abandoned and restarted if the random numbers chosen by SwMI and MS are found to be equal. The DCKX derivation algorithm used for authentication and encryption with the TEA set B algorithms is not vulnerable to this a...
702f3180cf38120ac6ffce92a3b68174
104 291
4.3 TDMA frame number validation - uplink
702f3180cf38120ac6ffce92a3b68174
104 291
4.3.1 Threat
This threat applies to TMO only. The encryption process is synchronized by the TDMA frame numbering system which is broadcast by the BS. The counter value for each slot, frame, multiframe and hyperframe is fed into the encryption algorithm as an Initialization Value (IV) on both uplink and downlink to ensure that the k...
702f3180cf38120ac6ffce92a3b68174
104 291
4.3.2 Countermeasure
ETSI EN 300 392-7 or ETSI TS 100 392-7 [i.1], clause 6.3.2.0a specifies that the MS should only treat the frame numbering received from the BS as valid following an authentication of the SwMI or following a mutual authentication.