2024-04-23 | Work Programme | Version 2.3.3 |
Work Item Reference | ETSI Doc. Number |
STF | Technical Body in Charge |
Download Standard |
|||
DTR/TSGS-0333908U | TR 133 908 | 3GPP SA 3 | |||||
Current Status (Click to View Full Schedule) |
Latest Version |
Cover Date | Standstill | Creation Date | |||
|
3.0.0 | 2000-03-31 | 2000-04-26 | ||||
Rapporteur | Technical Officer | Harmonised Standard | |||||
Ansgar Bergmann | Carmine Rizzo | No | |||||
Title |
Universal Mobile Telecommunications System (UMTS); Security Algorithms Group of Experts (SAGE); General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms (3G TR 33.908 version 3.0.0 Release 1999) |
||||||
Scope and Field of Application |
Description of the work undertaken by SAGE Task Force for the design of the standard 3GPP Confidentiality and Integrity Algorithms (SAGE TF 3GPP), and to formally approve the release of these algorithms to 3GPP. With regard to the design of the algorithms, the scope of the present document is confined to a description of the design criteria, the design methodology and an outline of the content and structure of the specification and test data documents. The standard 3GPP Confidentiality and Integrity Algorithms are based on a Block Cipher named KASUMI. The algorithms specification and associated test data are documented in the Specification of the 3GPP Confidentiality and Integrity Algorithms which consists of the following four documents: -Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 specifications (TS 35.201). -Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI algorithm specification (TS 35.202). -Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 3: Implementors' test data (TS 35.203). -Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 4: Design conformance test data (TS 35.204). With regard to the evaluation of the algorithm, the scope of this report is restricted to a description of the evaluation criteria, the method of evaluation and the main conclusions from the evaluation that led to the Task Force approving the specification. A detailed summary of conclusions of the evaluation is provided in a public evaluation report [3] produced by the Task Force. |
||||||
Supporting Organizations |
Not Available |
|
Keywords | Projects | Clusters | Frequencies | Mandates | Directives | |
ALGORITHM CONFIDENTIALITY UMTS |
EMTEL MCC_3G_reporting |
Security Wireless Systems |
|||||
Official Journal |
|
||||||
Remarks |
|
Any comments or problems with this application? Please let us know... | ||