TSG SA WG3 Specifications

Important Note:

This page has been automatically generated from the 3GPP Specifications database after SA plenary meeting #12. It will be updated after each SA plenary.

For the latest specification status information please go to the 3GPP Specifications database here >>>

The latest versions of these specifications can be found http://www.3gpp.org/ftp/Specs/archive/

 

Specifications:

TSG-SA WG3 is responsible for the following GSM and 3GPP technical specifications and reports.

For Release 4 go here:
For Release 5 go here:

Release 1999

 

No.

Title

Rel

Rapporteur

TR

01.31

Fraud Information Gathering System (FIGS); Service requirements; Stage 0

R99

WRIGHT, Tim

TR

01.33

Lawful Interception requirements for GSM

R99

MCKIBBEN, Bernie

TS

01.61

General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements

R99

WALKER, Michael

TS

02.09

Security Aspects

R99

CHRISTOFFERSSON, Per

TS

02.31

Fraud Information Gathering System (FIGS) Service description; Stage 1

R99

WRIGHT, Tim

TS

02.32

Immediate Service Termination (IST); Service description; Stage 1

R99

WRIGHT, Tim

TS

02.33

Lawful Interception; Stage 1

R99

MCKIBBEN, Bernie

TS

03.20

Security-related Network Functions

R99

NGUYEN NGOC, Sebastien

TS

03.31

Fraud Information Gathering System (FIGS); Service description; Stage 2

R99

WRIGHT, Tim

TS

03.33

Lawful Interception; Stage 2

R99

MCKIBBEN, Bernie

TS

03.35

Immediate Service Termination (IST); Stage 2

R99

WRIGHT, Tim

TS

21.133

Security Threats and Requirements

R99

CHRISTOFFERSSON, Per

TS

22.022

Personalisation of GSM ME Mobile functionality specification; Stage 1

R99

NGUYEN NGOC, Sebastien

TS

33.102

Security Architecture

R99

VINCK, Bart

TS

33.103

Security Integration Guidelines

R99

BLANCHARD, Colin

TS

33.105

Cryptographic Algorithm requirements

R99

CHIKAZAWA, Takeshi

TS

33.106

Lawful interception requirements

R99

WILHELM, Berthold

TS

33.107

Lawful interception architecture and functions

R99

WILHELM, Berthold

TS

33.120

Security Objectives and Principles

R99

WRIGHT, Tim

TR

33.900

Guide to 3G security

R99

BROOKSON, Charles

TR

33.901

Criteria for cryptographic Algorithm design process

R99

BLOM, Rolf

TR

33.902

Formal Analysis of the 3G Authentication Protocol

R99

HORN, Guenther

TR

33.908

3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms

R99

WALKER, Michael

TR

33.909

3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions

R99

WALKER, Michael

TS

35.201

Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specifications

R99

WALKER, Michael

TS

35.202

Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification

R99

WALKER, Michael

TS

35.203

Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data

R99

WALKER, Michael

TS

35.204

Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data

R99

WALKER, Michael

Release 4

 

No. Title Rel Rapporteur

TS

21.133

Security Threats and Requirements

Rel-4

CHRISTOFFERSSON, Per

TS

22.022

Personalisation of GSM ME Mobile functionality specification; Stage 1

Rel-4

NGUYEN NGOC, Sebastien

TS

33.102

Security Architecture

Rel-4

VINCK, Bart

TS

33.103

Security Integration Guidelines

Rel-4

BLANCHARD, Colin

TS

33.105

Cryptographic Algorithm requirements

Rel-4

CHIKAZAWA, Takeshi

TS

33.106

Lawful interception requirements

Rel-4

WILHELM, Berthold

TS

33.107

Lawful interception architecture and functions

Rel-4

WILHELM, Berthold

TS

33.120

Security Objectives and Principles

Rel-4

WRIGHT, Tim

TS

33.200

Network Domain Security - MAP

Rel-4

KOIEN, Geir

TR

33.800

Principles for Network Domain Security

Rel-4

VACANT, 

TR

33.900

Guide to 3G security

Rel-4

BROOKSON, Charles

TR

33.901

Criteria for cryptographic Algorithm design process

Rel-4

BLOM, Rolf

TR

33.902

Formal Analysis of the 3G Authentication Protocol

Rel-4

HORN, Guenther

TR

33.903

Access Security for IP based services

Rel-4

VACANT, 

TR

33.904

Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms

Rel-4

VACANT, 

TR

33.908

3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms

Rel-4

WALKER, Michael

TR

33.909

3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions

Rel-4

WALKER, Michael

TS

35.201

Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specifications

Rel-4

WALKER, Michael

TS

35.202

Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification

Rel-4

WALKER, Michael

TS

35.203

Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data

Rel-4

WALKER, Michael

TS

35.204

Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data

Rel-4

WALKER, Michael

TR

35.205

3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General

Rel-4

WALKER, Michael

TS

35.206

3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification

Rel-4

WALKER, Michael

TS

35.207

3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors’ test data

Rel-4

WALKER, Michael

TS

35.208

3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data

Rel-4

WALKER, Michael

TR

35.909

3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation

Rel-4

WALKER, Michael

TR

41.031

Fraud Information Gathering System (FIGS); Service requirements; Stage 0

Rel-4

WRIGHT, Tim

TR

41.033

Lawful Interception requirements for GSM

Rel-4

MCKIBBEN, Bernie

TS

41.061

General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements

Rel-4

WALKER, Michael

TS

42.009

Security Aspects

Rel-4

CHRISTOFFERSSON, Per

TS

42.031

Fraud Information Gathering System (FIGS) Service description; Stage 1

Rel-4

WRIGHT, Tim

TS

42.032

Immediate Service Termination (IST); Service description; Stage 1

Rel-4

WRIGHT, Tim

TS

42.033

Lawful Interception; Stage 1

Rel-4

MCKIBBEN, Bernie

TS

43.020

Security-related Network Functions

Rel-4

GILBERT, Henri

TS

43.031

Fraud Information Gathering System (FIGS); Service description; Stage 2

Rel-4

WRIGHT, Tim

TS

43.033

Lawful Interception; Stage 2

Rel-4

MCKIBBEN, Bernie

TS

43.035

Immediate Service Termination (IST); Stage 2

Rel-4

WRIGHT, Tim

 

Release 5

 

No.

Title

Rel

Rapporteur

TS

33.106

Lawful interception requirements

Rel-5

WILHELM, Berthold

TS

33.107

Lawful interception architecture and functions

Rel-5

WILHELM, Berthold

TS

33.108

Lawful Interception; Interface between core network and law agency equipment

Rel-5

WILHELM, Berthold

TS

33.201

Access domain security

Rel-5

POPE, Maurice

TS

33.203

Access Security for IP based services

Rel-5

BOMAN, Krister

TS

33.210

Network Domain Security - IP

Rel-5

VACANT, 

TR

33.800

Principles for Network Domain Security

Rel-5

VACANT, 

TR

33.903

Access Security for IP based services

Rel-5

VACANT,