This page has been automatically generated from the 3GPP Specifications database after SA plenary meeting #12. It will be updated after each SA plenary.
For the latest specification status information please go to the 3GPP Specifications database here >>>
The latest versions of these specifications can be found http://www.3gpp.org/ftp/Specs/archive/
TSG-SA WG3 is responsible for the following GSM and 3GPP technical specifications and reports.
For Release 4 go here:
For Release 5 go here:
|
|
No. |
Title |
Rel |
Rapporteur |
|
TR |
01.31 |
Fraud Information Gathering System (FIGS); Service requirements; Stage 0 |
R99 |
WRIGHT, Tim |
|
TR |
01.33 |
Lawful Interception requirements for GSM |
R99 |
MCKIBBEN, Bernie |
|
TS |
01.61 |
General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements |
R99 |
WALKER, Michael |
|
TS |
02.09 |
Security Aspects |
R99 |
CHRISTOFFERSSON, Per |
|
TS |
02.31 |
Fraud Information Gathering System (FIGS) Service description; Stage 1 |
R99 |
WRIGHT, Tim |
|
TS |
02.32 |
Immediate Service Termination (IST); Service description; Stage 1 |
R99 |
WRIGHT, Tim |
|
TS |
02.33 |
Lawful Interception; Stage 1 |
R99 |
MCKIBBEN, Bernie |
|
TS |
03.20 |
Security-related Network Functions |
R99 |
NGUYEN NGOC, Sebastien |
|
TS |
03.31 |
Fraud Information Gathering System (FIGS); Service description; Stage 2 |
R99 |
WRIGHT, Tim |
|
TS |
03.33 |
Lawful Interception; Stage 2 |
R99 |
MCKIBBEN, Bernie |
|
TS |
03.35 |
Immediate Service Termination (IST); Stage 2 |
R99 |
WRIGHT, Tim |
|
TS |
21.133 |
Security Threats and Requirements |
R99 |
CHRISTOFFERSSON, Per |
|
TS |
22.022 |
Personalisation of GSM ME Mobile functionality specification; Stage 1 |
R99 |
NGUYEN NGOC, Sebastien |
|
TS |
33.102 |
Security Architecture |
R99 |
VINCK, Bart |
|
TS |
33.103 |
Security Integration Guidelines |
R99 |
BLANCHARD, Colin |
|
TS |
33.105 |
Cryptographic Algorithm requirements |
R99 |
CHIKAZAWA, Takeshi |
|
TS |
33.106 |
Lawful interception requirements |
R99 |
WILHELM, Berthold |
|
TS |
33.107 |
Lawful interception architecture and functions |
R99 |
WILHELM, Berthold |
|
TS |
33.120 |
Security Objectives and Principles |
R99 |
WRIGHT, Tim |
|
TR |
33.900 |
Guide to 3G security |
R99 |
BROOKSON, Charles |
|
TR |
33.901 |
Criteria for cryptographic Algorithm design process |
R99 |
BLOM, Rolf |
|
TR |
33.902 |
Formal Analysis of the 3G Authentication Protocol |
R99 |
HORN, Guenther |
|
TR |
33.908 |
3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms |
R99 |
WALKER, Michael |
|
TR |
33.909 |
3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions |
R99 |
WALKER, Michael |
|
TS |
35.201 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specifications |
R99 |
WALKER, Michael |
|
TS |
35.202 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification |
R99 |
WALKER, Michael |
|
TS |
35.203 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data |
R99 |
WALKER, Michael |
|
TS |
35.204 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data |
R99 |
WALKER, Michael |
|
|
No. | Title | Rel | Rapporteur |
|
TS |
21.133 |
Security Threats and Requirements |
Rel-4 |
CHRISTOFFERSSON, Per |
|
TS |
22.022 |
Personalisation of GSM ME Mobile functionality specification; Stage 1 |
Rel-4 |
NGUYEN NGOC, Sebastien |
|
TS |
33.102 |
Security Architecture |
Rel-4 |
VINCK, Bart |
|
TS |
33.103 |
Security Integration Guidelines |
Rel-4 |
BLANCHARD, Colin |
|
TS |
33.105 |
Cryptographic Algorithm requirements |
Rel-4 |
CHIKAZAWA, Takeshi |
|
TS |
33.106 |
Lawful interception requirements |
Rel-4 |
WILHELM, Berthold |
|
TS |
33.107 |
Lawful interception architecture and functions |
Rel-4 |
WILHELM, Berthold |
|
TS |
33.120 |
Security Objectives and Principles |
Rel-4 |
WRIGHT, Tim |
|
TS |
33.200 |
Network Domain Security - MAP |
Rel-4 |
KOIEN, Geir |
|
TR |
33.800 |
Principles for Network Domain Security |
Rel-4 |
VACANT, |
|
TR |
33.900 |
Guide to 3G security |
Rel-4 |
BROOKSON, Charles |
|
TR |
33.901 |
Criteria for cryptographic Algorithm design process |
Rel-4 |
BLOM, Rolf |
|
TR |
33.902 |
Formal Analysis of the 3G Authentication Protocol |
Rel-4 |
HORN, Guenther |
|
TR |
33.903 |
Access Security for IP based services |
Rel-4 |
VACANT, |
|
TR |
33.904 |
Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms |
Rel-4 |
VACANT, |
|
TR |
33.908 |
3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms |
Rel-4 |
WALKER, Michael |
|
TR |
33.909 |
3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions |
Rel-4 |
WALKER, Michael |
|
TS |
35.201 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specifications |
Rel-4 |
WALKER, Michael |
|
TS |
35.202 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification |
Rel-4 |
WALKER, Michael |
|
TS |
35.203 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data |
Rel-4 |
WALKER, Michael |
|
TS |
35.204 |
Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data |
Rel-4 |
WALKER, Michael |
|
TR |
35.205 |
3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General |
Rel-4 |
WALKER, Michael |
|
TS |
35.206 |
3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification |
Rel-4 |
WALKER, Michael |
|
TS |
35.207 |
3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors’ test data |
Rel-4 |
WALKER, Michael |
|
TS |
35.208 |
3G Security; Specification of the MILENAGE algorithm set: An example algorithm Set for the 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data |
Rel-4 |
WALKER, Michael |
|
TR |
35.909 |
3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation |
Rel-4 |
WALKER, Michael |
|
TR |
41.031 |
Fraud Information Gathering System (FIGS); Service requirements; Stage 0 |
Rel-4 |
WRIGHT, Tim |
|
TR |
41.033 |
Lawful Interception requirements for GSM |
Rel-4 |
MCKIBBEN, Bernie |
|
TS |
41.061 |
General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements |
Rel-4 |
WALKER, Michael |
|
TS |
42.009 |
Security Aspects |
Rel-4 |
CHRISTOFFERSSON, Per |
|
TS |
42.031 |
Fraud Information Gathering System (FIGS) Service description; Stage 1 |
Rel-4 |
WRIGHT, Tim |
|
TS |
42.032 |
Immediate Service Termination (IST); Service description; Stage 1 |
Rel-4 |
WRIGHT, Tim |
|
TS |
42.033 |
Lawful Interception; Stage 1 |
Rel-4 |
MCKIBBEN, Bernie |
|
TS |
43.020 |
Security-related Network Functions |
Rel-4 |
GILBERT, Henri |
|
TS |
43.031 |
Fraud Information Gathering System (FIGS); Service description; Stage 2 |
Rel-4 |
WRIGHT, Tim |
|
TS |
43.033 |
Lawful Interception; Stage 2 |
Rel-4 |
MCKIBBEN, Bernie |
|
TS |
43.035 |
Immediate Service Termination (IST); Stage 2 |
Rel-4 |
WRIGHT, Tim |
|
|
No. |
Title |
Rel |
Rapporteur |
|
TS |
33.106 |
Lawful interception requirements |
Rel-5 |
WILHELM, Berthold |
|
TS |
33.107 |
Lawful interception architecture and functions |
Rel-5 |
WILHELM, Berthold |
|
TS |
33.108 |
Lawful Interception; Interface between core network and law agency equipment |
Rel-5 |
WILHELM, Berthold |
|
TS |
33.201 |
Access domain security |
Rel-5 |
POPE, Maurice |
|
TS |
33.203 |
Access Security for IP based services |
Rel-5 |
BOMAN, Krister |
|
TS |
33.210 |
Network Domain Security - IP |
Rel-5 |
VACANT, |
|
TR |
33.800 |
Principles for Network Domain Security |
Rel-5 |
VACANT, |
|
TR |
33.903 |
Access Security for IP based services |
Rel-5 |
VACANT, |