The Mobile
Broadband Standard

GPRS

EDGE

EDGE+

W-CDMA

UMTS

HSPA

HSPA+

LTE

LTE-Advanced

LTE-Advanced Pro

Confidentiality Algorithms

 Confidentiality Algorithms

3GPP confidentiality and integrity algorithms

The 3GPP Confidentiality and Integrity algorithms F8 & F9 (KASUMI) have been developed through the collaborative efforts of the 3GPP Organizational Partners.

They may be used only for the development and operation of 3G Mobile Communications and services. Every Beneficiary must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he fulfills the approval criteria specified in the Restricted Usage Undertaking (see the custodians’ respective web sites, accessible from the 3GPP home page).
Furthermore, Mitsubishi Electric Corporation holds essential patents on the Algorithms. The Beneficiary must get a separate IPR License Agreement from Mitsubishi Electronic Corporation Japan.
The relevant specs are as follows:

Specification of the 3GPP confidentiality and integrity algorithms Document 1: f8 and f9 specifications 3GPP TS 35.201
  Document 2: Kasumi algorithm specification 3GPP TS 35.202
  Document 3: Implementors’ test data 3GPP TS 35.203
  Document 4: Design conformance test data 3GPP TS 35.204
3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms   3GPP TR 33.908

Specification of the MILENAGE algorithm set

The 3GPP authentication and key generation functions (MILENAGE) have been developed through the collaborative efforts of the 3GPP Organizational Partners.

They may be used only for the development and operation of 3G Mobile Communications and services. There are no additional requirements or authorizations necessary for these algorithms to be implemented.

3G Security ; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* Document 1: General 3GPP TS 35.205
  Document 2: Algorithm specification 3GPP TS 35.206
  Document 3: Implementors’ test data 3GPP TS 35.207
  Document 4: Design conformance test data 3GPP TS 35.208
  Document 5: Summary and results of design and evaluation 3GPP TR 35.909

Recent GSM / EDGE / GPRS algorithms

The 3GPP A5/3 and GEA3 algorithms are being developed through the collaborative efforts of the 3GPP Organizational Partners. IPR and export control licencing arrangements are still in development.

Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS Document 1: A5/3 and GEA3 specification 3GPP TS 55.216
  Document 2: Implementors’ test data 3GPP TS 55.217
  Document 3: Design and conformance test data 3GPP TS 55.218
  Document 4: Design and evaluation report 3GPP TR 55.919

Early GSM algorithms

GSM has three security algorithms, A3, A5, and A8.

A3 and A8 - normally identical - are operator specific and saved in the SIM and AuC.

A5 is saved in ME and specified for data encryption and decryption over the air interface. However, it remains unpublished. See notes 3 and 4 of the 3GPP Specifications Numbering Scheme page. The general security architecture is described in 3GPP TS 43.020 (03.20 before Rel-4).

Search
More news...
poster5 2016 7small 
 
News Feeds