ImageVerifierCode 换一换
格式:PDF , 页数:119 ,大小:624.49KB ,
资源ID:743834      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-743834.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 143 020-2016 Digital cellular telecommunications system (Phase 2+) (GSM) Security related network functions (V13 3 0 3GPP TS 43 020 version 13 3 0 Release 13)《数字蜂窝通信系统(第2+阶.pdf)为本站会员(fuellot230)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 143 020-2016 Digital cellular telecommunications system (Phase 2+) (GSM) Security related network functions (V13 3 0 3GPP TS 43 020 version 13 3 0 Release 13)《数字蜂窝通信系统(第2+阶.pdf

1、 ETSI TS 143 020 V13.1.0 (2016-04) Digital cellular telecommunications system (Phase 2+) (GSM); Security related network functions (3GPP TS 43.020 version 13.1.0 Release 13) TECHNICAL SPECIFICATION GLOBAL SYSTEM FOR MOBILE COMMUNICATIONSRETSI ETSI TS 143 020 V13.1.0 (2016-04)13GPP TS 43.020 version

2、13.1.0 Release 13Reference RTS/TSGS-0343020vd10 Keywords GSM,SECURITY ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 78

3、03/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the pri

4、or written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present

5、document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the

6、following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the

7、PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETS

8、I registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 143 020 V13.1.0 (2016-04)23GPP TS 43.0

9、20 version 13.1.0 Release 13Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000

10、 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investig

11、ation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specifica

12、tion (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables.

13、 The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp. Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted a

14、s described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI TS 143 020 V13.1.0 (2016-04)33GPP TS 43.020 version 13.1.0 Release 13Contents Intellectual P

15、roperty Rights 2g3Foreword . 2g3Modal verbs terminology 2g3Foreword . 8g30 Scope 9g30.1 References 9g30.2 Abbreviations . 10g31 General . 10g32 Subscriber identity confidentiality . 11g32.1 Generality . 11g32.2 Identifying method . 11g32.3 Procedures 11g32.3.1 Location updating in the same MSC area

16、. 11g32.3.2 Location updating in a new MSCs area, within the same VLR area . 12g32.3.3 Location updating in a new VLR; old VLR reachable . 13g32.3.4 Location Updating in a new VLR; old VLR not reachable . 14g32.3.5 Reallocation of a new TMSI . 15g32.3.6 Local TMSI unknown . 16g32.3.7 Location updati

17、ng in a new VLR in case of a loss of information 17g32.3.8 Unsuccessful TMSI allocation 17g32.3.9 Combined location area updating with the routing area updating. 18g33 Subscriber identity authentication 19g33.1 Generality . 19g33.2 The authentication procedure . 19g33.3 Subscriber Authentication Key

18、 management . 20g33.3.1 General authentication procedure . 20g33.3.2 Authentication at location updating in a new VLR, using TMSI 21g33.3.3 Authentication at location updating in a new VLR, using IMSI . 22g33.3.4 Authentication at location updating in a new VLR, using TMSI, TMSI unknown in “old“ VLR

19、 23g33.3.5 Authentication at location updating in a new VLR, using TMSI, old VLR not reachable . 24g33.3.6 Authentication with IMSI if authentication with TMSI fails 24g33.3.7 Re-use of security related information in failure situations 24g34 Confidentiality of signalling information elements, conne

20、ctionless data and user information elements on physical connections 25g34.1 Generality . 25g34.2 The ciphering method . 26g34.3 Key setting 26g34.4 Ciphering key sequence number 27g34.5 Starting of the ciphering and deciphering processes 27g34.6 Synchronization 28g34.7 Handover 28g34.8 Negotiation

21、of A5 algorithm 28g34.9 Support of A5 Algorithms in MS . 29g34.10 Support of A5 Algorithms in the BSS 29g35 Synthetic summary . 30g3Annex A (informative): Security issues related to signalling schemes and key management . 31g3A.1 Introduction 31g3A.2 Short description of the schemes 31g3A.3 List of

22、abbreviations . 32g3ETSI ETSI TS 143 020 V13.1.0 (2016-04)43GPP TS 43.020 version 13.1.0 Release 13Annex B (informative): Security information to be stored in the entities of the GSM system 46g3B.1 Introduction 46g3B.2 Entities and security information . 46g3B.2.1 Home Location Register (HLR) . 46g3

23、B.2.2 Visitor Location Register (VLR) 46g3B.2.3 Mobile services Switching Centre (MSC)/Base Station System (BSS) . 46g3B.2.4 Mobile Station (MS) . 47g3B.2.5 Authentication Centre (AuC) . 47g3Annex C (normative): External specifications of security related algorithms 48g3C.0 Scope 48g3C.1 Specificati

24、ons for Algorithm A5 48g3C.1.1 Purpose . 48g3C.1.2 Implementation indications 48g3C.1.3 External specifications of Algorithm A5 50g3C.1.3.1 A5 algorithms with 64-bit keys . 50g3C.1.3.2 A5 algorithms with 128-bit keys . 50g3C.1.4 Internal specification of Algorithm A5 50g3C.1.5 Definition of NPBB for

25、 different modulations . 50g3C.2 Algorithm A3 . 50g3C.2.1 Purpose . 51g3C.2.2 Implementation and operational requirements . 51g3C.3 Algorithm A8 . 51g3C.3.1 Purpose . 51g3C.3.2 Implementation and operational requirements . 51g3Annex D (normative): Security related network functions for General Packe

26、t Radio Service 52g3D.1 General . 52g3D.2 Subscriber identity confidentiality . 52g3D.2.1 Generality . 52g3D.2.2 Identifying method . 53g3D.2.3 Procedures 53g3D.2.3.1 Routing area updating in the same SGSN area . 53g3D.2.3.2 Routing area updating in a new SGSN; old SGSN reachable . 54g3D.2.3.3 Routi

27、ng area updating in a new SGSN; old SGSN not reachable . 55g3D.2.3.4 Reallocation of a TLLI . 55g3D.2.3.5 Local TLLI unknown 56g3D.2.3.6 Routing area updating in a new SGSN in case of a loss of information . 57g3D.2.3.7 Unsuccessful TLLI allocation . 57g3D.3 Subscriber identity authentication 58g3D.

28、3.1 Generality . 58g3D.3.2 The authentication procedure . 58g3D.3.3 Subscriber Authentication Key management . 58g3D.3.3.1 General authentication procedure . 58g3D.3.3.2 Authentication at routing area updating in a new SGSN, using TLLI 59g3D.3.3.3 Authentication at routing area updating in a new SGS

29、N, using IMSI 60g3D.3.3.4 Authentication at routing area updating in a new SGSN, using TLLI, TLLI unknown in old SGSN . 61g3D.3.3.5 Authentication at routing area updating in a new SGSN, using TLLI, old SGSN not reachable 62g3D.3.3.6 Authentication with IMSI if authentication with TLLI fails . 62g3D

30、.3.3.7 Re-use of security related information in failure situations 62g3D.4 Confidentiality of user information and signalling between MS and SGSN . 63g3D.4.1 Generality . 63g3D.4.2 The ciphering method . 63g3D.4.3 Key setting 63g3D.4.4 Ciphering key sequence number 64g3D.4.5 Starting of the cipheri

31、ng and deciphering processes 64g3ETSI ETSI TS 143 020 V13.1.0 (2016-04)53GPP TS 43.020 version 13.1.0 Release 13D.4.6 Synchronisation 65g3D.4.7 Inter SGSN routing area update . 65g3D.4.8 Negotiation of GPRS-A5 algorithm . 65g3D.4.9 Support of GPRS-A5 Algorithms in MS 66g3D.5 Synthetic summary . 67g3

32、D.6 Security of the GPRS backbone . 67g3Annex E (normative): GSM Cordless Telephony System (CTS), (Phase 1); Security related network functions; Stage 2 68g3E.1 Introduction 68g3E.1.1 Scope 68g3E.1.2 References 68g3E.1.3 Definitions and Abbreviations 68g3E.1.3.1 Definitions 68g3E.1.3.2 Abbreviations

33、 69g3E.2 General . 70g3E.3 CTS local security system 71g3E.3.1 Mobile Subscriber identity confidentiality . 71g3E.3.1.1 Identifying method 71g3E.3.1.2 Procedures. 71g3E.3.1.2.1 CTSMSI assignment . 71g3E.3.1.2.2 CTSMSI update . 72g3E.3.1.2.3 CTS local identification 72g3E.3.2 Identity authentication

34、72g3E.3.2.1 The mutual authentication procedure 72g3E.3.2.1.1 Authentication failure 73g3E.3.2.2 Authentication Key management. . 73g3E.3.3 Confidentiality of user information and signalling between CTS-MS and CTS-FP 74g3E.3.3.1 The ciphering method . 74g3E.3.3.2 Key setting 74g3E.3.3.3 Starting of

35、the ciphering and deciphering processes . 75g3E.3.3.4 Synchronisation 76g3E.3.4 Structured procedures with CTS local security relevance 76g3E.3.4.1 Local Part of the Enrolment of a CTS-MS onto a CTS-FP . 76g3E.3.4.1.1 Local part of the enrolment procedure 76g3E.3.4.2 General Access procedure 79g3E.3

36、.4.2.1 Attachment 79g3E.3.4.2.2 CTS local security data update 80g3E.3.4.3 De-enrolment of a CTS-MS 80g3E.3.4.3.1 De-enrolment initiated by the CTS-FP 80g3E.3.4.3.2 De-enrolment initiated by a CTS-MS . 80g3E.4 CTS supervising security system . 81g3E.4.1 Supervision data and supervision data protecti

37、on 81g3E.4.1.1 Structure of supervision data 81g3E.4.1.2 Supervision data protection 81g3E.4.1.3 Key management 82g3E.4.2 CTS subscriber identity 82g3E.4.3 Identity authentication with the CTS operator and the PLMN . 82g3E.4.3.1 Authentication of the CTS-FP 82g3E.4.3.2 Authentication of the CTS-MS .

38、 83g3E.4.4 Secure operation control . 84g3E.4.4.1 GSM layer 3 signalling . 84g3E.4.4.2 CTS application signalling via the Fixed Network . 84g3E.4.4.3 CTS operation control procedures 85g3E.4.4.3.1 Initialisation of a CTS-FP . 85g3E.4.4.3.2 De-initialisation of a CTS-FP 85g3E.4.4.3.3 Enrolment 86g3E.

39、4.4.3.3.1 Enrolment conducted via the CTS fixed network interface . 86g3ETSI ETSI TS 143 020 V13.1.0 (2016-04)63GPP TS 43.020 version 13.1.0 Release 13E.4.4.3.4 Supervising security in the CTS-FP/CTS-SN access procedure . 87g3E.4.4.3.4.1 Update of operation data 87g3E.4.5 Equipment checking . 88g3E.

40、4.6 FP-SIM card checking 88g3E.5 Other CTS security features . 89g3E.5.1 Secure storage of sensitive data and software in the CTS-MS . 89g3E.5.1.1 Inside CTS-ME . 89g3E.5.2 Secure storage of sensitive data and software in CTS-FP 89g3E.5.3 CTS-FP reprogramming protection 89g3E.6 FP Integrity . 89g3E.

41、6.1 Threats 90g3E.6.1.1 Changing of FP software 90g3E.6.1.2 Changing of IFPEI 91g3E.6.1.3 Changing of IFPSI and operator and subscription related keys (KiFP, KOP) . 91g3E.6.1.4 Changing of timers and timer limits . 91g3E.6.1.5 Changing of radio usage parameters . 91g3E.6.2 Protection and storage mec

42、hanisms 91g3E.6.2.1 Static or semi static values 91g3E.6.2.2 Timers . 91g3E.6.2.3 Physical protection 91g3E.7 Type approval issues 92g3E.8 Security information to be stored in the entities of the CTS 92g3E.8.1 Entities and security information 92g3E.8.1.1 CTS-HLR 92g3E.8.1.2 CTS-SN 92g3E.8.1.3 CTS-A

43、uC 93g3E.8.1.4 CTS Fixed Part Equipment (CTS-FPE) 93g3E.8.1.5 Fixed Part SIM card (FP-SIM) . 93g3E.8.1.6 CTS Mobile Equipment (CTS-ME) 94g3E.8.1.7 Mobile Station SIM card (MS-SIM) . 94g3E.9 External specification of security related algorithms . 94g3E.9.1 Algorithm B1 95g3E.9.1.1 Purpose . 95g3E.9.1

44、.2 Implementation and operational requirements 95g3E.9.2 Algorithm B2 95g3E.9.2.1 Purpose . 95g3E.9.2.2 Implementation and operational requirements 95g3E.9.3 Algorithms B3 and B4 96g3E.9.3.1 Purpose . 96g3E.9.3.2 Implementation and operational requirements 96g3E.9.4 Algorithms B5 and B6 96g3E.9.4.1

45、Purpose . 96g3E.9.4.2 Implementation and operational requirements 96g3E.10 Coding of the FPAC and CTS-PIN 97g3E.11 (informative annex): Guidelines for generation of random numbers . 97g3Annex F (normative): Ciphering of Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS) 99g3F.1 Introd

46、uction 99g3F.1.1 Scope 99g3F.1.2 References 99g3F.1.3 Definitions and Abbreviations 100g3F.1.3.1 Definitions 100g3F.1.3.2 Abbreviations 100g3F.2 Security Requirements . 100g3ETSI ETSI TS 143 020 V13.1.0 (2016-04)73GPP TS 43.020 version 13.1.0 Release 13F.3 Storage of the Master Group Keys and overvi

47、ew of flows 101g3F.3.1 Distribution of ciphering data during establishment of a voice/broadcast group call . 101g3F.3.2 Signalling information required for the voice group call uplink access in the anchor MSC (normal case, subsequent talker on dedicated channel) 104g3F.3.3 Signalling information req

48、uired to transfer the originator or subsequent talker from a dedicated channel to a group call channel 106g3F.4 Key derivation 106g3F.4.1 Key derivation within the USIM / GCR . 107g3F.4.2 Key derivation within the ME/BSS 108g3F.4.3 Encryption algorithm selection. 109g3F.4.4 Algorithm requirements .

49、109g3F.4.4.1 A8_V 109g3F.4.4.2 KMF 109g3F.5 Encryption of voice group calls 110g3F.6 Specification of the Key Modification Function (KMF) 110g3Annex G (informative): Generation of VSTK_RAND 111g3Annex H (normative): Access security related functions for enhanced General Packet Radio Service (GPRS) in relation to Cellular Internet of Things (CIoT) 112g3H.1 Introduction 112g3H.1.1 General . 112g3H.1.2 Considerations on bidding down attacks 112g3H.2 Authentication and key agreement . 112g3H.3 Ciphering and integrity mode negotiation 112g3H.4 Protection of GMM messages 114g3H.

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1