ImageVerifierCode 换一换
格式:PDF , 页数:17 ,大小:107.48KB ,
资源ID:744094      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-744094.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 155 205-2017 Digital cellular telecommunications system (Phase 2+) (GSM) Specification of the GSM-MILENAGE algorithms An example algorithm set for the GSM Authentication an .pdf)为本站会员(syndromehi216)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 155 205-2017 Digital cellular telecommunications system (Phase 2+) (GSM) Specification of the GSM-MILENAGE algorithms An example algorithm set for the GSM Authentication an .pdf

1、 ETSI TS 155 205 V14.0.0 (2017-04) Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 (3GPP TS 55.205 version 14.0.0 Release 14) TECHNICAL SPECIFICATION

2、GLOBAL SYSTEM FOR MOBILE COMMUNICATIONSRETSI ETSI TS 155 205 V14.0.0 (2017-04)13GPP TS 55.205 version 14.0.0 Release 14Reference RTS/TSGS-0355205ve00 Keywords GSM,SECURITY ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 6

3、23 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content

4、 of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Documen

5、t Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https:/portal.etsi.org/T

6、B/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanic

7、al, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications St

8、andards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo

9、are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 155 205 V14.0.0 (2017-04)23GPP TS 55.205 version 14.0.0 Release 14Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these

10、 essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest u

11、pdates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web s

12、erver) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS ident

13、ities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp. Modal verbs terminology In the present document “shall“, “shall

14、 not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct

15、citation. ETSI ETSI TS 155 205 V14.0.0 (2017-04)33GPP TS 55.205 version 14.0.0 Release 14Contents Intellectual Property Rights 2g3Foreword . 2g3Modal verbs terminology 2g3Foreword . 4g3Introduction 4g31 Scope 5g32 References 5g33 Introductory information (normative) 5g33.1 Introduction 5g33.2 Algori

16、thm Inputs and Outputs 6g33.3 Notation 6g33.3.1 Bit/Byte ordering 6g33.3.2 List of Symbols . 6g34 The GSM-MILENAGE algorithms (normative) 6g35 An alternative algorithm (informative) 7g36 Test data for GSM-MILENAGE (informative) 8g36.1 Introduction 8g36.2 Format 8g36.3 Test Sets . 9g3Annex A (informa

17、tive): Change history . 15g3History 16g3ETSI ETSI TS 155 205 V14.0.0 (2017-04)43GPP TS 55.205 version 14.0.0 Release 14Foreword This Technical Specification has been produced by the 3rdGeneration Partnership Project (3GPP). The contents of the present document are subject to continuing work within t

18、he TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for i

19、nformation; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have be

20、en incorporated in the document. Introduction This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this do

21、cument are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). ETSI ETSI TS 155 205 V14.0.0 (2017-04)53GPP TS 55.205 version 14.0.0 Release 141 Scope The present document contains an example set of algorithms which may be used as the GSM authentication and

22、key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). Section 3 (normative) introduces the algorithms and describes their input and output p

23、arameters. Section 4 (normative) defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer. Section 6 (informative) provides test data. 2 References The following documents contain provisions which, through reference in this text, constitute pr

24、ovisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a re

25、ference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. 1 3GPP TS 35.206: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G S

26、ecurity; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification“. 2 3GPP TS 35.207: “3rd Generation Partnership Project; Technical Specification Group Services

27、 and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors test data“. 3 3GPP TS 35.208: “3rd Generation Partnership Project; Technical Spec

28、ification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data“. 4 3GPP TS 33.102 version 3.10.0: “3rd G

29、eneration Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 1999)“. 5 3GPP TS 03.20 version 8.1.0: “3rd Generation Partnership Project; Digital cellular telecommunications system (Phase 2+); Security related network functions

30、(Release 1999)“. 3 Introductory information (normative) 3.1 Introduction Within the security architecture of the GSM system there are security functions A3 and A8. The operation of these functions falls completely within the domain of an individual operator, and the functions are therefore to be spe

31、cified by each operator rather than being fully standardised. The algorithms specified in this document are examples that may be used by an operator who does not wish to design his own. The inputs and outputs of the two functions are defined in section 3.2. ETSI ETSI TS 155 205 V14.0.0 (2017-04)63GP

32、P TS 55.205 version 14.0.0 Release 143.2 Algorithm Inputs and Outputs The inputs to the algorithms are given in table 1, the outputs in tables 2 and 3 below. Table 1: Inputs to A3 and A8 Parameter Size (bits) Comment Ki 128 Subscriber key Ki0Ki127 RAND 128 Random challenge RAND0RAND127 Table 2: A3 o

33、utput Parameter Size (bits) Comment SRES 32 Signed response SRES0SRES31 Table 3: A8 output Parameter Size (bits) Comment KC 64 Cipher key KC0KC63 3.3 Notation 3.3.1 Bit/Byte ordering All data variables in this specification are presented with the most significant bit (or byte) on the left hand side

34、and the least significant bit (or byte) on the right hand side. Where a variable is broken down into a number of substrings, the leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the least significant. When a variable, with bit length

35、L, is shown in hexadecimal format, bit 0 is the most significant bit of the leftmost hexadecimal digit, and bit L-1 is the least significant bit of the rightmost hexadecimal digit. 3.3.2 List of Symbols = The assignment operator. | The concatenation of the two operands. The bitwise exclusive-OR oper

36、ation. Xi The ithbit of the variable X. (X = X0 | X1 | X2 | ). 4 The GSM-MILENAGE algorithms (normative) An example algorithm set for UMTS, called MILENAGE (note 1), is specified in 1. GSM-MILENAGE makes use of MILENAGE. Specifically, the functions from the UMTS MILENAGE which we make use of are the

37、 following (we prefix all input and output names by “MIL3G-“ to distinguish them clearly from the inputs and outputs of A3 and A8): ETSI ETSI TS 155 205 V14.0.0 (2017-04)73GPP TS 55.205 version 14.0.0 Release 14Function Inputs Output f2 MIL3G-K0MIL3G-K127 MIL3G-RES0MIL3G-RES63 f3 MIL3G-CK0MIL3G-CK12

38、7 MIL3G-RAND0MIL3G-RAND127 f4 MIL3G-IK0MIL3G-IK127 The GSM-MILENAGE functions are defined as follows: - Let (MIL3G-K0MIL3G-K127) = (Ki0Ki127) - Let (MIL3G-RAND0MIL3G-RAND127) = (RAND0RAND127) - Compute MIL3G-RES, MIL3G-CK and MIL3G-IK from MIL3G-K and MIL3G-RAND, using the MILENAGE functions f2, f3,

39、 and f4 respectively - Set (KC0KC63) = (MIL3G-CK0MIL3G-CK63) (MIL3G-CK64MIL3G-CK127) (MIL3G-IK0MIL3G-IK63) (MIL3G-IK64MIL3G-IK127) - Derive SRES from MIL3G-RES using an operator-selected SRES Derivation Function. This function must be precisely specified for the GSM-MILENAGE A3 algorithm to be fully

40、 defined. The two main recommended options are as follows (note 2): - Recommended SRES Derivation Function #1: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31) (MIL3G-RES32MIL3G-RES63). - Recommended SRES Derivation Function #2: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31). Alternative SRES Derivation Functions m

41、ay be specified. NOTE 1: MILENAGE uses a 128-bit operator-specific constant OP; a value has to be assigned to this constant for MILENAGE to be fully specified. NOTE 2: The 3GPP standard conversion function to derive a GSM SRES of 32 bits from a UMTS XRES of up to 128 bits is as follows 4: SRES = XRE

42、S*1 xor XRES*2 xor XRES*3 xor XRES*4, where XRES* is 16 octets long and XRES* = XRES if XRES is 16 octets long and XRES* = XRES | 0.0 if XRES is shorter than 16 octets, XRES*i are all 4 octets long and XRES* = XRES*1 | XRES*2 | XRES*3 | XRES*4 Recommended SRES Derivation Function #1 is the result of

43、 applying this standard conversion function to a 64-bit XRES equal to MIL3G-RES0MIL3G-RES63 from MILENAGE. Recommended SRES Derivation Function #2 is the result of applying this standard conversion function to a 32-bit XRES equal to MIL3G-RES0MIL3G-RES31 from MILENAGE. 5 An alternative algorithm (in

44、formative) The GSM-MILENAGE algorithms defined in section 3 are obtained by applying standard 3G-to-2G conversion functions defined in 4 to the outputs of the UMTS MILENAGE algorithms. If there is no desire to retain this compatibility with UMTS MILENAGE used in its 2G mode, a much simpler and more

45、efficient algorithm would be to set TEMP = EKi(RAND), where E is the 128-bit block cipher used as a basic building ETSI ETSI TS 155 205 V14.0.0 (2017-04)83GPP TS 55.205 version 14.0.0 Release 14block in MILENAGE, i.e. TEMP = the result of encrypting RAND using the key Ki; then choose non-overlapping

46、 substrings of TEMP to be SRES and KC, e.g. SRES = TEMP0.TEMP31 and KC= TEMP64TEMP127. This alternative does not form any part of the GSM-MILENAGE algorithms; it is included just for information. 6 Test data for GSM-MILENAGE (informative) 6.1 Introduction The test data sets presented here are derive

47、d directly from the MILENAGE test sets in 3. 6.2 Format The format of each test data set is as follows: Test Set n Ki subscriber secret key RAND random challengeOP operator-specific MILENAGE constant OPc derived from OP and Ki see 1 MIL3G-RES MILENAGE f2 output, included for information only SRES#1

48、A3 output SRES, if Recommended SRES Derivation Function #1 is used see section 4, page 7 SRES#2 A3 output SRES, if Recommended SRES Derivation Function #2 is used see section 4, page 7 MIL3G-CK MILENAGE f3 output, included for information only MIL3G-IK MILENAGE f4 output, included for information on

49、ly Kc A8 output (cipher key) All test data in this tabular format is shown in hexadecimal representation. The first test set is also shown in binary, to show explicitly the relationship between the binary data and the hexadecimal representation. ETSI ETSI TS 155 205 V14.0.0 (2017-04)93GPP TS 55.205 version 14.0.0 Release 146.3 Test Sets Test Set 1 in binary format Ki 01000110 01011011 01011

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1