TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf

上传人:twoload295 文档编号:1060089 上传时间:2019-03-31 格式:PDF 页数:62 大小:595.58KB
下载 相关 举报
TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf_第1页
第1页 / 共62页
TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf_第2页
第2页 / 共62页
TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf_第3页
第3页 / 共62页
TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf_第4页
第4页 / 共62页
TIA-1121 005-1-2009 Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification (Incorporates Addendum 1)《超移动宽带(UMB)空中接口规范的安全功能 包含补充件1 编辑代替TIA-1121 005》.pdf_第5页
第5页 / 共62页
点击查看更多>>
资源描述

1、 TIA-1121.005-1-2009 APPROVED: MAY 1, 2009 REAFFIRMED: DECEMBER 2, 2013 TIA-1121.005-1 May 2009Security Functions for Ultra Mobile Broadband (UMB) Air Interface Specification NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstand

2、ings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect pr

3、eclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publi

4、cations are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purp

5、ort to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. Any use of tra

6、demarks in this document are for information purposes and do not constitute an endorsement by TIA or this committee of the products or services of the company. (From Project No. PN-3-0272.005-AD1-RF1, formulated under the cognizance of the TIA TR-45 Mobile (b) there is no assurance that the Document

7、 will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights

8、 (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consisting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requeste

9、d, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parti

10、es involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or represent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Do

11、cument contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandat

12、ory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or investigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement o

13、f voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Information as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Pat

14、ent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, inspect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXP

15、RESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY D

16、ISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT O

17、R PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DA

18、MAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMEN

19、T OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. 3GPP2 C.S0084-005-0 v3.0 CONTENTS i FOREWORD.ix 1 NOTES . xi 2 REFERENCESxi 3 1 Introduction1-1 4 2 AES CIPHERING PROTOCOL 2-1 5 2.1 Primitives and Public Data 2-1 6 2.1.1 Commands 2-1 7 2

20、.1.2 Return Indications.2-1 8 2.1.3 Procedure Calls .2-1 9 2.1.4 Local Common Data 2-2 10 2.1.5 Public Data2-2 11 2.2 Protocol Data Unit.2-2 12 2.3 Procedures and Messages for the InConfiguration Instance of the Protocol2-2 13 2.3.1 Protocol Initialization for the InConfiguration Protocol Instance.2

21、-2 14 2.3.2 Procedures 2-3 15 2.3.3 Message Formats.2-3 16 2.4 Procedures and Messages for the InUse Instance of the Protocol .2-3 17 2.4.1 Procedures 2-3 18 2.4.1.1 Protocol Initialization for the InUse Protocol Instance.2-3 19 2.4.1.2 Hard Commit Procedures.2-3 20 2.4.1.3 Soft Commit Procedures 2-

22、3 21 2.4.1.4 Constructing the Ciphering Key .2-3 22 2.4.1.5 Constructing the Cryptosync .2-4 23 2.4.1.6 Encrypt Procedures .2-5 24 2.4.1.7 Decryption Procedures.2-7 25 2.4.2 Message Formats.2-9 26 2.4.3 Interface to Other Protocols .2-9 27 2.4.3.1 Commands 2-9 28 2.4.3.2 Indications.2-9 29 2.5 Confi

23、guration Attributes2-9 30 2.5.1 Simple Attributes.2-9 31 3GPP2 C.S0084-005-0 v3.0 CONTENTS ii 2.5.2 Complex Attributes .2-10 1 2.5.2.1 FTCReducedStrengthCipheringKey Attribute .2-10 2 2.5.2.2 RTCReducedStrengthCipheringKey Attribute.2-10 3 2.6 Non-Attribute Data .2-11 4 2.7 Protocol Numeric Constant

24、s2-11 5 2.8 Session State Information .2-11 6 3 Basic Message Integrity Protocol .3-1 7 3.1 3.1 Overview .3-1 8 3.2 Primitives and Public Data3-1 9 3.2.1 Commands3-1 10 3.2.2 Return Indications 3-1 11 3.2.3 Procedure Calls .3-1 12 3.2.4 Local Common Data3-2 13 3.2.5 Public Data .3-2 14 3.3 Protocol

25、Data Unit.3-2 15 3.4 Procedures and Messages for the InConfiguration Instance of the Protocol3-3 16 3.4.1 Protocol Initialization for the InConfiguration Protocol Instance.3-3 17 3.4.2 Procedures 3-3 18 3.4.3 Message Formats 3-3 19 3.5 Procedures and Messages for the InUse Instance of the Protocol .

26、3-3 20 3.5.1 Procedures 3-3 21 3.5.1.1 Protocol Initialization for the InUse Protocol Instance 3-3 22 3.5.1.2 Hard Commit Procedures 3-3 23 3.5.1.3 Soft Commit Procedures 3-3 24 3.5.1.4 Constructing the Message Integrity Key.3-3 25 3.5.1.5 Constructing the Cryptosync .3-4 26 3.5.1.6 Authentication H

27、eader.3-5 27 3.5.1.7 AUTHENTICATE_ADD_TAG procedures.3-6 28 3.5.1.8 AUTHENTICATE_CHECK_TAG procedures 3-7 29 3.5.1.9 CREATE_ID_TAG procedures.3-9 30 3.5.2 Message Formats 3-10 31 3.6 Interface to Other Protocols.3-10 32 3GPP2 C.S0084-005-0 v3.0 CONTENTS iii 3.6.1 Commands 3-10 1 3.6.2 Indications 3-

28、10 2 3.7 Configuration Attributes3-10 3 3.8 Non-Attribute Data3-10 4 3.9 Protocol Numeric Constants 3-10 5 3.10 Session State Information3-10 6 4 Basic Key Exchange Protocol.4-1 7 4.1 Overview4-1 8 4.2 Primitives and Public Data 4-1 9 4.2.1 Commands 4-1 10 4.2.2 Return Indications.4-1 11 4.2.3 Local

29、 Common Data 4-1 12 4.2.4 Public Data4-1 13 4.2.5 Interface to Other Protocols .4-2 14 4.2.5.1 Commands 4-2 15 4.2.5.2 Indications.4-2 16 4.3 Protocol Data Unit.4-2 17 4.4 Procedures and Messages for the InConfiguration Instance of the Protocol4-2 18 4.4.1 Protocol Initialization for the InConfigura

30、tion Protocol Instance.4-2 19 4.4.2 Procedures 4-2 20 4.4.3 Message Formats.4-3 21 4.5 Procedures and Messages for the InUse Instance of the Protocol .4-3 22 4.5.1 Procedures 4-3 23 4.5.1.1 Protocol Initialization for the InUse Protocol Instance.4-3 24 4.5.1.2 Hard Commit Procedures.4-3 25 4.5.1.3 S

31、oft Commit Procedures 4-3 26 4.5.1.4 Access Terminal Requirements 4-3 27 4.5.1.4.1 Initiating the key exchange 4-4 28 4.5.1.4.2 Processing a KeyResponse message .4-4 29 4.5.1.4.3 Processing a KeyReject message.4-5 30 4.5.1.4.4 Processing an ATSupportedSecuritySubtypesRequest message 4-5 31 4.5.1.5 A

32、ccess Network Requirements .4-6 32 3GPP2 C.S0084-005-0 v3.0 CONTENTS iv 4.5.1.5.1 Initiating the key exchange 4-6 1 4.5.1.5.2 Processing a KeyRequest message .4-6 2 4.5.1.5.3 Processing a KeyComplete message .4-6 3 4.5.1.6 MICKey Derivation.4-6 4 4.5.1.7 Message Integrity Key and Ciphering Key Gener

33、ation 4-6 5 4.5.1.7.1 Temporary Security Key Derivation4-7 6 4.5.1.7.2 Message Integrity Key and Ciphering Keys Generation from TSKey 4-7 7 4.5.1.8 EHMAC-SHA256(key, message, MAC_length).4-7 8 4.5.2 Message Formats 4-8 9 4.5.2.1 KeyRequest4-8 10 4.5.2.2 KeyResponse .4-8 11 4.5.2.3 KeyComplete .4-11

34、12 4.5.2.4 KeyReject.4-12 13 4.5.2.5 InitiateKeyRequest.4-13 14 4.5.2.6 ATSupportedSecuritySubtypesRequest4-13 15 4.5.2.7 ATSupportedSecuritySubtypesResponse4-13 16 4.5.3 Interface to Other Protocols.4-15 17 4.5.3.1 Commands4-15 18 4.5.3.2 Indications 4-15 19 4.6 Configuration Attributes .4-15 20 4.

35、6.1 Simple Attributes 4-15 21 4.6.2 Complex Attributes .4-15 22 4.6.2.1 ATSupportedSecuritySubtypes Attribute .4-15 23 4.7 Non-Attribute Data .4-16 24 4.8 Protocol Numeric Constants4-16 25 4.9 Session State Information .4-16 26 4.9.1 DerivedMSK Parameter .4-16 27 28 3GPP2 C.S0084-005-0 v3.0 FIGURES

36、v Figure 3-1. AUTHENTICATE_ADD_TAG procedure call payloads 3-6 1 Figure 3-2. AUTHENTICATE_CHECK_TAG procedure call payloads3-8 2 3 3GPP2 C.S0084-005-0 v3.0 FIGURES vi No text.1 3GPP2 C.S0084-005-0 v3.0 TABLES vii Table 2-1. Subfield of the Cryptosync.2-5 1 Table 2-2. Configurable Values.2-9 2 Table

37、3-1. Subfield of the Cryptosync.3-4 3 Table 3-2. Authentication Headers .3-5 4 Table 3-3. AuthKeyIndex encoding .3-5 5 Table 3-4. Protocol Numeric Constants 3-10 6 Table 4-1. KeyRequest Message4-8 7 Table 4-2. Definition of Result field 4-12 8 Table 4-3. Protocol Numeric Constants 4-16 9 Table 4-4.

38、The Format of the Parameter Record for the DerivedMSK Parameter4-17 10 11 3GPP2 C.S0084-005-0 v3.0 TABLES viii No text. 1 3GPP2 C.S0084-005-0 v3.0 FOREWORD ix (This foreword is not part of this Standard) 1 This standard was prepared by Technical Specification Group C of the Third Generation 2 Partne

39、rship Project 2 (3GPP2). This Standard is the Security Functions part of the Ultra 3 Mobile Broadband (UMB)1air interface. Other parts of this Standard are: 4 Overview for Ultra Mobile Broadband (UMB) Air Interface Specification 5 Physical Layer for Ultra Mobile Broadband (UMB) Air Interface Specifi

40、cation 6 MAC Layer for Ultra Mobile Broadband (UMB) Air Interface Specification 7 Radio Link Layer for Ultra Mobile Broadband (UMB) Air Interface Specification 8 Application Layer for Ultra Mobile Broadband (UMB) Air Interface Specification 9 Connection Control Plane for Ultra Mobile Broadband (UMB)

41、 Air Interface Specification 10 Session Control Plane for Ultra Mobile Broadband (UMB) Air Interface Specification 11 Route Control Plane for Ultra Mobile Broadband (UMB) Air Interface Specification 12 Broadcast-Multicast Upper Layers for Ultra Mobile Broadband (UMB) Air Interface 13 Specification 1

42、4 Other Standards may be required to implement this system and are listed in the References 15 section of each part. 16 This standard provides a specification for land mobile wireless systems based upon cellular 17 principles. This Standard is one part of the IMT-2000 CDMA Multi-Carrier, IMT-2000 18

43、 CDMA MC, also known as cdma20002.19 1Ultra Mobile Broadband and (UMB) are trade and service marks owned by the CDMA Development Group (CDG). 2cdma2000is the trademark for the technical nomenclature for certain specifications and standards of the Organizational Partners (OPs) of 3GPP2. Geographicall

44、y (and as of the date of publication), cdma2000is a registered trademark of the Telecommunications Industry Association (TIA-USA) in the United States. 3GPP2 C.S0084-005-0 v3.0 FOREWORD x No text. 1 3GPP2 C.S0084-005-0 v3.0 REFERENCES xi The following documents contain provisions, which, through ref

45、erence in this text, 1 constitute provisions of this document. References are either specific (identified by date of 2 publication, edition number, version number, etc.) or non-specific. For a specific reference, 3 subsequent revisions do not apply. For a non-specific reference, the latest version a

46、pplies. 4 In the case of a reference to a 3GPP2 document, a non-specific reference implicitly refers to 5 the latest version of that document in the same Release as the present document. 6 7 1 C.S0084-000-0, Overview for Ultra Mobile Broadband (UMB) Air Interface 8 Specification. 9 2 C.S0084-001-0,

47、Physical Layer for Ultra Mobile Broadband (UMB) Air Interface 10 Specification. 11 3 C.S0084-002-0, MAC Layer for Ultra Mobile Broadband (UMB) Air Interface 12 Specification. 13 4 C.S0084-003-0, Radio Link Layer for Ultra Mobile Broadband (UMB) Air Interface 14 Specification. 15 5 C.S0084-004-0, App

48、lication Layer for Ultra Mobile Broadband (UMB) Air Interface 16 Specification. 17 6 Reserved. 18 7 C.S0084-006-0, Connection Control Plane for Ultra Mobile Broadband (UMB) Air 19 Interface Specification. 20 8 C.S0084-007-0, Session Control Plane for Ultra Mobile Broadband (UMB) Air 21 Interface Spe

49、cification. 22 9 C.S0084-008-0, Route Control Plane for Ultra Mobile Broadband (UMB) Air 23 Interface Specification. 24 10 C.S0084-009-0, Broadcast-Multicast Upper Layer for Ultra Mobile Broadband 25 (UMB) Air Interface Specification. 26 11 C.R1001, Administration of Parameter Value Assignments for cdma2000 Spread 27 Spectrum Standards. (Informative) 28 12 S.S0055, Enhanced Cryptographic Algorithms. 29 13 S.S0078, Common Security Algorithms. 30 14 NIST, Special Publication 800-38B Draft, “Recommendation for Block Cipher 31 Modes of Opera

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1