1、 ETSI TS 1Universal Mobile TelProximityS(3GPP TS 33.3TECHNICAL SPECIFICATION133 303 V12.6.0 (2016elecommunications System (LTE; ty-based Services (ProSe); Security aspects .303 version 12.6.0 Release 1216-01) (UMTS); 12) ETSI ETSI TS 133 303 V12.6.0 (2016-01)13GPP TS 33.303 version 12.6.0 Release 12
2、Reference RTS/TSGS-0333303vc60 Keywords LTE,SECURITY,UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Import
3、ant notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written a
4、uthorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document sho
5、uld be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following se
6、rvices: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version
7、shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered
8、 for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 133 303 V12.6.0 (2016-01)23GPP TS 33.303 version 1
9、2.6.0 Release 12Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intel
10、lectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, inclu
11、ding IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) ha
12、s been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross r
13、eference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp. Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described
14、in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI TS 133 303 V12.6.0 (2016-01)33GPP TS 33.303 version 12.6.0 Release 12Contents Intellectual Property Righ
15、ts 2g3Foreword . 2g3Modal verbs terminology 2g3Foreword . 6g31 Scope 7g32 References 7g33 Definitions and abbreviations . 9g33.1 Definitions 9g33.2 Abbreviations . 9g34 Overview of ProSe security 11g34.1 General . 11g34.2 Reference points and Functional Entities . 11g35 Common security procedures .
16、11g35.1 General . 11g35.2 Network domain security . 11g35.2.1 General 11g35.2.2 Security requirements . 11g35.2.3 Security procedures. 11g35.3 Security of UE to ProSe Function interface . 12g35.3.1 General 12g35.3.2 Security requirements . 12g35.3.3 Security procedures. 12g35.3.3.1 Security procedur
17、es for configuration transfer to the UICC 12g35.3.3.2 Security procedures for data transfer to the UE 12g36 Security for ProSe features . 14g36.1 ProSe direct discovery 14g36.1.1 Overview of ProSe direct discovery in network coverage 14g36.1.2 Security requirements . 14g36.1.3 Security procedures. 1
18、4g36.1.3.1 Interface between the UE and ProSe Function 14g36.1.3.2 Interfaces between network elements 14g36.1.3.3 Integrity protection and validation of the transmitted code for open discovery 14g36.1.3.3.1 Open discovery security flows 14g36.2 Security for One-to-many ProSe direct communication. 1
19、7g36.2.1 Overview of One-to-many ProSe direct communication 17g36.2.2 Security requirements . 17g36.2.3 Bearer layer security mechanism 18g36.2.3.1 Security keys and their lifetimes . 18g36.2.3.2 Identities 18g36.2.3.3 Security flows . 20g36.2.3.3.1 Overview . 20g36.2.3.3.2 Messages between UE and P
20、roSe Key Management Function . 22g36.2.3.3.2.1 General . 22g36.2.3.3.2.2 Key Request and Key Response messages 22g36.2.3.3.2.3 MIKEY messages 24g36.2.3.3.2.3.1 General . 24g36.2.3.3.2.3.2 Creation of the MIKEY key delivery message . 24g36.2.3.3.2.3.3 Processing the MIKEY key delivery message . 24g36
21、.2.3.3.2.3.4 MIKEY Verification message 25g36.2.3.4 Protection of traffic between UE and ProSe Function 25g32.6.2.3.5 Protection of traffic between UE and ProSe Key Management Function . 25g3ETSI ETSI TS 133 303 V12.6.0 (2016-01)43GPP TS 33.303 version 12.6.0 Release 126.2.3.6 Protection of traffic
22、between UEs . 25g36.2.3.6.1 Protection of data . 25g36.2.3.6.2 Key derivation data in PDCP header . 26g36.2.4 Solution description for media security of one-to-many communications . 27g36.2.4.1 Media stream protection 27g36.2.4.2 Overview of key management solution . 28g36.2.4.3 UE provisioning by K
23、MS 29g36.2.4.3.1 General 29g36.2.4.3.2 Pre-provisioning 29g36.2.4.3.3 UE to KMS connection security 29g36.2.4.3.4 Provisioning request 29g36.2.4.4 Provisioning of the group master key 31g36.2.4.4.1 General 31g36.2.4.4.2 Security procedures for GMK provisioning 31g36.2.4.5 GSK distribution for group
24、media security . 33g36.2.4.5.1 General 33g36.2.4.5.2 Security procedures for GSK distribution (network independent) 33g36.2.4.5.3 Security procedures for GSK distribution (network connected) 34g36.3 EPC-level discovery of ProSe-enabled UEs . 37g36.3.1 Security for proximity request authentication an
25、d authorization 37g36.3.1.1 General 37g36.3.1.2 Application Server-signed proximity request 37g36.3.1.3 Proximity request digital signature algorithms and key strength 38g36.3.1.4 Proximity request hash input format . 40g36.3.1.5 Verification key format . 40g36.3.1.6 Profile for Application Server c
26、ertificate 40g36.3.2 Protection of traffic between UE and ProSe Function 40g36.4 Security for EPC support WLAN direct discovery and communication 41g3Annex A (normative): Key derivation functions . 42g3A.1 KDF interface and input parameter construction . 42g3A.1.1 General . 42g3A.1.2 FC value alloca
27、tions . 42g3A.2 Calculation of the MIC value . 42g3A.3 Calculation of PTK . 42g3A.4 Calculation of keys from PTK 43g3Annex B (Normative): KMS provisioning messages to support media security . 44g3B.1 General aspects . 44g3B.2 KMS requests . 44g3B.3 KMS responses . 44g3B.3.0 General . 44g3B.3.1 KMS C
28、ertificates 45g3B.3.1.1 Description 45g3B.3.1.2 Fields 45g3B.3.1.3 User IDs 45g3B.3.1.4 Constructing the UserID from a KMS certificate. 46g3B.3.1.4.0 General 46g3B.3.1.4.1 The “Hash“ UserID Conversion 46g3B.3.1.4.2 Example UserID Construction 47g3B.3.1.5 Signing using ECDSA and the Root KMS Certific
29、ate 47g3B.3.2 User Key Provision 47g3B.3.2.1 Description 47g3B.3.2.2 Fields 47g3B.3.3 Example KMS Response XML 48g3B.3.3.1 Example KMSInit XML . 48g3B.3.3.1 Example KMSKeyProv XML. 48g3B.3.3.1 Example KMSCertCache XML 49g3ETSI ETSI TS 133 303 V12.6.0 (2016-01)53GPP TS 33.303 version 12.6.0 Release 1
30、2B.3.4 KMS Response XML Schema 50g3Annex C (Normative): SRTP/SRTCP Profile 53g3Annex D (Normative): MIKEY Message Formats for Media Security . 54g3D.1 General aspects . 54g3D.1.0 Introduction 54g3D.1.1 MIKEY common fields 54g3D.2 MIKEY message structure for GMK Distribution . 54g3D.3 MIKEY message s
31、tructure for GSK distribution . 55g3D.4 Exporting the GSK to SRTP 56g3Annex E (Normative): Key Request and Response messages . 57g3E.1 Introduction 57g3E.2 Transport protocol for messages between UE and ProSe Key Management Function 57g3E.3 XML Schema . 57g3E.4 Semantics . 59g3E.4.1 General . 59g3E.
32、4.2 Semantics of 59g3E.4.3 Semantics of 59g3E.5 General message format and information elements coding 60g3E.5.2.2 Parameters in ProSe key management messages 61g3E.5.2.2.1 Transaction ID . 61g3E.5.2.2.2 Supported Algorithm . 61g3E.5.2.2.3 Group ID . 61g3E.5.2.2.4 PGK ID . 61g3E.5.2.2.5 Error Code .
33、 61g3E.5.2.2.6 Group Member ID . 62g3E.5.2.2.7 Algorithm Info 62g3Annex F (Informative): Network options for PC3 security 63g3F.1 General . 63g3F.2 Prose Function using standalone BSF 63g3F.3 BSF - Prose Function/NAF colocation . 63g3F.4 Prose Function with bootstrapping entity . 64g3Annex G (inform
34、ative): Change history . 66g3History 67g3ETSI ETSI TS 133 303 V12.6.0 (2016-01)63GPP TS 33.303 version 12.6.0 Release 12Foreword This Technical Specification has been produced by the 3rdGeneration Partnership Project (3GPP). The contents of the present document are subject to continuing work within
35、the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for
36、information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have b
37、een incorporated in the document. ETSI ETSI TS 133 303 V12.6.0 (2016-01)73GPP TS 33.303 version 12.6.0 Release 121 Scope The present document specifies the security aspects of the Proximity Services (ProSe) features in EPS. Based on the common security procedures (clause 5) for - interfaces between
38、network entities (using NDS), - configuration of ProSe-enabled UEs, and - data transfer between the ProSe Function and a ProSe enabled UE (PC3 interface) security for the following ProSe features is covered: - Open ProSe Direct Discovery in network coverage (clause 6.1); - One-to-many ProSe direct c
39、ommunication for ProSe-enabled Public Safety UEs (clause 6.2); - EPC-level Discovery of ProSe-enabled UEs (clause 6.3); - EPC support for WLAN Direct Discovery and Communication (clause 6.4). 2 References The following documents contain provisions which, through reference in this text, constitute pr
40、ovisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a re
41、ference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. 1 3GPP TR 21.905: “Vocabulary for 3GPP Specifications“. 2 3GPP TS 23.303: “Proximity-based services (ProSe); Stage 2“.
42、 3 3GPP TS 33.210: “3G security; Network Domain Security (NDS); IP network layer security“. 4 3GPP TS 33.310: “Network Domain Security (NDS); Authentication Framework (AF)“. 5 3GPP TS 33.220: “Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)“. 6 ETSI TS 102 225: “S
43、mart Cards; Secured packet structure for UICC based applications“. 7 ETSI TS 102 226: “Smart cards; Remote APDU structure for UICC based applications“. 8 3GPP TS 31.115: “Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications“. 9 3GPP TS 31.116: “Remote APDU
44、Structure for (U)SIM Toolkit applications “. 10 IETF RFC 3550: “RTP: A Transport Protocol for Real-Time Applications“. 11 IETF RFC 3711: “The Secure Real-time Transport Protocol (SRTP)“. 12 IETF RFC 6509: “MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY)“. 13 IETF RFC
45、 3830: “MIKEY: Multimedia Internet KEYing“. ETSI ETSI TS 133 303 V12.6.0 (2016-01)83GPP TS 33.303 version 12.6.0 Release 1214 IETF RFC 6507: “Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)“. 15 NIST FIPS 186-4: “Digital Signature Standard (DSS)“. 16 BSI TR-0311
46、1: “Technical Guideline TR-03111; Elliptic Curve Cryptography“. 17 IETF RFC 5639: “Elliptic Curve Cryptography (ECC) Brainpool Standard; Curves and Curve Generation“. 18 IETF RFC 3339: “Date and Time on the Internet: Timestamps“. 19 IETF RFC 5280: “Internet X.509 Public Key Infrastructure Certificat
47、e and Certificate Revocation List (CRL) Profile“. 20 NIST FIPS 180-4: “Secure Hash Standard (SHS)“. 21 3GPP TS 33.401: “3GPP System Architecture Evolution (SAE); Security architecture“. 22 3GPP TS 33.222: “Generic Authentication Architecture (GAA); Access to network application functions using Hyper
48、text Transfer Protocol over Transport Layer Security (HTTPS)“. 23 IETF RFC 3261: “SIP: Session Initiation Protocol“. 24 IETF RFC 6508: “Sakai-Kasahara Key Encryption (SAKKE)“. 25 IETF RFC 5480: “Elliptic Curve Cryptography Subject Public Key Information“. 26 IETF RFC 6090: “Fundamental Elliptic Curv
49、e Cryptography Algorithms“. 27 IETF RFC 3339: “Date and Time on the Internet: Timestamps“. 28 IETF RFC 5905: “Network Time Protocol Version 4: Protocol and Algorithms Specification“. 29 IETF Draft draft-ietf-avtcore-srtp-aes-gcm-17: “AES-GCM and AES-CCM Authenticated Encryption in Secure RTP (SRTP)“. 30 Void. 31 IETF RFC 5116: “An Interface and Algorithms for Authenticated Encryption“. 32 3GPP TS 33.328: “IP Multimedia Subsystem (IMS) media plane security“. 33 IETF RFC 6043: “MIKEY-TICKET: Ticket-Based Modes