1、 ETSI TS 1Digital cellular telecoSpecification of the GSMalgorithm set foKey Genera(3GPP TS 55.2TECHNICAL SPECIFICATION155 205 V13.0.0 (2016communications system (PhaSM-MILENAGE algorithms: Afor the GSM Authentication aration Functions A3 and A8 .205 version 13.0.0 Release 13GLOBAL SYSTEMOBILE COMMU
2、N16-01) hase 2+); An example and 13) TEM FOR ICATIONSRETSI ETSI TS 155 205 V13.0.0 (2016-01)13GPP TS 55.205 version 13.0.0 Release 13Reference RTS/TSGS-0355205vd00 Keywords GSM,SECURITY ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
3、 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in prin
4、t. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Po
5、rtable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/port
6、al.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mech
7、anical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunication
8、s Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM l
9、ogo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 155 205 V13.0.0 (2016-01)23GPP TS 55.205 version 13.0.0 Release 13Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to t
10、hese essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Late
11、st updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI W
12、eb server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS i
13、dentities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp. Modal verbs terminology In the present document “shall“, “s
14、hall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in dir
15、ect citation. ETSI ETSI TS 155 205 V13.0.0 (2016-01)33GPP TS 55.205 version 13.0.0 Release 13Contents Intellectual Property Rights 2g3Foreword . 2g3Modal verbs terminology 2g3Foreword . 4g3Introduction 4g31 Scope 5g32 References 5g33 Introductory information (normative) 5g33.1 Introduction 5g33.2 Al
16、gorithm Inputs and Outputs 6g33.3 Notation 6g33.3.1 Bit/Byte ordering 6g33.3.2 List of Symbols . 6g34 The GSM-MILENAGE algorithms (normative) 6g35 An alternative algorithm (informative) 7g36 Test data for GSM-MILENAGE (informative) 8g36.1 Introduction 8g36.2 Format 8g36.3 Test Sets . 9g3Annex A (inf
17、ormative): Change history . 15g3History 16g3ETSI ETSI TS 155 205 V13.0.0 (2016-01)43GPP TS 55.205 version 13.0.0 Release 13Foreword This Technical Specification has been produced by the 3rdGeneration Partnership Project (3GPP). The contents of the present document are subject to continuing work with
18、in the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG f
19、or information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes hav
20、e been incorporated in the document. Introduction This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in thi
21、s document are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). ETSI ETSI TS 155 205 V13.0.0 (2016-01)53GPP TS 55.205 version 13.0.0 Release 131 Scope The present document contains an example set of algorithms which may be used as the GSM authentication
22、and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). Section 3 (normative) introduces the algorithms and describes their input and outp
23、ut parameters. Section 4 (normative) defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer. Section 6 (informative) provides test data. 2 References The following documents contain provisions which, through reference in this text, constitut
24、e provisions of the present document. References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. In the case of a refe
25、rence to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. 1 3GPP TS 35.206: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Sec
26、urity; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification“. 2 3GPP TS 35.207: “3rd Generation Partnership Project; Technical Specification Group Services a
27、nd System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors test data“. 3 3GPP TS 35.208: “3rd Generation Partnership Project; Technical Specif
28、ication Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data“. 4 3GPP TS 33.102 version 3.10.0: “3rd Gen
29、eration Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 1999)“. 5 3GPP TS 03.20 version 8.1.0: “3rd Generation Partnership Project; Digital cellular telecommunications system (Phase 2+); Security related network functions (R
30、elease 1999)“. 3 Introductory information (normative) 3.1 Introduction Within the security architecture of the GSM system there are security functions A3 and A8. The operation of these functions falls completely within the domain of an individual operator, and the functions are therefore to be speci
31、fied by each operator rather than being fully standardised. The algorithms specified in this document are examples that may be used by an operator who does not wish to design his own. The inputs and outputs of the two functions are defined in section 3.2. ETSI ETSI TS 155 205 V13.0.0 (2016-01)63GPP
32、TS 55.205 version 13.0.0 Release 133.2 Algorithm Inputs and Outputs The inputs to the algorithms are given in table 1, the outputs in tables 2 and 3 below. Table 1: Inputs to A3 and A8 Parameter Size (bits) Comment Ki128 Subscriber key Ki0Ki127 RAND 128 Random challenge RAND0RAND127 Table 2: A3 outp
33、ut Parameter Size (bits) Comment SRES 32 Signed response SRES0SRES31 Table 3: A8 output Parameter Size (bits) Comment KC64 Cipher key KC0KC63 3.3 Notation 3.3.1 Bit/Byte ordering All data variables in this specification are presented with the most significant bit (or byte) on the left hand side and
34、the least significant bit (or byte) on the right hand side. Where a variable is broken down into a number of substrings, the leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the least significant. When a variable, with bit length L, i
35、s shown in hexadecimal format, bit 0 is the most significant bit of the leftmost hexadecimal digit, and bit L-1 is the least significant bit of the rightmost hexadecimal digit. 3.3.2 List of Symbols = The assignment operator. | The concatenation of the two operands. The bitwise exclusive-OR operatio
36、n. a) Xi The ithbit of the variable X. (X = X0 | X1 | X2 | ). 4 The GSM-MILENAGE algorithms (normative) An example algorithm set for UMTS, called MILENAGE (note 1), is specified in 1. GSM-MILENAGE makes use of MILENAGE. Specifically, the functions from the UMTS MILENAGE which we make use of are the
37、following (we prefix all input and output names by “MIL3G-“ to distinguish them clearly from the inputs and outputs of A3 and A8): ETSI ETSI TS 155 205 V13.0.0 (2016-01)73GPP TS 55.205 version 13.0.0 Release 13Function Inputs Output f2 MIL3G-K0MIL3G-K127 MIL3G-RES0MIL3G-RES63 f3 MIL3G-CK0MIL3G-CK127
38、 MIL3G-RAND0MIL3G-RAND127 f4 MIL3G-IK0MIL3G-IK127 The GSM-MILENAGE functions are defined as follows: - Let (MIL3G-K0MIL3G-K127) = (Ki0Ki127) - Let (MIL3G-RAND0MIL3G-RAND127) = (RAND0RAND127) - Compute MIL3G-RES, MIL3G-CK and MIL3G-IK from MIL3G-K and MIL3G-RAND, using the MILENAGE functions f2, f3,
39、and f4 respectively - Set (KC0KC63) = (MIL3G-CK0MIL3G-CK63) (MIL3G-CK64MIL3G-CK127) (MIL3G-IK0MIL3G-IK63) (MIL3G-IK64MIL3G-IK127) - Derive SRES from MIL3G-RES using an operator-selected SRES Derivation Function. This function must be precisely specified for the GSM-MILENAGE A3 algorithm to be fully
40、defined. The two main recommended options are as follows (note 2): - Recommended SRES Derivation Function #1: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31) (MIL3G-RES32MIL3G-RES63). - Recommended SRES Derivation Function #2: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31). Alternative SRES Derivation Functions ma
41、y be specified. NOTE 1: MILENAGE uses a 128-bit operator-specific constant OP; a value has to be assigned to this constant for MILENAGE to be fully specified. NOTE 2: The 3GPP standard conversion function to derive a GSM SRES of 32 bits from a UMTS XRES of up to 128 bits is as follows 4: SRES = XRES
42、*1 xor XRES*2 xor XRES*3 xor XRES*4, where XRES* is 16 octets long and XRES* = XRES if XRES is 16 octets long and XRES* = XRES | 0.0 if XRES is shorter than 16 octets, XRES*i are all 4 octets long and XRES* = XRES*1 | XRES*2 | XRES*3 | XRES*4 Recommended SRES Derivation Function #1 is the result of
43、applying this standard conversion function to a 64-bit XRES equal to MIL3G-RES0MIL3G-RES63 from MILENAGE. Recommended SRES Derivation Function #2 is the result of applying this standard conversion function to a 32-bit XRES equal to MIL3G-RES0MIL3G-RES31 from MILENAGE. 5 An alternative algorithm (inf
44、ormative) The GSM-MILENAGE algorithms defined in section 3 are obtained by applying standard 3G-to-2G conversion functions defined in 4 to the outputs of the UMTS MILENAGE algorithms. If there is no desire to retain this compatibility with UMTS MILENAGE used in its 2G mode, a much simpler and more e
45、fficient algorithm would be to set TEMP = EKi(RAND), where E is the 128-bit block cipher used as a basic building ETSI ETSI TS 155 205 V13.0.0 (2016-01)83GPP TS 55.205 version 13.0.0 Release 13block in MILENAGE, i.e. TEMP = the result of encrypting RAND using the key Ki; then choose non-overlapping
46、substrings of TEMP to be SRES and KC, e.g. SRES = TEMP0.TEMP31 and KC= TEMP64TEMP127. This alternative does not form any part of the GSM-MILENAGE algorithms; it is included just for information. 6 Test data for GSM-MILENAGE (informative) 6.1 Introduction The test data sets presented here are derived
47、 directly from the MILENAGE test sets in 3. 6.2 Format The format of each test data set is as follows: Test Set n Ki subscriber secret key RAND random challengeOP operator-specific MILENAGE constant OPc derived from OP and Ki see 1 MIL3G-RES MILENAGE f2 output, included for information only SRES#1 A
48、3 output SRES, if Recommended SRES Derivation Function #1 is used see section 4, page 7 SRES#2 A3 output SRES, if Recommended SRES Derivation Function #2 is used see section 4, page 7 MIL3G-CK MILENAGE f3 output, included for information only MIL3G-IK MILENAGE f4 output, included for information onl
49、y Kc A8 output (cipher key) All test data in this tabular format is shown in hexadecimal representation. The first test set is also shown in binary, to show explicitly the relationship between the binary data and the hexadecimal representation. ETSI ETSI TS 155 205 V13.0.0 (2016-01)93GPP TS 55.205 version 13.0.0 Release 136.3 Test Sets Test Set 1 in binary format Ki 01000110 01011011