1、 ETSI TS 155 205 V14.0.0 (2017-04) Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 (3GPP TS 55.205 version 14.0.0 Release 14) TECHNICAL SPECIFICATION
2、GLOBAL SYSTEM FOR MOBILE COMMUNICATIONSRETSI ETSI TS 155 205 V14.0.0 (2017-04)13GPP TS 55.205 version 14.0.0 Release 14Reference RTS/TSGS-0355205ve00 Keywords GSM,SECURITY ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 6
3、23 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content
4、 of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Documen
5、t Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https:/portal.etsi.org/T
6、B/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanic
7、al, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications St
8、andards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo
9、are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 155 205 V14.0.0 (2017-04)23GPP TS 55.205 version 14.0.0 Release 14Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these
10、 essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest u
11、pdates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web s
12、erver) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS ident
13、ities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http:/webapp.etsi.org/key/queryform.asp. Modal verbs terminology In the present document “shall“, “shall
14、 not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct
15、citation. ETSI ETSI TS 155 205 V14.0.0 (2017-04)33GPP TS 55.205 version 14.0.0 Release 14Contents Intellectual Property Rights 2g3Foreword . 2g3Modal verbs terminology 2g3Foreword . 4g3Introduction 4g31 Scope 5g32 References 5g33 Introductory information (normative) 5g33.1 Introduction 5g33.2 Algori
16、thm Inputs and Outputs 6g33.3 Notation 6g33.3.1 Bit/Byte ordering 6g33.3.2 List of Symbols . 6g34 The GSM-MILENAGE algorithms (normative) 6g35 An alternative algorithm (informative) 7g36 Test data for GSM-MILENAGE (informative) 8g36.1 Introduction 8g36.2 Format 8g36.3 Test Sets . 9g3Annex A (informa
17、tive): Change history . 15g3History 16g3ETSI ETSI TS 155 205 V14.0.0 (2017-04)43GPP TS 55.205 version 14.0.0 Release 14Foreword This Technical Specification has been produced by the 3rdGeneration Partnership Project (3GPP). The contents of the present document are subject to continuing work within t
18、he TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for i
19、nformation; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have be
20、en incorporated in the document. Introduction This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this do
21、cument are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). ETSI ETSI TS 155 205 V14.0.0 (2017-04)53GPP TS 55.205 version 14.0.0 Release 141 Scope The present document contains an example set of algorithms which may be used as the GSM authentication and
22、key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised). Section 3 (normative) introduces the algorithms and describes their input and output p
23、arameters. Section 4 (normative) defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer. Section 6 (informative) provides test data. 2 References The following documents contain provisions which, through reference in this text, constitute pr
24、ovisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a re
25、ference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. 1 3GPP TS 35.206: “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G S
26、ecurity; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification“. 2 3GPP TS 35.207: “3rd Generation Partnership Project; Technical Specification Group Services
27、 and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors test data“. 3 3GPP TS 35.208: “3rd Generation Partnership Project; Technical Spec
28、ification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data“. 4 3GPP TS 33.102 version 3.10.0: “3rd G
29、eneration Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 1999)“. 5 3GPP TS 03.20 version 8.1.0: “3rd Generation Partnership Project; Digital cellular telecommunications system (Phase 2+); Security related network functions
30、(Release 1999)“. 3 Introductory information (normative) 3.1 Introduction Within the security architecture of the GSM system there are security functions A3 and A8. The operation of these functions falls completely within the domain of an individual operator, and the functions are therefore to be spe
31、cified by each operator rather than being fully standardised. The algorithms specified in this document are examples that may be used by an operator who does not wish to design his own. The inputs and outputs of the two functions are defined in section 3.2. ETSI ETSI TS 155 205 V14.0.0 (2017-04)63GP
32、P TS 55.205 version 14.0.0 Release 143.2 Algorithm Inputs and Outputs The inputs to the algorithms are given in table 1, the outputs in tables 2 and 3 below. Table 1: Inputs to A3 and A8 Parameter Size (bits) Comment Ki 128 Subscriber key Ki0Ki127 RAND 128 Random challenge RAND0RAND127 Table 2: A3 o
33、utput Parameter Size (bits) Comment SRES 32 Signed response SRES0SRES31 Table 3: A8 output Parameter Size (bits) Comment KC 64 Cipher key KC0KC63 3.3 Notation 3.3.1 Bit/Byte ordering All data variables in this specification are presented with the most significant bit (or byte) on the left hand side
34、and the least significant bit (or byte) on the right hand side. Where a variable is broken down into a number of substrings, the leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the least significant. When a variable, with bit length
35、L, is shown in hexadecimal format, bit 0 is the most significant bit of the leftmost hexadecimal digit, and bit L-1 is the least significant bit of the rightmost hexadecimal digit. 3.3.2 List of Symbols = The assignment operator. | The concatenation of the two operands. The bitwise exclusive-OR oper
36、ation. Xi The ithbit of the variable X. (X = X0 | X1 | X2 | ). 4 The GSM-MILENAGE algorithms (normative) An example algorithm set for UMTS, called MILENAGE (note 1), is specified in 1. GSM-MILENAGE makes use of MILENAGE. Specifically, the functions from the UMTS MILENAGE which we make use of are the
37、 following (we prefix all input and output names by “MIL3G-“ to distinguish them clearly from the inputs and outputs of A3 and A8): ETSI ETSI TS 155 205 V14.0.0 (2017-04)73GPP TS 55.205 version 14.0.0 Release 14Function Inputs Output f2 MIL3G-K0MIL3G-K127 MIL3G-RES0MIL3G-RES63 f3 MIL3G-CK0MIL3G-CK12
38、7 MIL3G-RAND0MIL3G-RAND127 f4 MIL3G-IK0MIL3G-IK127 The GSM-MILENAGE functions are defined as follows: - Let (MIL3G-K0MIL3G-K127) = (Ki0Ki127) - Let (MIL3G-RAND0MIL3G-RAND127) = (RAND0RAND127) - Compute MIL3G-RES, MIL3G-CK and MIL3G-IK from MIL3G-K and MIL3G-RAND, using the MILENAGE functions f2, f3,
39、 and f4 respectively - Set (KC0KC63) = (MIL3G-CK0MIL3G-CK63) (MIL3G-CK64MIL3G-CK127) (MIL3G-IK0MIL3G-IK63) (MIL3G-IK64MIL3G-IK127) - Derive SRES from MIL3G-RES using an operator-selected SRES Derivation Function. This function must be precisely specified for the GSM-MILENAGE A3 algorithm to be fully
40、 defined. The two main recommended options are as follows (note 2): - Recommended SRES Derivation Function #1: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31) (MIL3G-RES32MIL3G-RES63). - Recommended SRES Derivation Function #2: (SRES0SRES31) = (MIL3G-RES0MIL3G-RES31). Alternative SRES Derivation Functions m
41、ay be specified. NOTE 1: MILENAGE uses a 128-bit operator-specific constant OP; a value has to be assigned to this constant for MILENAGE to be fully specified. NOTE 2: The 3GPP standard conversion function to derive a GSM SRES of 32 bits from a UMTS XRES of up to 128 bits is as follows 4: SRES = XRE
42、S*1 xor XRES*2 xor XRES*3 xor XRES*4, where XRES* is 16 octets long and XRES* = XRES if XRES is 16 octets long and XRES* = XRES | 0.0 if XRES is shorter than 16 octets, XRES*i are all 4 octets long and XRES* = XRES*1 | XRES*2 | XRES*3 | XRES*4 Recommended SRES Derivation Function #1 is the result of
43、 applying this standard conversion function to a 64-bit XRES equal to MIL3G-RES0MIL3G-RES63 from MILENAGE. Recommended SRES Derivation Function #2 is the result of applying this standard conversion function to a 32-bit XRES equal to MIL3G-RES0MIL3G-RES31 from MILENAGE. 5 An alternative algorithm (in
44、formative) The GSM-MILENAGE algorithms defined in section 3 are obtained by applying standard 3G-to-2G conversion functions defined in 4 to the outputs of the UMTS MILENAGE algorithms. If there is no desire to retain this compatibility with UMTS MILENAGE used in its 2G mode, a much simpler and more
45、efficient algorithm would be to set TEMP = EKi(RAND), where E is the 128-bit block cipher used as a basic building ETSI ETSI TS 155 205 V14.0.0 (2017-04)83GPP TS 55.205 version 14.0.0 Release 14block in MILENAGE, i.e. TEMP = the result of encrypting RAND using the key Ki; then choose non-overlapping
46、 substrings of TEMP to be SRES and KC, e.g. SRES = TEMP0.TEMP31 and KC= TEMP64TEMP127. This alternative does not form any part of the GSM-MILENAGE algorithms; it is included just for information. 6 Test data for GSM-MILENAGE (informative) 6.1 Introduction The test data sets presented here are derive
47、d directly from the MILENAGE test sets in 3. 6.2 Format The format of each test data set is as follows: Test Set n Ki subscriber secret key RAND random challengeOP operator-specific MILENAGE constant OPc derived from OP and Ki see 1 MIL3G-RES MILENAGE f2 output, included for information only SRES#1
48、A3 output SRES, if Recommended SRES Derivation Function #1 is used see section 4, page 7 SRES#2 A3 output SRES, if Recommended SRES Derivation Function #2 is used see section 4, page 7 MIL3G-CK MILENAGE f3 output, included for information only MIL3G-IK MILENAGE f4 output, included for information on
49、ly Kc A8 output (cipher key) All test data in this tabular format is shown in hexadecimal representation. The first test set is also shown in binary, to show explicitly the relationship between the binary data and the hexadecimal representation. ETSI ETSI TS 155 205 V14.0.0 (2017-04)93GPP TS 55.205 version 14.0.0 Release 146.3 Test Sets Test Set 1 in binary format Ki 01000110 01011011 01011