M00037598
New product
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; SPECIFICATION OF THE TUAK ALGORITHM SET: A SECOND EXAMPLE ALGORITHM SET FOR THE 3GPP AUTHENTICATION AND KEY GENERATION FUNCTIONS F1, F1*, F2, F3, F4, F5 AND F5*; DOCUMENT 4: REPORT ON THE DESIGN AND EVALUATION (3GPP TR 35.934 VERSION 14.0.0 RELEASE 14)
European Telecommunications Standards Institute
In stock
Warning: Last items in stock!
Availability date: 11/06/2021
Intellectual Property Rights
Foreword
Modal verbs terminology
Foreword
1 Scope
2 References
3 Definitions and abbreviations
4 Structure of this report
5 Background to the design and
evaluation work
6 Summary of algorithm requirements
7 Overview of the Tuak design
8 Design rationale
9 Independent security and performance
evaluation
10 More notes on implementation and side
channel attacks
11 Conclusions
Annex A - Change history
History
Defines the design rationale, and presents evaluation results, on the Tuak algorithm set - a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.
Published | |
Document Type | Standard |
Status | Current |
Publisher | European Telecommunications Standards Institute |
Pages | |
ISBN | |
Committee | 3GPP SA 3 |