M00037755
New product
RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 2: TEA2
European Telecommunications Standards Institute
In stock
Warning: Last items in stock!
Availability date: 11/06/2021
Intellectual Property Rights
Foreword
Modal verbs terminology
1 Scope
2 References
3 Definitions and abbreviations
4 TEA2 management structure
5 Use of TEA2
6 Licence types
7 Distribution procedures
8 Approval criteria and restrictions
9 The TEA2 Custodian
Annex A (informative) - Items delivered to approved
recipient of TEA2 specifications
Annex B (normative) - Confidentiality and Restricted
Usage Undertaking for Manufacturers of TEA2
Annex C (normative) - Confidentiality and Restricted
Usage Undertaking for Installers, Repairers
and Destruction of TEA2
Annex D (normative) - Confidentiality and Restricted
Usage Undertaking for Suppliers of Equipment
or Services using TEA2
Annex E (normative) - Confidentiality and Restricted
Usage Undertaking for Primary and Secondary
Users of TEA2
Annex F (normative) - Confidentiality and Restricted
Usage Undertaking for End Users of TEA2
Annex G (normative) - Confidentiality and Restricted
Usage Undertaking for Destruction of TEA2
Annex H (informative) - TEA2 State and Territories list
Annex I (informative) - Bibliography
History
Describes the rules for the management of the TETRA standard encryption algorithm TEA2.
Published | |
Document Type | Standard |
Status | Current |
Publisher | European Telecommunications Standards Institute |
Pages | |
ISBN | |
Committee | TCCE 06 |