New Reduced price! EN 300 175-7 : 2.6.1 View larger

EN 300 175-7 : 2.6.1

M00044436

New product

EN 300 175-7 : 2.6.1

DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS (DECT); COMMON INTERFACE (CI); PART 7: SECURITY FEATURES

European Telecommunications Standards Institute

More details

In stock

$35.10

-55%

$78.00

More info

Table of Contents

Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Security architecture
5 Algorithms for security processes
6 Integration of security
7 Use of security features
Annex A (informative) - Security threats analysis
Annex B (informative) - Security features and operating
        environments
Annex C (informative) - Reasons for not adopting public
        key techniques
Annex D (informative) - Overview of security features
Annex E (informative) - Limitations of DECT security
Annex F (informative) - Security features related to
        target networks
Annex G (informative) - Compatibility of DECT and GSM
        authentication
Annex H (normative) - DECT Standard Authentication
        Algorithm (DSAA)
Annex I (normative) - Security system parameters
Annex J (normative) - DECT Standard Cipher (DSC)
Annex K (normative) - Clarifications, bit mappings
        and examples for DSAA and DSC
Annex L (normative) - DECT Standard Authentication
        Algorithm #2 (DSAA2)
Annex M (normative) - DECT Standard Cipher #2 (DSC2)
Annex N (normative) - CCM Authenticated Encryption
Annex O (informative) - Change history
History

Abstract

Describes the security architecture, the types of cryptographic algorithms required, the way in which they are to be used, and the requirements for integrating the security features provided by the architecture into the DECT CI.

General Product Information

Document Type Standard
Status Current
Publisher European Telecommunications Standards Institute
Committee DECT
Supersedes
  • PREN 300 175-7 : 1.4.1