M00044436
New product
DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS (DECT); COMMON INTERFACE (CI); PART 7: SECURITY FEATURES
European Telecommunications Standards Institute
In stock
Warning: Last items in stock!
Availability date: 11/06/2021
Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Security architecture
5 Algorithms for security processes
6 Integration of security
7 Use of security features
Annex A (informative) - Security threats analysis
Annex B (informative) - Security features and operating
environments
Annex C (informative) - Reasons for not adopting public
key techniques
Annex D (informative) - Overview of security features
Annex E (informative) - Limitations of DECT security
Annex F (informative) - Security features related to
target networks
Annex G (informative) - Compatibility of DECT and GSM
authentication
Annex H (normative) - DECT Standard Authentication
Algorithm (DSAA)
Annex I (normative) - Security system parameters
Annex J (normative) - DECT Standard Cipher (DSC)
Annex K (normative) - Clarifications, bit mappings
and examples for DSAA and DSC
Annex L (normative) - DECT Standard Authentication
Algorithm #2 (DSAA2)
Annex M (normative) - DECT Standard Cipher #2 (DSC2)
Annex N (normative) - CCM Authenticated Encryption
Annex O (informative) - Change history
History
Describes the security architecture, the types of cryptographic algorithms required, the way in which they are to be used, and the requirements for integrating the security features provided by the architecture into the DECT CI.
Published | |
Document Type | Standard |
Status | Current |
Publisher | European Telecommunications Standards Institute |
Pages | |
ISBN | |
Committee | DECT |
Supersedes |
|