3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the tuak tuak Algorithm Setset: a second second Example example Algorithm Set set for the 3gpp authentication and Key key Generation Functions f1,



Download 432.94 Kb.
Page1/10
Date20.10.2016
Size432.94 Kb.
#6684
  1   2   3   4   5   6   7   8   9   10

3GPP TS 35.231 V12.01.1 0 (20132014-1206)


Technical Specification


3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects;

Specification of the TUAK Tuak Algorithm algorithm Setset:

A Second second Example example Algorithm algorithm Set set for the 3GPP Authentication authentication and Key key Generation generation Functions functions f1, f1*, f2, f3, f4, f5 and f5*;

Document 1: Algorithm Specification specification

(Release 12)








The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP..
The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.
This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification.
Specifications and Reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.









Keywords


GSM, UMTS, LTE, Security, Algorithm




3GPP

Postal address


3GPP support office address

650 Route des Lucioles - Sophia Antipolis

Valbonne - FRANCE

Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16

Internet

http://www.3gpp.org







Copyright Notification

No part may be reproduced except as authorized by written permission.


The copyright and the foregoing restriction extend to reproduction in all media.
© 20132014, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC).

All rights reserved.


UMTS™ is a Trade Mark of ETSI registered for the benefit of its members

3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners


LTE™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners

GSM® and the GSM logo are registered and owned by the GSM Association





Contents


Contents 3

Foreword 5

Introduction 5

1 Scope 6

2 References 6

3 Definitions 7

3.1 Definitions 7

3.2 Symbols 7

4 PRELIMINARY INFORMATIONPreliminary information 8

4.1 Introduction 8

4.2 Notation 8

4.2.1 Radix 8

4.2.2. Bit-numbering for Inputs inputs and Outputsoutputs 8

4.2.3. Assignment oOperations 9

4.2.4. List of SymbolsVoid 9

4.3. List of VariablesVoid 9

5 INPUTS AND OUTPUTSInputs and outputs 10

5.1. TUAK Tuak Inputs inputs and Outputsoutputs 10

5.2. Keccak and its Inputs inputs and Outputsoutputs 11

5.3. Other Inputs inputs and Substringssubstrings 12

6 DEFINITION OF THE EXAMPLE ALGORITHMSDefinition of the example algorithms 12

6.1 Derivation of TOPC 12

6.2. Specification of the Function function f1 13

6.3. Specification of the Function function f1* 15

6.4. Specification of the Functions functions f2, f3, f4 and f5 15

6.5. Specification of the Function function f5* 18

7 IMPLEMENTATION CONSIDERATIONSImplementation considerations 18

7.1. TOPC computed on or off the UICC? 18

7.2. Further customization 19

7.3. Resistance to side channel attacks 19



Annex A (normative):
TUAKTuak dDiagrams 20


Annex B (informative):
TUAKTuakApplication Programme Interface ( AP) in ANSI CI 22


Annex C (normative):
Specification of the Keccak permutation used within TUAKTuak 24


Annex D (informative):
Example sSource Ccode for TUAKTuak (ANSI C) 26


Annex E (informative):
Example sSource cCode for Keccak (ANSI C) 31


Annex F (informative):
Change history 37


Contents 3

Foreword 5

Introduction 5

1 Scope 6

2 References 6

3 Definitions 7

3.1 Definitions 7

3.2 Symbols 7

4 PRELIMINARY INFORMATIONPreliminary information 8

4.1 Introduction 8

4.2 Notation 8

4.2.1 Radix 8

4.2.2. Bit-numbering for Inputs inputs and Outputsoutputs 8

4.2.3. Assignment oOperations 9

4.2.4. List of SymbolsVoid 9

4.3. List of VariablesVoid 9

5 INPUTS AND OUTPUTSInputs and outputs 10

5.1. TUAK Tuak Inputs inputs and Outputsoutputs 10

5.2. Keccak and its Inputs inputs and Outputsoutputs 11

5.3. Other Inputs inputs and Substringssubstrings 12

6 DEFINITION OF THE EXAMPLE ALGORITHMSDefinition of the example algorithms 12

6.1 Derivation of TOPC 12

6.2. Specification of the Function function f1 13

6.3. Specification of the Function function f1* 15

6.4. Specification of the Functions functions f2, f3, f4 and f5 15

6.5. Specification of the Function function f5* 18

7 IMPLEMENTATION CONSIDERATIONSImplementation considerations 18

7.1. TOPC computed on or off the UICC? 18

7.2. Further customization 19

7.3. Resistance to side channel attacks 19



Annex A (normative):
TUAKTuak dDiagrams 20


Annex B (informative):
TUAKTuakApplication Programme Interface ( AP) in ANSI CI 22


Annex C (normative):
Specification of the Keccak permutation used within TUAKTuak 24


Annex D (informative):
Example sSource Ccode for TUAKTuak (ANSI C) 26


Annex E (informative):
Example sSource cCode for Keccak (ANSI C) 31


Annex F (informative):
Change history 37





Download 432.94 Kb.

Share with your friends:
  1   2   3   4   5   6   7   8   9   10




The database is protected by copyright ©ininet.org 2022
send message

    Main page