Generations of Mobile Standards

Confidentiality Algorithms

Image

3GPP confidentiality and integrity algorithms

The 3GPP Confidentiality and Integrity algorithms F8 & F9 (KASUMI) have been developed through the collaborative efforts of the 3GPP Organizational Partners.

They may be used only for the development and operation of 3G Mobile Communications and services. Every Beneficiary must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he fulfills the approval criteria specified in the Restricted Usage Undertaking (see the custodians’ respective web sites, accessible from the 3GPP home page).
Furthermore, Mitsubishi Electric Corporation holds essential patents on the Algorithms. The Beneficiary must get a separate IPR License Agreement from Mitsubishi Electronic Corporation Japan.
The relevant specs are as follows:

version subfield value
filename character

Specification of the 3GPP confidentiality and integrity algorithms

Document 1: f8 and f9 specifications

3GPP TS 35.201

Document 2: Kasumi algorithm specification

3GPP TS 35.202

Document 3: Implementors’ test data

3GPP TS 35.203

Document 4: Design conformance test data

3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms
3GPP TR 33.908

Specification of the MILENAGE algorithm set

The 3GPP authentication and key generation functions (MILENAGE) have been developed through the collaborative efforts of the 3GPP Organizational Partners.

They may be used only for the development and operation of 3G Mobile Communications and services. There are no additional requirements or authorizations necessary for these algorithms to be implemented.

version subfield value
filename character

3G Security ; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*

Document 1: General

3GPP TS 35.205

Document 2: Algorithm specification

3GPP TS 35.206

Document 3: Implementors’ test data

3GPP TS 35.207

Document 4: Design conformance test data

3GPP TS 35.208
Document 5: Summary and results of design and evaluation
3GPP TR 35.909

Recent GSM / EDGE / GPRS algorithms

The 3GPP A5/3 and GEA3 algorithms are being developed through the collaborative efforts of the 3GPP Organizational Partners. IPR and export control licencing arrangements are still in development.

version subfield value
filename character

Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS

Document 1: A5/3 and GEA3 specification

3GPP TS 55.216

Document 2: Implementors’ test data

3GPP TS 55.217

Document 3: Design and conformance test data

3GPP TS 55.218

Document 4: Design and evaluation report

3GPP TR 55.919

Early GSM algorithms

GSM has three security algorithms, A3, A5, and A8.

A3 and A8 - normally identical - are operator specific and saved in the SIM and AuC.

A5 is saved in ME and specified for data encryption and decryption over the air interface. However, it remains unpublished. See notes 3 and 4 of the 3GPP Specifications Numbering Scheme page. The general security architecture is described in 3GPP TS 43.020 (03.20 before Rel-4).