Confidentiality Algorithms
3GPP confidentiality and integrity algorithms
The 3GPP Confidentiality and Integrity algorithms F8 & F9 (KASUMI) have been developed through the collaborative efforts of the 3GPP Organizational Partners.
They may be used only for the development and operation of 3G Mobile Communications and services. Every Beneficiary must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he fulfills the approval criteria specified in the Restricted Usage Undertaking (see the custodians’ respective web sites, accessible from the 3GPP home page).
Furthermore, Mitsubishi Electric Corporation holds essential patents on the Algorithms. The Beneficiary must get a separate IPR License Agreement from Mitsubishi Electronic Corporation Japan.
The relevant specs are as follows:
version subfield value | filename character | |
---|---|---|
Specification of the 3GPP confidentiality and integrity algorithms | Document 1: f8 and f9 specifications | 3GPP TS 35.201 |
Document 2: Kasumi algorithm specification | 3GPP TS 35.202 | |
Document 3: Implementors’ test data | 3GPP TS 35.203 | |
Document 4: Design conformance test data | ||
3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms | 3GPP TR 33.908 |
Specification of the MILENAGE algorithm set
The 3GPP authentication and key generation functions (MILENAGE) have been developed through the collaborative efforts of the 3GPP Organizational Partners.
They may be used only for the development and operation of 3G Mobile Communications and services. There are no additional requirements or authorizations necessary for these algorithms to be implemented.
version subfield value | filename character | |
---|---|---|
3G Security ; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* | Document 1: General | 3GPP TS 35.205 |
Document 2: Algorithm specification | 3GPP TS 35.206 | |
Document 3: Implementors’ test data | 3GPP TS 35.207 | |
Document 4: Design conformance test data | 3GPP TS 35.208 | |
Document 5: Summary and results of design and evaluation | 3GPP TR 35.909 |
Recent GSM / EDGE / GPRS algorithms
The 3GPP A5/3 and GEA3 algorithms are being developed through the collaborative efforts of the 3GPP Organizational Partners. IPR and export control licencing arrangements are still in development.
version subfield value | filename character | |
---|---|---|
Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS | Document 1: A5/3 and GEA3 specification | 3GPP TS 55.216 |
Document 2: Implementors’ test data | 3GPP TS 55.217 | |
Document 3: Design and conformance test data | 3GPP TS 55.218 | |
Document 4: Design and evaluation report | 3GPP TR 55.919 |
Early GSM algorithms
GSM has three security algorithms, A3, A5, and A8.
A3 and A8 - normally identical - are operator specific and saved in the SIM and AuC.
A5 is saved in ME and specified for data encryption and decryption over the air interface. However, it remains unpublished. See notes 3 and 4 of the 3GPP Specifications Numbering Scheme page. The general security architecture is described in 3GPP TS 43.020 (03.20 before Rel-4).