ETSI TS 102 165-2 V4.1.1 (2003-02)
Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 2: Counter Measures
Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 2: Counter Measures
DTS/TIPHON-08005-2R4
Harmonizacija telekomunikacij in internetnega protokola prek omrežij (TIPHON), 4. izdaja - Definicija okvira protokola - Varnostne metode in protokoli - 2. del: Protiukrepi
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
SIST-TS TS 102 165-2 V4.1.1:2004
01-april-2004
Harmonizacija telekomunikacij in internetnega protokola prek omrežij (TIPHON), 4.
izdaja - Definicija okvira protokola - Varnostne metode in protokoli - 2. del:
Protiukrepi
Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON)
Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 2:
Counter Measures
Ta slovenski standard je istoveten z: TS 102 165-2 Version 4.1.1
ICS:
33.020 Telekomunikacije na splošno Telecommunications in
general
SIST-TS TS 102 165-2 V4.1.1:2004 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
---------------------- Page: 1 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
---------------------- Page: 2 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
ETSI TS 102 165-2 V4.1.1 (2003-02)
Technical Specification
Telecommunications and Internet Protocol
Harmonization Over Networks (TIPHON) Release 4;
Protocol Framework Definition;
Methods and Protocols for Security;
Part 2: Counter Measures
---------------------- Page: 3 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
2 ETSI TS 102 165-2 V4.1.1 (2003-02)
Reference
DTS/TIPHON-08005-2R4
Keywords
IP, protocol, security, VoIP
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, send your comment to:
editor@etsi.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2003.
All rights reserved.
TM TM TM
DECT , PLUGTESTS and UMTS are Trade Marks of ETSI registered for the benefit of its Members.
TM
TIPHON and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.
TM
3GPP is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
ETSI
---------------------- Page: 4 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
3 ETSI TS 102 165-2 V4.1.1 (2003-02)
Contents
Intellectual Property Rights.6
Foreword.6
1 Scope.7
2 References.7
3 Definitions and abbreviations.7
3.1 Definitions.7
3.2 Abbreviations.8
4 Provision of counter-measures in TIPHON .8
4.1 Required security services.8
4.2 Location of standardization of security services .9
5 Authentication counter-measures.9
5.1 Introduction.9
5.1.1 Description.9
5.2 Keying policy in TIPHON .10
5.2.1 Release 4.10
5.2.1.1 Review of service attributes .11
5.2.2 Release 5 and future.11
6 A1 = Authentication of the terminal.11
6.1 Purpose.11
6.2 Definition.11
6.3 Description.11
6.4 Procedures.12
6.4.1 Provision/withdrawal.12
6.4.2 Normal procedures.13
6.4.2.1 Invocation and operation.13
6.4.3 Exceptional procedures.13
6.4.3.1 Activation/deactivation/registration/interrogation.13
6.4.3.2 Invocation and operation.13
6.5 Interactions with other TIPHON services .13
6.6 Interworking considerations.13
6.7 Functional entity model.14
6.7.1 Description of model.14
6.8 Information flows.14
6.8.1 Definition of information flows.14
6.8.1.1 Relationship ra.14
6.8.1.1.1 A1Auth (req/ind/resp/conf).14
6.8.1.1.2 A1AuthResult.15
6.8.1.2 Relationship rb.15
6.8.1.2.1 A1ChallengeRequest.15
6.9 Information flow sequences .16
6.9.1 Information flows in A1 .17
6.9.1.1 Normal behaviour.17
6.9.1.2 Exceptional behaviour.18
6.9.1.2.1 UserId not recognized by A1-FE3.18
6.9.1.2.2 Key is not available at A1-FE1.19
6.9.2 Functional entity actions.19
6.9.2.1 Actions of A1-FE1.20
6.9.2.2 Actions of A1-FE2.20
6.9.2.3 Actions of A1-FE3.20
6.9.3 Functional entity behaviour .20
6.9.3.1 Behaviour of A1-FE1.21
6.9.3.2 Behaviour of A1-FE2.22
6.9.3.3 Behaviour of A1-FE3.23
ETSI
---------------------- Page: 5 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
4 ETSI TS 102 165-2 V4.1.1 (2003-02)
6.9.4 Allocation of functional entities to domains .23
7 A2 = Authentication of the registrar.23
7.1 Purpose.23
7.2 Definition.23
7.3 Description.24
7.4 Procedures.25
7.4.1 Provision/withdrawal.25
7.4.2 Normal procedures.25
7.4.2.1 Invocation and operation.25
7.4.3 Exceptional procedures.25
7.4.3.1 Activation/deactivation/registration/interrogation.25
7.4.3.2 Invocation and operation.25
7.5 Interactions with other TIPHON services .25
7.6 Interworking considerations.25
7.7 Functional entity model.25
7.7.1 Description of model.25
7.8 Information flows.26
7.8.1 Definition of information flows.26
7.8.1.1 Relationship ra.26
7.8.1.1.1 A2Auth.26
7.8.1.1.2 A2AuthResult.27
7.9 Information flow sequences .27
7.9.1 Information flow in A2, normal behaviour.28
7.9.2 Functional entity actions.28
7.9.2.1 Actions of A2-FE1.29
7.9.2.2 Actions of A2-FE2.29
7.9.2.3 Actions of A2-FE3.29
7.9.3 Allocation of functional entities to domains .29
8 A3 and A4, A34 = Mutual authentication terminal and SpoA .29
8.1 Purpose.29
8.2 Definition.30
8.3 Description.30
8.3.1 Overall authentication exchange.31
8.3.1.1 Token definitions.32
8.4 Procedures.33
8.4.1 Provision/withdrawal.33
8.4.2 Normal procedures.33
8.4.2.1 Invocation and operation.33
8.4.3 Exceptional procedures.33
8.4.3.1 Activation/deactivation/registration/interrogation.33
8.4.3.2 Invocation and operation.33
8.5 Interactions with other TIPHON services .33
8.6 Interworking considerations.33
8.7 Functional entity model.34
8.7.1 Description of model.34
8.8 Information flows.35
8.8.1 Definition of information flows.35
8.8.1.1 Relationship ra.35
8.8.1.1.1 A34UserToSpoAAuth.35
8.8.1.1.2 A34UserToSpoAAuthorizedAttach.35
8.8.1.2 Relationship rb.35
8.8.1.2.1 A34SpoAWithUserAuth.35
8.8.1.3 Relationship rc.35
8.8.1.3.1 A34SealingKeyRequest.35
8.9 Information flow sequences .36
8.9.1 Information flow in A3, normal behaviour.37
8.9.2 Functional entity actions.38
8.9.2.1 Actions of A34-FE1.38
8.9.2.2 Actions of A34-FE2.38
8.9.2.3 Actions of A34-FE3.38
ETSI
---------------------- Page: 6 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
5 ETSI TS 102 165-2 V4.1.1 (2003-02)
8.9.2.4 Actions of A34-FE4.39
9 A5 = Authentication of the SpoA by the registrar.39
10 A6 = Authentication of the registrar by the SpoA.39
11 Confidentiality service.39
11.1 Provided services.39
11.1.1 E1 = Confidentiality of user communication on the access interface .39
11.1.2 E2 = Confidentiality of signalling on the access interface.39
11.1.3 E3 = Confidentiality of signalling between SpoA entities.39
11.1.4 E6 = Confidentiality of TIPHON-id on signalling interfaces .39
11.1.5 E7 = Confidentiality of signalling between SpoA and Registrar .40
11.2 Confidentiality services E1 and E2 step B specification .40
11.2.1 Description.40
11.2.2 Encryption mechanism.41
11.3 Confidentiality services E3 and E7 step B specification .41
11.3.1 Description.41
11.3.1.1 Algorithm requirements for EA7 .41
Annex A (normative): Boundary conditions of algorithms .42
A.1 Authentication algorithms.42
A.1.1 A1-1.42
A.1.2 A1-2.42
A.1.3 A1-3.42
A.1.4 A2-1.42
A.1.5 A2-2.43
A.1.6 A2-3.43
A.1.7 A34-1.43
A.1.8 A34-2.43
A.1.9 A34-3.43
A.1.10 A34-4.44
A.1.11 A34-5.44
A.1.12 A34-6.44
A.1.13 A34-7.45
A.1.14 A34-8.45
A.1.15 A34-9.45
A.1.16 A34-10.45
A.2 Dimensioning of the cryptographic parameters .45
A.2.1 Terminal-identity.46
A.3 Encryption algorithms.46
A.3.1 EA12 - Confidentiality algorithm.46
A.3.1.1 Overview.46
A.3.1.2 Use.46
A.3.1.3 Extent of standardization .46
A.3.1.4 Implementation and operational considerations.46
A.3.1.5 Type of algorithm .46
A.3.1.6 Interfaces to the algorithm .46
A.3.1.6.1 CK.46
A.3.1.6.2 TVP.47
A.3.1.6.3 DIRECTION.47
A.3.1.6.4 LENGTH.47
A.3.1.6.5 KEYSTREAM.47
A.3.1.6.6 PLAINTEXT.47
A.3.1.6.7 CIPHERTEXT.48
Annex B (informative): Bibliography.49
History .50
ETSI
---------------------- Page: 7 ----------------------
SIST-TS TS 102 165-2 V4.1.1:2004
6 ETSI TS 102 165-2 V4.1.1 (2003-02)
Intellectual Property Rights
IPRs essential or potentially essential t
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.