SIST EN 300 812 V2.1.1:2003
(Main)Terrestrial Trunked Radio (TETRA); Security aspects; Subscriber Identity Module to Mobile Equipment (SIM-ME) interface
Terrestrial Trunked Radio (TETRA); Security aspects; Subscriber Identity Module to Mobile Equipment (SIM-ME) interface
To correct and update the editorials and coflicts found in edition 1 of ETS 300 812
Prizemni snopovni radio (TETRA) – Varnostni vidiki – Vmesnik med naročniško identifikacijsko kartico in mobilno opremo (SIM-ME)
General Information
Standards Content (Sample)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.QDURþQLãNRTerrestrial Trunked Radio (TETRA); Security aspects; Subscriber Identity Module to Mobile Equipment (SIM-ME) interface33.070.10Prizemni snopovni radio (TETRA)Terrestrial Trunked Radio (TETRA)ICS:Ta slovenski standard je istoveten z:EN 300 812 Version 2.1.1SIST EN 300 812 V2.1.1:2003en01-december-2003SIST EN 300 812 V2.1.1:2003SLOVENSKI
STANDARD
ETSI ETSI EN 300 812 V2.1.1 (2001-12)2
Reference REN/TETRA-07043 Keywords card, security, SIM, TETRA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88
Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editor@etsi.fr Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2001. All rights reserved.
ETSI ETSI EN 300 812 V2.1.1 (2001-12)3 Content Intellectual Property Rights.8 Foreword.8 1 Scope.9 2 References.9 3 Definitions, symbols and abbreviations.11 3.1 Definitions.11 3.2 Symbols.13 3.3 Abbreviations.13 4 SIM characteristics.15 4.1 Format and layout.15 4.1.1 SIM.15 4.1.2 Plug-in SIM.15 4.2 Temperature range for card operation.15 4.3 Contacts.15 4.3.1 Provision of contacts.15 4.3.2 Activation and deactivation.15 4.3.3 Inactive contacts (contact conditions in the ME switched-off state).16 4.3.4 Contact pressure.16 4.4 Precedence (multiple SIM operation).16 4.5 Static protection.16 5 Electronic signals and transmission protocols.17 5.1 Supply voltage Vcc (contact C1).17 5.1.1 5 V technology SIM.17 5.1.2 3 V technology SIM.17 5.1.3 3 V technology SIM identification.17 5.1.4 3 V technology ME.17 5.1.5 3 V Only ME.17 5.1.6 Activation and deactivation of 3 V technology SIM.18 5.1.7 Supply voltage switching.18 5.1.8 Cross compatibility.18 5.1.9 Technology outlook.18 5.2 Reset (RST) (contact C2).18 5.3 Programming voltage Vpp (contact C6).18 5.4 Clock CLK (contact C3).18 5.5 Input/Output (I/O) (contact C7).18 5.6 States.19 5.7 Baud rate.19 5.8 Answer To Reset (ATR).19 5.9 Bit/character duration and sampling time.19 5.10 Error handling.19 6 Logical model.19 6.1 General description.19 6.2 File identifier.20 6.3 Dedicated Files (DF).21 6.4 Elementary Files (EF).21 6.4.1 Transparent EF.21 6.4.2 Linear fixed EF.21 6.4.3 Key EF.22 6.4.4 Cyclic EF.22 6.5 Methods for selecting a file.23 6.6 Reservation of file IDs.25 7 Security features.25 7.1 Authentication and cipher key generation procedure.26 SIST EN 300 812 V2.1.1:2003
ETSI ETSI EN 300 812 V2.1.1 (2001-12)4 7.2 Support of Over The Air Re-keying (OTAR) distribution of cipher keys.26 7.3 Support of SIM-ME enhanced security.26 7.4 File access conditions.26 7.5 Storage of DCK.28 8 Description of the functions.28 8.1 SELECT.28 8.2 STATUS.29 8.3 READ BINARY.29 8.4 UPDATE BINARY.29 8.5 READ RECORD.29 8.6 READ KEY.30 8.7 UPDATE RECORD.30 8.8 SEEK.31 8.9 VERIFY CHV.32 8.10 CHANGE CHV.32 8.11 DISABLE CHV.33 8.12 ENABLE CHV.33 8.13 UNBLOCK CHV.33 8.14 INVALIDATE.34 8.15 REHABILITATE.34 8.16 TETRA authentication algorithms.34 8.16.1 GET RANDOM.34 8.16.2 TA11/TA12 ALGORITHM.34 8.16.3 TA21/TA22 ALGORITHM.35 8.16.4 TB4/TE ALGORITHM.35 8.17 OTAR algorithms.35 8.17.1 TA32 ALGORITHM.35 8.17.2 TA41/TA82 ALGORITHM.36 8.17.3 TA41/TA52 ALGORITHM.36 8.17.4 TA71 ALGORITHM.36 9 Description of the commands.37 9.1 Mapping principles.37 9.2 Coding of the commands.39 9.2.1 SELECT.40 9.2.2 STATUS.41 9.2.3 READ BINARY.42 9.2.4 UPDATE BINARY.42 9.2.5 READ RECORD.42 9.2.6 UPDATE RECORD.42 9.2.7 READ KEY.43 9.2.8 SEEK.43 9.2.9 VERIFY CHV.43 9.2.10 CHANGE CHV.44 9.2.11 DISABLE CHV.44 9.2.12 ENABLE CHV.44 9.2.13 UNBLOCK CHV.44 9.2.14 INVALIDATE.45 9.2.15 REHABILITATE.45 9.2.16 GET RANDOM.45 9.2.17 TA11/TA12 ALGORITHM.45 9.2.18 TA21/TA22 ALGORITHM.45 9.2.19 TB4/TE ALGORITHM.46 9.2.20 TA32 ALGORITHM.46 9.2.21 TA41/TA82 ALGORITHM.46 9.2.22 TA41/TA52 ALGORITHM.46 9.2.23 TA71 ALGORITHM.47 9.2.24 GET RESPONSE.47 9.3 Definitions and coding.47 9.4 Status conditions returned by the card.49 9.4.1 Responses to commands which are correctly executed.49 SIST EN 300 812 V2.1.1:2003
ETSI ETSI EN 300 812 V2.1.1 (2001-12)5 9.4.2 Memory management.49 9.4.3 Referencing management.49 9.4.4 Security management.49 9.4.5 Application independent errors.50 9.4.6 Commands versus possible status responses.50 10 Contents of the EFs.51 10.1 Void.51 10.2 Contents of the EFs at the MF level.51 10.2.1 EFICCID (Card Identification).51 10.2.2 EFDIR (Application directory).52 10.2.3 EFLP (Language Preference).53 10.3 Contents of the EFs at the TETRA application level.53 10.3.1 EFSST (SIM Service Table).53 10.3.2 EFITSI (Individual Tetra Subscriber Identity).56 10.3.3 EFITSIDIS (ITSI Disabled).58 10.3.4 EFUNAME (Username).58 10.3.5 EFSCT (Subscriber Class Table).59 10.3.6 EFPHASE (Phase identification).60 10.3.7 EFCCK (Common Cipher Key).60 10.3.8 EFCCKLOC (CCK location areas).62 10.3.9 EFSCK (Static Cipher Keys).63 10.3.10 EFGSSIS (Static GSSIs).65 10.3.11 EFGRDS (Group related data for static GSSIs).66 10.3.12 EFGSSID (Dynamic GSSIs).67 10.3.13 EFGRDD (Group related data for dynamic GSSIs).68 10.3.14 EFGCK (Group Cipher Keys).68 10.3.15 EFMGCK (Modified Group Cipher Keys).70 10.3.16 EFGINFO (User's group information).71 10.3.17 EFSEC (Security settings).73 10.3.18 EFFORBID (Forbidden networks).73 10.3.19 EFPREF (Preferred networks).75 10.3.20 EFSPN (Service Provider Name).76 10.3.21 EFLOCI (Location information).76 10.3.22 EFDNWRK (Broadcast network information).77 10.3.23 EFNWT (Network table).79 10.3.24 EFGWT (Gateway table).80 10.3.25 EFCMT (Call Modifier Table).82 10.3.26 EFADNGWT (Abbreviated Dialling Number with Gateways).83 10.3.27 EFGWTEXT1 (Gateway Extension1).85 10.3.28 EFADNTETRA (Abbreviated dialling numbers for TETRA network).85 10.3.29 EFEXTA (Extension A).87 10.3.30 EFFDNGWT (Fixed dialling numbers with Gateways).87 10.3.31 EFGWTEXT2 (Gateway Extension2).88 10.3.32 EFFDNTETRA (Fixed dialling numbers for TETRA network).88 10.3.33 EFEXTB (Extension B).89 10.3.34 EFLNDGWT (Last number dialled with Gateways).89 10.3.35 EFLNDTETRA (Last numbers dialled for TETRA network).90 10.3.36 EFSDNGWT (Service Dialling Numbers with gateway).90 10.3.37 EFGWTEXT3 (Gateway Extension3).91 10.3.38 EFSDNTETRA (Service Dialling Numbers for TETRA network).91 10.3.39 EFSTXT (Status message texts).91 10.3.40 EFMSGTXT (SDS-1 message texts).92 10.3.41 EFSDS123 (Status and SDS type 1, 2 and 3 message storage).94 10.3.42 EFSDS4 (SDS type 4 message storage).95 10.3.43 EFMSGEXT (Message Extension).100 10.3.44 EFEADDR (Emergency addresses).101 10.3.45 EFEINFO (Emergency call information).103 10.3.46 EFDMOCh (DMO channel information).104 10.3.47 EFMSCh (MS allocation of DMO channels).104 10.3.48 EFKH (List of Key Holders).105 10.3.49 EFREPGATE (DMO repeater and gateway list).106 SIST EN 300 812 V2.1.1:2003
ETSI ETSI EN 300 812 V2.1.1 (2001-12)6 10.3.50 EFAD (Administrative data).107 10.3.51 EFPREF_LA (Preferred location areas).107 10.3.52 EFLNDComp (Composite LND file).108 10.3.53 EF DFLTSTSTGT (Status Default Target).109 10.3.54 EFSDSMEM_STATUS (SDS Memory Status).112 10.3.55 EFWELCOME (Welcome Message).113 10.3.56 EFSDSR (SDS delivery report).114 10.3.57 EFSDSP (SDS parameters).114 10.3.58 EFDIALSC (Dialling schemes for TETRA network).116 10.3.59 EFAPN (APN table).117 10.3.60 EFPNI (Private Number Information).117 10.4 Contents of the EFs at the Telecom level.119 10.4.1 EFADN (Abbreviated dialling numbers).119 10.4.2 EFFDN (Fixed dialling numbers).122 10.4.3 EFMSISDN (MSISDN).123 10.4.4 EFLND (Last number dialled).123 10.4.5 EFSDN (Service Dialling Numbers).124 10.4.6 EFEXT1 (Extension1).124 10.4.7 EFEXT2 (Extension2).126 10.4.8 EFEXT3 (Extension3).126 10.5 Files of TETRA.127 11 Application protocol.128 11.1 General procedures.129 11.1.1 Reading an EF.129 11.1.2 Updating an EF.130 11.1.3 Invalidating an EF.130 11.2 SIM management procedures.130 11.2.1 SIM initialization.130 11.2.2 TETRA session initialization.130 11.2.3 TETRA session termination.131 11.2.4 Language preference request.131 11.2.5 Administrative information request.131 11.2.6 SIM service table request.131 11.2.7 SIM phase request.131 11.2.8 SIM presence detection.131 11.2.9 SIM card number request.131 11.2.10 Common Cipher Key request.132 11.3 CHV related procedures.132 11.3.1 CHV verification.132 11.3.2 CHV value substitution.132 11.3.3 CHV disabling.133 11.3.4 CHV enabling.133 11.3.5 CHV unblocking.133 11.4 TETRA security related procedures.133 11.4.1 Authentication procedures and generation of DCK.134 11.4.1.1 Mutual authentication requirement request.134 11.4.1.2 SIM authentication.134 11.4.1.3 SwMI authentication.134 11.4.2 TETRA OTAR key computation (CCK, GCK, SCK).134 11.4.2.1 CCK distribution.134 11.4.2.2 CCK changeover.134 11.4.2.3 GCK distribution.134 11.4.2.4 SCK distribution.135 11.4.3 ITSI request.135 11.4.4 ITSI disabling/re-enabling.135 11.5 Subscription related procedures.135 11.5.1 Username request.135 11.5.2 ITSI temporarily disabled enquiry.135 11.5.3 Subscriber class request.136 11.5.4 Void.136 11.5.5 Group identity information.136 SIST EN 300 812 V2.1.1:2003
ETSI ETSI EN 300 812 V2.1.1 (2001-12)7 11.5.5.1 Static Group identity information.136 11.5.5.2 Dynamic Group identity information.136 11.5.6 Group related data.136 11.5.7 User's group information.136 11.5.8 Call modifiers.136 11.5.9 Service Provider Name.137 11.5.10 DMO channel procedures.137 11.5.11 Emergency addresses.137 11.5.12 Interrupted emergency call request.137 11.6 Network related procedures.137 11.6.1 Forbidden networks.137 11.6.2 Preferred networks.138 11.7 Dialling number related procedures.138 11.7.1 Dialling numbers under DFTETRA.138 11.7.2 Dialling numbers under DFTELECOM.139 11.7.3 FDNGWT specific procedures.140 11.7.3.1 FDNGWT capability request.141 11.7.3.2 FDNGWT disabling.141 11.7.3.3 FDNGWT enabling.141 11.8 Status and short data message procedures.141 11.8.1 Display of status message texts.141 11.8.2 Display of SDS1 message texts.141 11.8.3 Storage of status and SDS messages types 1, 2 and 3.142 11.8.4 Storage of SDS messages type 4.142 11.8.5 SDS delivery report.142 11.8.6 Default Status Target.143 Annex A (normative): Plug-in SIM.144 Annex B (informative): FDN Procedures.145 Annex C (informative): Suggested contents of EFs at pre-personalization.146 C.1 Contents of the EFs at the MF level.146 C.2 Contents of the EFs at the TETRA application level.146 C.3 Contents of the EFs at the Telecom Level.147 Annex D (normative): Database structure for group IDs and phone books.148 Annex E (informative): Emergency call facilities and procedures.151 Annex F (informative): Composite List of Last Dialled Numbers.153 Annex G (informative): Bibliography.155 History.156
ETSI ETSI EN 300 812 V2.1.1 (2001-12)8 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...