id
stringlengths
4
12
title
stringlengths
8
250
type
stringclasses
2 values
version
stringclasses
612 values
working_group
stringclasses
30 values
url
stringlengths
65
81
scope
stringlengths
0
65.7k
33.256
Security aspects of Uncrewed Aerial Systems (UAS)
TS
17.6.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.256/33256-h60.zip
33.259
Key establishment between a UICC hosting device and a remote device
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.259/33259-h00.zip
33.303
Proximity-based Services (ProSe); Security aspects
TS
17.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.303/33303-h20.zip
33.328
IP Multimedia Subsystem (IMS) media plane security
TS
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.328/33328-h10.zip
33.320
Security of Home Node B (HNB) / Home evolved Node B (HeNB)
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.320/33320-h00.zip
33.326
Security Assurance Specification (SCAS) for the Network Slice-Specific Authentication and Authorization Function (NSSAAF) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.326/33326-h00.zip
33.310
Network Domain Security (NDS); Authentication Framework (AF)
TS
17.9.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-h90.zip
33.401
3GPP System Architecture Evolution (SAE); Security architecture
TS
17.7.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/33401-h70.zip
33.402
3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/33402-h00.zip
33.434
Security aspects of Service Enabler Architecture Layer (SEAL) for verticals
TS
17.4.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.434/33434-h40.zip
33.501
Security architecture and procedures for 5G System
TS
17.14.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-he0.zip
33.503
Security Aspects of Proximity based Services (ProSe) in the 5G System (5GS)
TS
17.10.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.503/33503-ha0.zip
33.511
Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class
TS
17.6.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.511/33511-h60.zip
33.512
5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF)
TS
17.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.512/33512-h30.zip
33.513
5G Security Assurance Specification (SCAS); User Plane Function (UPF)
TS
17.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.513/33513-h20.zip
33.514
5G Security Assurance Specification (SCAS) for the Unified Data Management (UDM) network product class
TS
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.514/33514-h10.zip
33.515
5G Security Assurance Specification (SCAS) for the Session Management Function (SMF) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.515/33515-h00.zip
33.516
5G Security Assurance Specification (SCAS) for the Authentication Server Function (AUSF) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.516/33516-h00.zip
33.517
5G Security Assurance Specification (SCAS) for the Security Edge Protection Proxy (SEPP) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.517/33517-h00.zip
33.518
5G Security Assurance Specification (SCAS) for the Network Repository Function (NRF) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.518/33518-h00.zip
33.519
5G Security Assurance Specification (SCAS) for the Network Exposure Function (NEF) network product class
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.519/33519-h00.zip
33.520
Security Assurance Specification (SCAS) for Non-3GPP InterWorking Function (N3IWF)
TS
0.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.520/33520-030.zip
33.521
5G Security Assurance Specification (SCAS);Network Data Analytics Function (NWDAF)
TS
17.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.521/33521-h20.zip
33.522
5G Security Assurance Specification (SCAS); Service Communication Proxy (SCP)
TS
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.522/33522-h10.zip
33.535
Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)
TS
17.12.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.535/33535-hc0.zip
33.536
Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services
TS
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.536/33536-h10.zip
33.558
Security aspects of enhancement of support for enabling edge applications
TS
17.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.558/33558-h30.zip
33.809
Study on 5G security enhancements against False Base Stations (FBS)
TR
0.21.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.809/33809-0l0.zip
33.818
Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS) for 3GPP virtualized network products
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.818/33818-h10.zip
The present document studies the SECAM (Security Assurance Methodology) and SCAS (Security Assurance Specification) for 3GPP virtualised network products based on SECAM and SCAS defined in TR 33.916 [2]. It makes thorough gap analysis between current SECAM/SCAS work in TR 33.916 [2] and SECAM/SCAS work for 3GPP virtualised network products. It also identifies, defines ToE and roles of SECAM/SCAS for 3GPP virtualised network products according to deployment scenarios and decoupling ways. Based on the identified ToE and roles, the present document details the needed change or additional work to current security assurance methodology for the creation, evaluation procedure of related SCAS documents, etc. It studies new threats of the identified ToE and identifies the additional security requirements of the ToE, or/and identifies existing relevant/supporting requirements specified in ETSI NFV specifications or the equivalent. The present document also provides potential new SECAM/SCAS proposals and points out the impact to existing SECAM/SCAS documents (including TR 33.916 [2], TR 33.926 [3], TS 33.117 [4], etc.). NOTE: SECAM/SCAS of 3GPP virtualised network products in the present document considers only the scenario that 3GPP VNF deployed in the virtual machines.
33.824
Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.824/33824-h00.zip
The present document: - Describes potential security threats and vulnerabilities that are applicable to the enhanced IAB architecture specified in the TS 38.300 [3], TS 38.331 [8], TS 38.321 [9] and TS 38.340 [10]. - Identifies potential security requirements for those potential security threats and vulnerabilities. - Proposes candidate solutions to ensure that the enhanced IAB architecture specified in the 3GPP TS 38.300 [3], TS 38.331 [8], TS 38.321 [9] and TS 38.340 [10] does not introduce security vulnerabilities in the 5G system providing a secure connection for the UEs connecting to the NR through IAB node(s). - Concludes with the solutions that should be included in a future normative phase.
33.839
Study on security aspects of enhancement of support for edge computing in the 5G Core (5GC)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.839/33839-h10.zip
The present document studies the security enhancements on the support for Edge Computing in the 5G Core network define in TR 23.748 [3], and application architecture for enabling Edge Applications defined in TR 23.758 [4] and TS 23.558 [2]. Potential security requirements are provided and possible security enhancements to 5GS and edge application architecture are proposed that meet these security requirements. NOTE: The user consent for exposure of information to Edge Applications is addressed in TR 33.867 [20].
33.845
Study on storage and transport of 5G Core (5GC) security parameters for Authentication Credential Repository Processing Function (ARPF) authentication
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.845/33845-h00.zip
The present document details the following: - The security assumptions relating to security communication in 5G. - The security assumptions related to protecting subscriber privacy. - The home network parameters that are relevant to securing the communication in 5G and protecting subscriber privacy. - Key Issues, threats and requirements relevant to securing the communication in 5G and protecting subscriber privacy. - Solutions that potentially resolve the key issues described. The present document does not describe the storage of security parameters in the UE or the serving network or the transportation of secure information between the home network and the serving network.
33.846
Study on authentication enhancements in the 5G System (5GS)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.846/33846-h00.zip
The scope of the present document is the following: - key issues, potential security requirements and solutions of how to enhance the authentication process to ensure the security of session anchor keys in case the long-term key is leaked. - key issues, potential security requirements and solutions of how to mitigate the linkability attacks. - key issues, potential security requirements and solutions of how to mitigate the impacts of potential DDoS threats due to concealing the SUPI. - key issues, potential security requirements and solution of how to mitigate the leaking of SQN values during AKA re-synchronisation.
33.847
Study on security aspects of enhancement for proximity based services in the 5G System (5GS)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.847/33847-h10.zip
The present document studies the security and privacy aspects of proximity based services (including public safety and commercial proximity services) in the 5G system. It ensures that the security solutions are aligned with the work in TR 23.752 [2], TS 22.278 [3] and TS 22.261 [4]. The present document covers the following issues: - Security and privacy key issues, threats and potential requirements of proximity based services in 5G system. - Potential security solutions to cover these potential requirements. Both roaming and non-roaming scenarios are considered.
33.850
Study on security aspects of enhancements for 5G Multicast-Broadcast Services (MBS)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.850/33850-h00.zip
The present document studies the security of 5G multicast-broadcast services based on FS_5MBS study in TR 23.757 [2]. Potential security requirements are identified and possible security solutions are proposed to address these security requirements.
33.851
Study on security for enhanced support of Industrial Internet of Things (IIoT)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.851/33851-h10.zip
The present document studies the security impact of time sensitive communication aspects in Industrial IoT based on FS_IIoT study in TR 23.700-20 [4] and the architecture described in 3GPP TS 23.501 [3].
33.853
Study on key issues and potential solutions for integrity protection of the User Plane (UP)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.853/33853-h00.zip
The present document studies the key issues and potential solutions for integrity protecting the user plane, including potential enhancements needed to support UP IP up to the full data rate, in the following combinations as defined in 3GPP TR 38.801 [2] (clause 7.2): - Option 1 - eUTRA with EPC - Option 2 - NR standalone with 5G Core - Option 3 - EPC based Dual Connectivity of eUTRA and NR RAT - Option 4 - 5G Core based Dual Connectivity (NR master - eUTRA secondary) - Option 5 - 5G Core with eUTRA - Option 7 - 5G Core based Dual Connectivity (eUTRA master - NR secondary) The present document does not detail key issues, solutions, evaluations, conclusions and recommendations for GERAN and UTRAN.
33.854
Study on security aspects of Uncrewed Aerial Systems (UAS)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.854/33854-h10.zip
The present document contains a study on the security aspects of Uncrewed Aerial Systems (UASs). TS 22.125 [2] contains the service requirements for UAS while TR 23.754 [3] is studying aspects like the UAS connectivity, identification and tracking and TR 23.755 [4] studies UAV services and application layer features. The security study of the present document provides key issue including security threat and potential requirements related to the work in these other specifications and develops and analyses solutions to these key issues. Finally the study provides some conclusions for potential normative work.
33.857
Study on enhanced security support for Non-Public Networks (NPN)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.857/33857-h10.zip
The aim of the present document is to study the security aspects for any potential enhancements based on the outcome of the study in TR 23.700-07 [3]. For each of the objectives in the scope of the study in TR 23.700-07 [3], the security aspects that are to be covered in the present document are as follows: - Enhancements to Support SNPN along with credentials owned by an entity separate from the SNPN - Study potential solutions for authentication using credentials owned by an entity separate from the SNPN - UE Onboarding and remote provisioning of non-USIM credentials - Identify security Key Issues relating to UE Onboarding and remote provisioning with non-USIM credentials - Identify methods by which the UE can be verified as "uniquely identifiable and verifiably secure" - Critically review the security aspects of the proposed solutions in TR 23.700-07 [3] and make recommendations for security improvements where required. - Study potential solutions for the secure provisioning of non-USIM credentials taking into account different deployment scenarios. NOTE 1: The term USIM in this context denotes the IMSI accompanied by AKA credentials (i.e. for primary authentication with the PLMN). - Support of IMS voice and emergency services for SNPN: - Analyse potential security impacts from supporting IMS voice and IMS services in SNPNs. In Rel-16 SNPNs do not support IMS emergency services but for Rel-17 its expected that the enabling of IMS and IMS services for SNPNs is to be studied. NOTE 2: Key issue 2 in TR 23.700-07 [3] is assumed to not require any study from a security perspective.
33.862
Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.862/33862-h10.zip
The present document studies the security aspects on the support of the 5GMSG Service defined in TR 23.700-24 [2], determines key issues of potential security requirements and proposed possible security solutions to meet these security requirements.
33.864
Study on the security of Access and Mobility Management Function (AMF) re-allocation
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.864/33864-h00.zip
The present document aims at addressing the case for the indirect reroute procedure for UE registration. The intention is to enable deployment scenarios with stricter slice isolation requirements on the core network, for example where the AMFs are unable to communicate with each other. The aim of the present document is to: - Collect the potential requirements related to the AMF re-allocation procedure. - Study the potential enhancements to the security mechanisms in order to fulfil the requirements for the AMF re-allocation.
33.874
Study on enhanced security for network slicing phase 2
TR
0.7.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.874/33874-070.zip
33.866
Study on security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.866/33866-h00.zip
The present document studies the security aspects of enablers for network automation for the 5G system based on the outcome of TR 23.700-91 [1]. More specifically, the present document identifies security issues, requirements and corresponding potential security solutions related to the following objectives: - UE data collection protection to fulfil the NWDAF functionalities including privacy consideration, data authenticity, data integrity, and accessibility aspects requirements. - Detection of cyber-attacks and anomaly events supported by NWDAF and its related functions, specifically to identify parameters provided by UE and NFs, which can help to detect attacks and abnormal behaviours; - Protection of data transferring (e.g. privacy consideration) in the inter-NWDAF/NWDAF instances. NOTE: The user consent for UE data collection is not addressed in the present document, it will be discussed in TR 33.867 [2].
33.873
Study on the security of the system enablers for devices having Multiple Universal Subscriber Identity Modules (MUSIM)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.873/33873-h10.zip
The present document contains the study of system enablers for devices having multiple Universal Subscriber Identity Modules (USIM) in the EPS and 5G system architecture are studied in 3GPP TR 23.761 [2]. The present document provides the security and privacy issues related to MUSIM architecture and lists potential solutions for identified key issues including. - Security and privacy issues exposing the Paging Cause in clear text in paging message. - Security aspects of the communication between UE and Paging Server and exposing Paging server address. - Security and Privacy implications if a Multi-USIM device needs to explicitly indicate to the MNO owning one USIM and that UE is also registered via another USIM at the same or different PLMNs. - Security aspects of Paging Response with cause value busy indication. Finally, the present document provides some conclusions for potential normative work.
33.867
Study on user consent for 3GPP services
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.867/33867-h10.zip
The scope of present document is to identify and evaluate the requirements and solutions to support user consent for 3GPP services while complying with user privacy considerations. The details are as follows: - Review TR 33.849 [3] with regards to the concept of user consent for 3GPP users, and identify what types of data collection and conditions under which the support of the user consent is required; then update them if needed. - Identify target usage scenarios and trust domains. - Analyse potential security threats and requirements for conditions under which user sensitive data are collected without user consent, and when user consent indication is not protected. - Identify potential solutions to address the above security requirements. NOTE 1: Principles, regulations, and definitions related to privacy, which are recognized differently in each different country or area, are taken into account when deriving the concept of user consent for 3GPP users. NOTE 2: Even where solutions exist to obtain user consent, collection and exposure of user sensitive data should be minimized and only be allowed where critical to the operation of the related feature.
33.875
Study on enhanced security aspects of the 5G Service Based Architecture (SBA)
TR
1.7.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.875/33875-170.zip
33.876
Study on automated certificate management in Service-Based Architecture (SBA)
TR
0.8.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.876/33876-080.zip
33.881
Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.881/33881-h10.zip
The scope of the present document is to support Non-seamless WLAN Offload (NSWO) in 5GS. The following will be studied in this document: 1) Solutions to support NSWO in 5GS. 2) Procedures to support authentication methods for the respective solutions in objective. 3) Maintain privacy of subscription identifier similar to 3GPP/non-3GPP access to 5GC, even for NSWO authentication from WLAN.
33.905
Recommendations for Trusted Open Platforms
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-h00.zip
33.916
Security Assurance Methodology (SECAM) for 3GPP network products
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-h00.zip
33.919
3G Security; Generic Authentication Architecture (GAA); System description
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-h00.zip
33.924
Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-h00.zip
33.926
Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes
TR
17.9.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-h90.zip
33.935
Study on detailed Long Term Key Update Process (LTKUP) detailed solutions
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.935/33935-h00.zip
33.937
Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-h00.zip
33.969
Study on security aspects of Public Warning System (PWS)
TR
17.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-h10.zip
33.980
Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA)
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-h00.zip
33.995
Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-h00.zip
34.109
Terminal logical test interface; Special conformance testing functions
TS
17.0.0
R2
https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-h00.zip
34.123-3
User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS)
TS
17.5.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-3/34123-3-h50.zip
34.124
Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment
TS
17.1.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-h10.zip
34.131
Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API)
TS
17.0.0
C6
https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-h00.zip
34.229-1
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 1: Protocol conformance specification
TS
17.2.1
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-1/34229-1-h21.zip
34.229-2
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification
TS
17.3.1
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-h31.zip
34.229-3
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS)
TS
17.7.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-h70.zip
34.229-5
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 5: Protocol conformance specification using 5G System (5GS)
TS
17.3.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-5/34229-5-h30.zip
34.926
Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment
TR
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-h00.zip
35.201
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-h00.zip
35.202
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-h00.zip
35.203
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-h00.zip
35.204
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-h00.zip
35.205
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-h00.zip
35.206
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-h00.zip
35.207
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-h00.zip
35.208
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-h00.zip
35.215
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-h00.zip
35.216
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-h00.zip
35.217
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-h00.zip
35.218
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-h00.zip
35.221
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-h00.zip
35.222
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-h00.zip
35.223
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-h00.zip
35.231
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-h00.zip
35.232
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.232/35232-h00.zip
35.233
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data
TS
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.233/35233-h00.zip
35.909
3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-h00.zip
35.919
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.919/35919-h00.zip
35.924
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.924/35924-h00.zip
35.934
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.934/35934-h00.zip
35.935
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.935/35935-h00.zip
35.936
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment
TR
17.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.936/35936-h00.zip
36.101
Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception
TS
17.17.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.101/36101-hh0.zip
36.104
Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) radio transmission and reception
TS
17.13.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.104/36104-hd0.zip
36.106
Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater radio transmission and reception
TS
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.106/36106-h00.zip
36.111
Location Measurement Unit (LMU) performance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.111/36111-h00.zip
36.112
Location Measurement Unit (LMU) conformance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.112/36112-h00.zip
36.113
Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) and repeater ElectroMagnetic Compatibility (EMC)
TS
17.3.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.113/36113-h30.zip
36.116
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay radio transmission and reception
TS
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.116/36116-h00.zip
36.117
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay conformance testing
TS
17.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.117/36117-h00.zip
36.124
Evolved Universal Terrestrial Radio Access (E-UTRA); Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment
TS
17.1.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.124/36124-h10.zip