TS 101 377-3-10 : 1.1.1
Current
The latest, up-to-date edition.
GEO-MOBILE RADIO INTERFACE SPECIFICATIONS; PART 3: NETWORK SPECIFICATIONS; SUB-PART 10: SECURITY RELATED NETWORK FUNCTIONS; GMR-2 03.020
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 General
5 Subscriber identity confidentiality
6 Subscriber identity authentication
6.1 Generality
6.2 The authentication procedure
6.3 Subscriber authentication key management
7 Confidentiality of signalling information elements,
connectionless data and user information elements
on physical connections
7.1 Generality
7.2 The ciphering method
7.3 Key settings
7.4 Ciphering key sequence number
7.5 Starting of the ciphering and deciphering
process
7.6 Synchronization
7.7 Handover
7.8 Negotiation of the GMR-2-A5 algorithm
7.9 Ciphering of single-hop mobile-to-mobile
connections
8 Synthetic summary
Annex A (informative): Security issues related to
signalling schemes and key management
A.1 Introduction
A.2 Short description of the schemes
Annex B (informative): Security information to be
stored in the entities of the GMR-2 system
B.1 Introduction
B.2 Entities and security information
Annex C (normative): External specifications of
security related algorithms
C.1 Specification for algorithm GMR-2-A5
C.2 Algorithm A3
C.3 Algorithm A8
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.