|
TECHNICAL SPECIFICATION
Digital cellular telecommunications system (Phase 2+) (GSM);
Specification of the GSM-MILENAGE algorithms: An example
algorithm set for the GSM Authentication and Key Generation
Functions A3 and A8
(3GPP TS 55.205 version 15.0.0 Release 15)
R
GLOBAL SYSTEM FOR
MOBILE COMMUNICATIONS
---------------------- Page: 1 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 1 ETSI TS 155 205 V15.0.0 (2018-11)
Reference
RTS/TSGS-0355205vf00
Keywords
GSM,SECURITY
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
The present document can be downloaded from:
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
If you find errors in the present document, please send your comment to one of the following services:
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2018.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.
TM TM
3GPP and LTE are trademarks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and
of the oneM2M Partners
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI
---------------------- Page: 2 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 2 ETSI TS 155 205 V15.0.0 (2018-11)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
Foreword
This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP).
The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or
GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables.
The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under
.
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
---------------------- Page: 3 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 3 ETSI TS 155 205 V15.0.0 (2018-11)
Contents
Intellectual Property Rights . 2
Foreword . 2
Modal verbs terminology . 2
Foreword . 4
Introduction . 4
1 Scope . 5
2 References . 5
3 Introductory information (normative) . 5
3.1 Introduction . 5
3.2 Algorithm Inputs and Outputs . 5
3.3 Notation . 6
3.3.1 Bit/Byte ordering . 6
3.3.2 List of Symbols . 6
4 The GSM-MILENAGE algorithms (normative) . 6
5 An alternative algorithm (informative) . 7
6 Test data for GSM-MILENAGE (informative) . 8
6.1 Introduction . 8
6.2 Format . 8
6.3 Test Sets . 8
Annex A (informative): Change history . 14
History . 15
ETSI
---------------------- Page: 4 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 4 ETSI TS 155 205 V15.0.0 (2018-11)
Foreword
rd
This Technical Specification has been produced by the 3 Generation Partnership Project (3GPP).
The contents of the present document are subject to continuing work within the TSG and may change following formal
TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an
identifying change of release date and an increase in version number as follows:
Version x.y.z
where:
x the first digit:
1 presented to TSG for information;
2 presented to TSG for approval;
3 or greater indicates TSG approved document under change control.
y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections,
updates, etc.
z the third digit is incremented when editorial only changes have been incorporated in the document.
Introduction
This document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which may be
used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular
algorithms specified in this document are used - the A3 and A8 functions are operator-specifiable rather than being fully
standardised).
ETSI
---------------------- Page: 5 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 5 ETSI TS 155 205 V15.0.0 (2018-11)
1 Scope
The present document contains an example set of algorithms which may be used as the GSM authentication and key
generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used -
the A3 and A8 functions are operator-specifiable rather than being fully standardised).
Section 3 (normative) introduces the algorithms and describes their input and output parameters. Section 4 (normative)
defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer.
Section 6 (informative) provides test data.
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present
document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or
non-specific.
- For a specific reference, subsequent revisions do not apply.
- For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including
a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same
Release as the present document.
[1] 3GPP TS 35.206: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example
algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and
f5*; Document 2: Algorithm specification".
[2] 3GPP TS 35.207: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example
algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and
f5*; Document 3: Implementors' test data".
[3] 3GPP TS 35.208: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example
algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and
f5*; Document 4: Design conformance test data".
[4] 3GPP TS 33.102 version 3.10.0: "3rd Generation Partnership Project; Technical Specification
Group Services and System Aspects; 3G Security; Security architecture (Release 1999)".
[5] 3GPP TS 03.20 version 8.1.0: "3rd Generation Partnership Project; Digital cellular
telecommunications system (Phase 2+); Security related network functions (Release 1999)".
3 Introductory information (normative)
3.1 Introduction
Within the security architecture of the GSM system there are security functions A3 and A8. The operation of these
functions falls completely within the domain of an individual operator, and the functions are therefore to be specified by
each operator rather than being fully standardised. The algorithms specified in this document are examples that may be
used by an operator who does not wish to design his own.
The inputs and outputs of the two functions are defined in section 3.2.
3.2 Algorithm Inputs and Outputs
The inputs to the algorithms are given in table 1, the outputs in tables 2 and 3 below.
ETSI
---------------------- Page: 6 ----------------------
3GPP TS 55.205 version 15.0.0 Release 15 6 ETSI TS 155 205 V15.0.0 (2018-11)
Table 1: Inputs to A3 and A8
Parameter Size (bits) Comment
Ki 128 Subscriber key Ki[0]…Ki[127]
RAND 128 Random challenge RAND[0]…RAND[127]
Table 2: A3 output
Parameter Size (bits) Comment
SRES 32 Signed response SRES[0]…SRES[31]
Table 3: A8 output
Parameter Size (bits) Comment
KC 64 Cipher key KC[0]…KC[63]
3.3 Notation
3.3.1 Bit/Byte ordering
All data variables in this specification are presented with the most significant bit (or byte) on the left hand side and the
least significant bit (or byte) on the right hand side. Where a variable is broken down into a number of substrings, the
leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the
least significant. When a variable, with bit length L, is shown in hexadecimal format, bit 0 is the most significant bit of
the leftmost hexadecimal digit, and bit L-1 is the least significant bit of the rightmost hexadecimal digit.
3.3.2 List of Symbols
= The assignment operator.
|| The concatenation of the two operands.
⊕ The bitwise exclusive-OR operation.
th
X[i] The i bit of the variable X. (X = X[0] || X[1] || X[2] || …. ).
4 The GSM-MILENAGE algorithms (normative)
An example algorithm set for UMTS, called MILENAGE (note 1), is specified in [1]. GSM-MILENAGE makes use of
MILENAGE.
Specifically, the functions from the UMTS MILENAGE which we make use of are the following (we prefix all input
and output names by "MIL3G-" to distinguish them clearly from the inputs and outputs of A3 and A8):
Function Inp
...