1 Scope

01.563GPPCTS Authentication and Key Generation Algorithms RequirementsGSM Cordless Telephony System (CTS), Phase 1TS

This specification constitutes a requirement specification for a set of associated cryptographic algorithms which is used for Cordless Telephony System (CTS) Radio Interface authentication and key management in the GSM Cordless Telephony System.

This specification is intended to provide ETSI SAGE with the information it requires in order to design and deliver a technical specification for such an algorithm set.

This specification covers the intended use of the algorithm set and use of the algorithm set specification, technical requirements on the algorithm set, requirements on the algorithm set specification and test data, and quality assurance requirements on both the algorithm set and its documentation. The document also outlines the background to the production of this specification.

1.1 Organisation of this specification

The material presented in the subsequent clauses of this specification is organised as follows:

subclause 1.2 provides some background to the production of this specification.

clauses 4 and 5 describe the context in which the algorithm set and its specification are intended to be used.
Clause 4 outlines the intended use of the algorithm set in terms of which organisations shall be entitled to use it, what they shall use it for, where it shall be used, and how it shall be implemented.
Clause 5 describes the intended use of the algorithm specification set in terms of who shall own it, who shall use it, and how and under what conditions the specification shall be provided to those users.

clause 6 specifies the functional requirements for the algorithm set. This covers the type and parameters of the algorithm, the interface to the algorithm set, the envisaged modes of operation of the algorithm set, implementation and operational considerations which may have an impact on the design of the algorithm set and requirements on the resilience of the algorithm set.

clause 7 details requirements on the algorithm set specification and associated test data deliverables.

clause 8 addresses quality assurance requirements, needed to give confidence in the design of the algorithm set and the adequacy of the algorithm set specification and test data.

clause 9 is a summary of the deliverables expected from ETSI SAGE.

1.2 Motivation

Discussions within SMG led to the conclusion that GSM-CTS can only be provided on a commercially solid and successful basis if appropriate security features are integrated into the system. In particular it was decided to standardise mechanisms both authentication and key generation algorithms.

Consequently an annex to GSM 03.20 was produced, which specifies the security features of the CTS. It was also concluded that, in order to support inter-operability between equipment, and in line with the policy for GSM, a set of standard ETSI algorithms for CTS Radio Interface authentication and key management needs to be specified.

The implementation of the algorithm set is mandatory, the implementation shall be in line with this specification.