5 Use of the algorithm specification

01.563GPPCTS Authentication and Key Generation Algorithms RequirementsGSM Cordless Telephony System (CTS), Phase 1TS

This clause addresses ownership of the algorithm set specification, to define which types of organisations are entitled to obtain a copy of the algorithm set specification, and to outline how and under what conditions such organisations may obtain the specification.

5.1 Ownership

The algorithm set and all copyright to the algorithm set and test data specifications shall be owned exclusively by ETSI.

The design authority for the algorithm set shall be ETSI SAGE. Amendments to the algorithm set specification may be made only by ETSI SAGE under instruction authorised by the ETSI Board.

The algorithm set specification shall not be published as an ETSI standard or otherwise made publicly available, but shall be provided to organisations that need and are entitled to receive it subject to a licence and confidentiality agreement.

The licence and confidentiality agreement shall require recipients of the specification not to attempt to patent the algorithm or otherwise register any and IPR relating to the algorithm set or its use.

5.2 Users of the specification

The algorithm set specification may be made available to those who need the algorithm set specification in order to build equipment or components (including IC cards) which embody (parts of) the algorithm set, according to the GSM-CTS standard.

5.3 Licensing

Users of the algorithm set specification shall be required to sign a restricted usage and confidentiality agreement with ETSI.

Appropriate restricted usage and confidentiality agreements shall be drawn up by ETSI.

Usage shall be royalty free. However, the algorithm set custodian may impose a small charge to cover administrative costs involved in issuing the licenses.

The license and confidentiality agreement signed by an organisation that needs the algorithm set specification in order to build equipment or components which embody (part of) the algorithm set, shall require that organisation to adopt measures to ensure that its implementations of the algorithm set are commensurate with the need to maintain confidentiality of the algorithm.

5.4 Management of the specification

The distribution procedure for the algorithm set specification shall be specified by ETSI. SAGE is expected to design the appropriate procedure for the distribution of the algorithm set after consulting ETSI SMG and GSM Association Security Group. The outline procedure is as follows:

– ETSI shall appoint a custodian for administration of the algorithm set specification;

– an organisation which intends to build equipment or components that embody (or part of) the algorithm set may request copies of the algorithm set specification (and test data) and a licence to use the algorithm set from the custodian;

– if an organisation mentioned above is entitled to use the algorithm set, the custodian shall issue the requested algorithm specifications subject to the organisation signing a licence and confidentiality agreement;

– at least manufacturers of CTS equipment who are ETSI members are entitled to the algorithms set of specifications.