6.3.3 Security control information elements

36.3313GPPEvolved Universal Terrestrial Radio Access (E-UTRA)Protocol specificationRadio Resource Control (RRC)Release 15TS

NextHopChainingCount

The IE NextHopChainingCount is used to update the KeNB key and corresponds to parameter NCC: See TS 33.401 [32], clause 7.2.8.4.

NextHopChainingCount information element

— ASN1START

NextHopChainingCount ::= INTEGER (0..7)

— ASN1STOP

SecurityAlgorithmConfig

The IE SecurityAlgorithmConfig is used to configure AS integrity protection algorithm (SRBs) and AS ciphering algorithm (SRBs and DRBs). For RNs, the IE SecurityAlgorithmConfig is also used to configure AS integrity protection algorithm for DRBs between the RN and the E-UTRAN.

SecurityAlgorithmConfig information element

— ASN1START

SecurityAlgorithmConfig ::= SEQUENCE {

cipheringAlgorithm CipheringAlgorithm-r12,

integrityProtAlgorithm ENUMERATED {

eia0-v920, eia1, eia2, eia3-v1130, spare4, spare3,

spare2, spare1, …}

}

CipheringAlgorithm-r12 ::= ENUMERATED {

eea0, eea1, eea2, eea3-v1130, spare4, spare3,

spare2, spare1, …}

— ASN1STOP

SecurityAlgorithmConfig field descriptions

cipheringAlgorithm

Indicates the ciphering algorithm to be used for SRBs and DRBs, as specified in TS 33.401 [32], clause 5.1.3.2.

integrityProtAlgorithm

Indicates the integrity protection algorithm to be used for SRBs, as specified in TS 33.401 [32], clause 5.1.4.2. For RNs, also indicates the integrity protection algorithm to be used for integrity protection-enabled DRB(s).

ShortMAC-I

The IE ShortMAC-I is used to identify and verify the UE at RRC connection re-establishment. The 16 least significant bits of the MAC-I calculated using the security configuration of the source PCell, as specified in 5.3.7.4.

ShortMAC-I information element

— ASN1START

ShortMAC-I ::= BIT STRING (SIZE (16))

— ASN1STOP