01.563GPPCTS Authentication and Key Generation Algorithms RequirementsGSM Cordless Telephony System (CTS), Phase 1TS
ETSI SAGE are required to provide four separate deliverables: a specification of the algorithm, a set of design conformance test data, a set of algorithm input/output test data and a design and evaluation report. Requirements on the specification and test data deliverables are given in this clause, those on the design and evaluation report in subclause 8.3.
The design of the algorithm set will have a pre-evaluation phase. Equipment manufacturers/organisations that have contributed to the funding of the SAGE design work for this algorithm set are allowed to participate in this evaluation and can get access to the algorithm specifications as they stand.
The purpose of the pre-evaluation phase is to allow manufacturers/implementators early visibility of the structure of the algorithm(s) so that they can assess what is involved in its implementation, and confirm that there are no problems in realising the design in the target environment. They will be provided with an algorithm specification that accurately reflects structure and processing requirements of the algorithm set. Any changes between pre-evaluation specification and the final specification are not expected to have any significant impact on code size or algorithm timing.
The specification shall include an annex which provides simulation code written in ANSI C. Access requires a non-disclosure agreement between the manufacturer/organisation and ETSI SAGE.
Those equipment manufacturers/organisations that do not contribute will get access to algorithm set specification only after the SAGE work has been completed.
7.1 Specification of the algorithm set
An unambiguous specification of the algorithm set needs to be provided which is suitable for use by implementors of the algorithm set.
The specification shall include an annex which provides simulation code for the algorithm set written in ANSI C. The specification may also include an annex containing illustrations of functional elements of the algorithm set.
7.2 Design conformance test data
Design conformance test data is required to allow implementors of the algorithm set to test their implementations.
The test data needs to be designed to give a high degree of confidence in the correctness of implementations of the algorithm set.
The test data shall be designed so that significant points in the execution of the algorithm may be verified.
7.3 Algorithm set input/output test data
Algorithm set input/output test data is required to allow users of the algorithm set to test each member of the algorithm set as a "black box" function.
The input/output test data shall consist solely of data passed across the interfaces to the algorithm set members.
7.4 Format and handling of deliverables
The specification of the algorithm set shall be produced on paper, and provided only to the ETSI appointed custodian (see subclause 5.4). The document shall be marked "Strictly ETSI confidential" and carry the warning "This information is subject to a licence and confidentiality agreement".
The design conformance test data shall be produced on paper, and provided only to the ETSI appointed custodian. The document shall be marked "Strictly ETSI confidential" and carry the warning "This information is subject to a licence and confidentiality agreement".
The algorithm set input/output test data shall be produced on paper and on magnetic disc. The document and disc shall be provided to the ETSI appointed custodian. Special markings or warnings are not required.
The design and evaluation report should be published as an ETSI Technical Report.