SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

SG.03  Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6 image

This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be administered by the GSM Association. It also sets out rules regarding the management of the algorithms by network operators and manufacturers as well as listing the contact details for the administrator.

Download