SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6

SG.03  Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6 image

This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be administered by the GSM Association. It also sets out rules regarding the management of the algorithms by network operators and manufacturers as well as listing the contact details for the administrator.

Download

Contact the GSMA

Please get in touch if you need more information or have any queries about anything you see on our website.

Contact us