SG.04 Confidentiality and Restricted Usage Undertaking Related to the Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) for Authentication and Cipher Key Generation in the GSM System v3.4

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

SG.04 Confidentiality and Restricted Usage Undertaking Related to the Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) for Authentication and Cipher Key Generation in the GSM System v3.4 image

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised signatories on behalf of the provider and the beneficiary.  Any party wishing to receive copies of COMP128 or COMP128-2 must sign this document and any party passing copies of the algorithm to third parties must first receive a signed a copy from the beneficiary.

Download