{"id":20315,"date":"2014-12-16T12:36:57","date_gmt":"2014-12-16T12:36:57","guid":{"rendered":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/"},"modified":"2014-12-16T12:36:57","modified_gmt":"2014-12-16T12:36:57","slug":"sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6","status":"publish","type":"gsma_theme_resources","link":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/","title":{"rendered":"SG.03  Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6"},"content":{"rendered":"<p>This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be administered by the GSM Association. It also sets out rules regarding the management of the algorithms by network operators and manufacturers as well as listing the contact details for the administrator.<\/p>\n<p><a href=\"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.03-v3.61.pdf\" target=\"_blank\" rel=\"noopener\">Download<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be &#8230;<\/p>\n","protected":false},"author":11,"featured_media":0,"template":"","meta":{"image":null,"json":{"gsma_resources_type":"Document","gsma_resources_thumb":"[]","gsma_resources_file":"[]","gsma_resources_multi":null,"gsma_resources_wgr":null,"gsma_resources_video":null,"gsma_resources_image":"[]","gsma_resources_url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/SG.03-v3.61.pdf","gsma_resources_date":"16-12-2014","gsma_resources_button":null}},"tags":[],"resource_categories":[4754,4760],"algolia_discover_state":[6602],"algolia_discover_topic":[6617],"algolia_discover_region":[],"algolia_discover_type":[6631],"algolia_discover_series":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6 - Newsroom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6\" \/>\n<meta property=\"og:description\" content=\"This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gsma\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GSMA\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6 - Newsroom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/","og_locale":"en_GB","og_type":"article","og_title":"SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6","og_description":"This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be ...","og_url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/gsma\/","twitter_card":"summary_large_image","twitter_site":"@GSMA","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/","url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/","name":"SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6 - Newsroom","isPartOf":{"@id":"https:\/\/www.gsma.com\/newsroom\/#website"},"datePublished":"2014-12-16T12:36:57+00:00","dateModified":"2014-12-16T12:36:57+00:00","breadcrumb":{"@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/sg-03-rules-for-the-management-and-the-distribution-of-the-gsm-example-algorithm-a3a8-comp-128-comp-128-2-and-comp128-3-used-for-authentication-and-cipher-key-generation-v3-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gsma.com\/newsroom\/"},{"@type":"ListItem","position":2,"name":"SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3\/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6"}]},{"@type":"WebSite","@id":"https:\/\/www.gsma.com\/newsroom\/#website","url":"https:\/\/www.gsma.com\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.gsma.com\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gsma.com\/newsroom\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.gsma.com\/newsroom\/#organization","name":"GSMA","url":"https:\/\/www.gsma.com\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","contentUrl":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","width":1000,"height":1000,"caption":"GSMA"},"image":{"@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gsma\/","https:\/\/x.com\/GSMA","https:\/\/www.instagram.com\/gsmaonline\/","https:\/\/www.linkedin.com\/company\/12380","https:\/\/www.youtube.com\/user\/GSMAOnline"]}]}},"cats":[{"term_id":4754,"name":"All Documents","slug":"all-documents","term_group":0,"term_taxonomy_id":4757,"taxonomy":"resource_categories","description":"","parent":0,"count":181,"filter":"raw"},{"term_id":6633,"name":"Blog","slug":"blog","term_group":0,"term_taxonomy_id":6636,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":4759,"name":"Configuration","slug":"configuration","term_group":0,"term_taxonomy_id":4762,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":6368,"name":"COVID-19","slug":"covid-19","term_group":0,"term_taxonomy_id":6371,"taxonomy":"resource_categories","description":"","parent":0,"count":5,"filter":"raw"},{"term_id":4760,"name":"Fraud and Security Group","slug":"fraud-and-security-group","term_group":0,"term_taxonomy_id":4763,"taxonomy":"resource_categories","description":"","parent":5081,"count":10,"filter":"raw"},{"term_id":4762,"name":"GSMA Corporate Documents","slug":"gsma-corporate-documents","term_group":0,"term_taxonomy_id":4765,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":4761,"name":"Internet Group","slug":"web-working-group","term_group":0,"term_taxonomy_id":4764,"taxonomy":"resource_categories","description":"","parent":5081,"count":6,"filter":"raw"},{"term_id":4764,"name":"Market Intelligence","slug":"market-intelligence","term_group":0,"term_taxonomy_id":4767,"taxonomy":"resource_categories","description":"","parent":5080,"count":7,"filter":"raw"},{"term_id":4758,"name":"Networks Group","slug":"networks-group","term_group":0,"term_taxonomy_id":4761,"taxonomy":"resource_categories","description":"","parent":5081,"count":55,"filter":"raw"},{"term_id":4763,"name":"OMTP Documents","slug":"omtp-documents","term_group":0,"term_taxonomy_id":4766,"taxonomy":"resource_categories","description":"","parent":5080,"count":5,"filter":"raw"},{"term_id":6600,"name":"Post Quantum Telco Network","slug":"post-quantum-telco-network","term_group":0,"term_taxonomy_id":6603,"taxonomy":"resource_categories","description":"","parent":5081,"count":0,"filter":"raw"},{"term_id":6599,"name":"Post Quantum Telco Network Task Force","slug":"post-quantum-telco-network-task-force","term_group":0,"term_taxonomy_id":6602,"taxonomy":"resource_categories","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":4757,"name":"SIM Working Group","slug":"sim-working-group","term_group":0,"term_taxonomy_id":4760,"taxonomy":"resource_categories","description":"","parent":5081,"count":25,"filter":"raw"},{"term_id":4755,"name":"Technical Documents","slug":"technical-documents","term_group":0,"term_taxonomy_id":4758,"taxonomy":"resource_categories","description":"","parent":5080,"count":34,"filter":"raw"},{"term_id":4756,"name":"Terminal Steering Group","slug":"terminal-steering-group","term_group":0,"term_taxonomy_id":4759,"taxonomy":"resource_categories","description":"","parent":5081,"count":32,"filter":"raw"},{"term_id":5080,"name":"Type","slug":"type","term_group":0,"term_taxonomy_id":5083,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5086,"name":"Web Working Group","slug":"web-working-group-2","term_group":0,"term_taxonomy_id":5089,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5081,"name":"Working Group","slug":"working-group","term_group":0,"term_taxonomy_id":5084,"taxonomy":"resource_categories","description":"","parent":0,"count":4,"filter":"raw"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20315"}],"collection":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources"}],"about":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/types\/gsma_theme_resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/users\/11"}],"version-history":[{"count":0,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/20315\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/media?parent=20315"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/tags?post=20315"},{"taxonomy":"resource_categories","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/resource_categories?post=20315"},{"taxonomy":"algolia_discover_state","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_state?post=20315"},{"taxonomy":"algolia_discover_topic","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_topic?post=20315"},{"taxonomy":"algolia_discover_region","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_region?post=20315"},{"taxonomy":"algolia_discover_type","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_type?post=20315"},{"taxonomy":"algolia_discover_series","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_series?post=20315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}