|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10+-years archives of 39,000 files from June 1996 to December 2006 (~4.1 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
20 January 2007
http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_45_Ashburn/Report/Draft_Rep_v004_SA3_45.zip
3GPP TSG SA WG3 (Security) meeting #45 S3-06xxx
Ashburn, USA, 31st Oct - 3rd Nov 2006
http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_45_Ashburn/Output/
Index of documents from Ashburn meeting
http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_45_Ashburn/Output/S3-060792.zip
[Excerpt]
4.8 Negotiation of A5 algorithm
Not more than seven versions of the A5 algorithm will be defined.
When an MS wishes to establish a connection with the network, the MS shall indicate to the network which of the seven versions of the A5 algorithm it supports. The network shall not provide service to an MS which indicates that it does not support the ciphering algorithm A5/1.
A5/2 shall not be supported in new MS after <insert date>.
NOTE: It is strongly encouraged not to support A5/2 in new terminals
after July 1st, 2006.
The network shall compare its ciphering capabilities and preferences, and any special requirements of the subscription of the MS, with those indicated by the MS and act according to the following rules:
1) If the MS and the network have no versions of the A5 algorithm in common and the network is not prepared to use an unciphered connection, then the connection shall be released.2) If the MS and the network have at least one version of the A5 algorithm in common, then the network shall select one of the mutually acceptable versions of the A5 algorithm for use on that connection.
3) If the MS and the network have no versions of the A5 algorithm in common and the network is willing to use an unciphered connection, then an unciphered connection shall be used.