EG 202 238 : 1.1.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); EVALUATION CRITERIA FOR CRYPTOGRAPHIC ALGORITHMS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Abbreviations
4 Introduction
4.1 Background
4.2 Algorithm purpose
4.3 Export control
4.4 Acquisition methods
4.5 Liability and Responsibility for algorithms
5 Open and secret algorithms
6 Design Strategy
6.1 Selection of an off the shelf algorithm
6.2 Invite submissions
6.3 Commission a special group to design an algorithm
7 Evaluation Strategy
8 Distribution Strategy
9 Relevant aspects in an algorithm acquisition process
9.1 Design methodology
9.2 Evaluation methodology
Annex A (informative): Overview of ETSI Standard Algorithms
A.1 GSM - the Global System for Mobile communications
A.2 DECT - Digital Enhanced Cordless Telecommunications
A.3 ISDN based audio-visual system
A.4 Multi-application telecommunications cards
A.5 UPT - User Personal Telecommunications
A.6 Hiperlan - High Performance radio LAN
A.7 Binary Encryption Algorithm for Network Operators
(BEANO)
A.8 TETRA - Terrestrial Trunked Radio
Annex B (informative): Development of AES using public RFP
design strategy
B.1 Overview of the AES selection
B.2 Overall timetable
B.3 Analysis of AES
Annex C (informative): ETSI SAGE
C.1 SAGE Report from 2001 (extract)
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.