Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
4 DMO security class
5 DMO call procedures
6 Air interface authentication and key management
mechanisms
7 Enable and disable mechanism
8 Air Interface (AI) encryption
9 Encryption synchronization
Annex A (normative) - Key Stream Generator
(KSG) boundary conditions
Annex B (normative) - Boundary conditions for
cryptographic algorithm TB6
Annex C (informative) - Encryption control in DM-MS
Annex D (informative) - Bibliography
Annex E (informative) - Change request history
History