Defines a security architecture for DECT, to specify the types of cryptographic algorithms required and the way in which they are to used, to specify the requirements for integrating the security features given by the architecture into DECT common interface, and to describe how the features may be managed and how they related to certain local network configurations and to certain DECT fixed systems.