Using cellular algorithms

Encryption algorithms

The A5/4 and A5/3 encryption algorithms for GSM™ and EDGE and the GEA4GEA3 and GEA2 encryption algorithms for the General Packet Radio Service (GPRS) may be used only for the development and operation of GSM, EDGE and GPRS mobile communications and services.

Every Beneficiary intending to implement and/or use the algorithms must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he/she fulfils the approval criteria specified in that undertaking.

The A5/4 and A5/3 and GEA4 and GEA3 algorithms are based on the Third Generation Partnership Project (3GPP™) ciphering algorithm, F8, for which the Mitsubishi Electric Corporation holds essential patents. For the purposes of implementing these algorithms, Mitsubishi has agreed to grant licences on a royalty free basis. Beneficiaries must obtain an IPR licence agreement from the Mitsubishi Electric Corporation Japan.

Licensing procedure within ETSI

Every Beneficiary must send to the ETSI Secretariat, addressed to "ETSI Algorithms & Codes", two signed paper copies of:

or

or

You will need to pay an administrative charge of €2000 excluding V.A.T. for each undertaking. Please refer to the relevant conditions for obtaining the algorithms, which include details of how to pay:

When we receive your payment we will send you by express mail one copy of the Restricted User Undertaking signed by ETSI, along with the algorithms. Please note that, for all countries outside the EU, we will have to obtain an export licence from the French Authorities.

Download the specifications

Confidentiality and integrity algorithms – UEA2 & UIA2, UEA1 & UIA1, EEA3 & EIA3, EEA1 & EIA1

Usage and licences

  • The UEA2 and UIA2 algorithm specifications may be used only for the development and operation of equipment conforming to the UEA2 and UIA2 algorithm or standards based on it.
  • The UEA1 and UIA1 algorithm specifications may be used only for the development and operation of 3GPP mobile communications and services. Mitsubishi Electric Corporation holds essential patents on the algorithms. The Beneficiary must also obtain a separate IPR Licence Agreement from Mitsubishi Electric Corporation Japan.
  • The EEA3 and EIA3 algorithm specifications may be used only for the development and operation of equipment conforming to the EEA3 and EIA3 algorithm or standards based on it. DACAS China holds essential patents on the ZUC algorithm, the stream cipher that forms the heart of 128-EEA3 and 128-EIA3. The Beneficiary must therefore also obtain a separate IPR Licence Agreement from DACAS China.
  • The 128-EEA1 and 128-EIA1 algorithms are identical to the UMTS™ algorithms UEA2 and UIA2 with a defined mapping of LTE™ parameters onto UMTS parameters. Development and operation of LTE equipment including 128-EEA1 or 128-EIA1 is considered to be an instance of ‘development and operation of equipment conforming to the UEA2 & UIA2 algorithm or standards based on it’. 128-EEA1 and 128-EIA1 for LTE are considered to be an instance of using ‘UEA2 and UIA2 algorithm services’.

Every Beneficiary intending to implement and/or use the UEA2 & UIA2, UEA1 & UIA1, EEA3 & EIA3 or EEA1 & EIA1 algorithms must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he/she satisfies the approval criteria specified.

Licensing procedure within ETSI

Every Beneficiary must send to the ETSI Secretariat, addressed to "ETSI Algorithms & Codes", two signed paper copies, as appropriate, of:

or

or

You will need to pay an administrative charge of €2000 excluding V.A.T. for UEA2/UIA2, EEA3/EIA3 or EEA1 & EIA1, or €1000 excluding V.A.T. for UEA1/UIA1. Please refer to the relevant conditions for obtaining the algorithms, which include details of how to pay:

When we receive your payment we will send you by express mail one copy of the Restricted User Undertaking signed by ETSI.

Download the specifications

The UEA2 & UIA2 specifications can be downloaded below or from the GSM Association website:

The UEA1 & UIA1 specifications can be downloaded below or from the 3GPP website:

The EEA3 and EIA3 specifications can be downloaded below or from the GSM Association website:

Information about the 128-EEA1 and 128-EIA1 specifications is also available in the pdfDesign and evaluation report (3GPP TR 35.924).

Authentication and key generation algorithms

MILENAGE

MILENAGE is an algorithm set for the UMTS authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

Download the pdfalgorithm specification (3GPP TS 35.206).

TUAK

A more recently developed second algorithm set for UMTS authentication and key generation, based on the public KECCAK hash function family (which will also serve as the SHA-3 hash function standard).

Download the pdfalgorithm specification (3GPP TS 35.231).

For further information, please contact us.