Using cellular algorithms

Confidentiality and integrity algorithms for GSM and GPRS

The A5/4 and A5/3 encryption algorithms for GSM™ and EDGE, the GEA5, GEA4GEA3 and GEA2 encryption algorithms for the General Packet Radio Service (GPRS), and the GIA5 and GIA4 integrity algorithms for GPRS may be used only for the development and operation of GSM, EDGE and GPRS mobile communications and services.

Every Beneficiary intending to implement and/or use the algorithms must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he/she fulfils the approval criteria specified in that undertaking.

The A5/4 and A5/3 and GEA4 and GEA3 algorithms are based on the Third Generation Partnership Project (3GPP™) ciphering algorithm, UEA1, for which the Mitsubishi Electric Corporation holds essential patents. For the purposes of implementing these algorithms, Mitsubishi has agreed to grant licences on a royalty free basis. Beneficiaries must obtain an IPR licence agreement from the Mitsubishi Electric Corporation Japan.

Licensing procedure within ETSI

Every Beneficiary must send to the ETSI Secretariat, addressed to "ETSI Algorithms & Codes", two signed paper copies of:

  • the GEA5 and GIA5 Restricted Usage Undertaking (will be added shortly)

or

  • the GIA4 Restricted Usage Undertaking (will be added shortly)

or

or

or

You will need to pay an administrative charge of €2000 excluding V.A.T. for each undertaking. Please refer to the relevant conditions for obtaining the algorithms, which include details of how to pay:

  • GEA5 and GIA5 (will be added shortly)
  • GIA4 (will be added shortly)
  • pdfA5/4
  • pdfA5/3
  • pdfGEA2

When we receive your payment we will send you by express mail one copy of the Restricted User Undertaking signed by ETSI, along with the algorithms. Please note that, for all countries outside the EU, we will have to obtain an export licence from the French Authorities.

Download the specifications

Confidentiality and integrity algorithms for UMTS and LTE – UEA2 & UIA2, UEA1 & UIA1, EEA3 & EIA3, EEA1 & EIA1

Usage and licences

  • The UEA2 and UIA2 algorithm specifications may be used only for the development and operation of equipment conforming to the UEA2 and UIA2 algorithm or standards based on it.
  • The UEA1 and UIA1 algorithm specifications may be used only for the development and operation of 3GPP mobile communications and services. Mitsubishi Electric Corporation holds essential patents on the algorithms. The Beneficiary must also obtain a separate IPR Licence Agreement from Mitsubishi Electric Corporation Japan.
  • The EEA3 and EIA3 algorithm specifications may be used only for the development and operation of equipment conforming to the EEA3 and EIA3 algorithm or standards based on it. DACAS China holds essential patents on the ZUC algorithm, the stream cipher that forms the heart of 128-EEA3 and 128-EIA3. The Beneficiary must therefore also obtain a separate IPR Licence Agreement from DACAS China.
  • The 128-EEA1 and 128-EIA1 algorithms are identical to the UMTS algorithms UEA2 and UIA2 with a defined mapping of LTE parameters onto UMTS parameters. Development and operation of LTE equipment including 128-EEA1 or 128-EIA1 is considered to be an instance of ‘development and operation of equipment conforming to the UEA2 & UIA2 algorithm or standards based on it’. 128-EEA1 and 128-EIA1 for LTE are considered to be an instance of using ‘UEA2 and UIA2 algorithm services’.

Every Beneficiary intending to implement and/or use the UEA2 & UIA2, UEA1 & UIA1, EEA3 & EIA3 or EEA1 & EIA1 algorithms must sign a Restricted Usage Undertaking with a Custodian and demonstrate that he/she satisfies the approval criteria specified.

Licensing procedure within ETSI

Every Beneficiary must send to the ETSI Secretariat, addressed to "ETSI Algorithms & Codes", two signed paper copies, as appropriate, of:

or

or

You will need to pay an administrative charge of €2000 excluding V.A.T. for UEA2/UIA2, EEA3/EIA3 or EEA1 & EIA1, or €1000 excluding V.A.T. for UEA1/UIA1. Please refer to the relevant conditions for obtaining the algorithms, which include details of how to pay:

When we receive your payment we will send you by express mail one copy of the Restricted User Undertaking signed by ETSI.

Download the specifications

The UEA2 & UIA2 specifications can be downloaded below or from the GSM Association website:

The UEA1 & UIA1 specifications can be downloaded below or from the 3GPP website:

The EEA3 and EIA3 specifications can be downloaded below or from the GSM Association website:

Information about the 128-EEA1 and 128-EIA1 specifications is also available in the Design and evaluation report (3GPP TR 35.924).

Authentication and key generation algorithms

MILENAGE

MILENAGE is an algorithm set for the UMTS authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

Download the algorithm specification (3GPP TS 35.206).

TUAK

A more recently developed second algorithm set for UMTS authentication and key generation, based on the public KECCAK hash function family (which will also serve as the SHA-3 hash function standard).

Download the algorithm specification (3GPP TS 35.231).

For further information, please contact us.