ETSI algorithms

The following is a list of algorithms developed and administered by ETSI. They may be used subject to certain conditions. Each algorithm in the list includes a link to a confidentiality and restricted usage undertaking. This outlines the conditions under which a license will be granted to use the algorithm.

Name of Algorithm Extra Information Price/
request
  TETRA - The rules for the management of the encryption algorithms are given below:   
docTEA1 
TS 101 053-1 1,000
TEA2 (see note)  TS 101 053-2
Note: The Custodian for the TEA2 algorithm is the TCCA SFPG@TandCCA.com & not ETSI.  
 
docTEA3 TS 101 053-3 1,000
docTEA4 TS 101 053-4 1,000
docTAA1 TS 101 052 1,000

 

The following older algorithms have been removed from the ETSI site; for enquiries about these algorithms please contact us.

  • The DSAA (DECTTM Standard Authentication algorithm)
  • The DSC (DECTTM standard cipher)
  • TESA-7 (TE9 authentication algorithm)
  • USA-4 (UPT authentication algorithm)
  • HIPERLAN (High PERformance Local Area Network)
  • GSM-CTS (Cordial)
  • A5-GMR1 (Encryption Algorithm)