Security algorithms

Introduction

An encryption algorithm is a mathematical procedure used to encrypt data. Through the use of an algorithm and a key, information is encoded into cipher text and requires the use of a 'key' to transform the data back into its original form.

Algorithms are an essential part of a technology to ensure effective and secure authentication, as well as to provide integrity and encryption. ETSI creates cryptographic algorithms and protocols specific to fraud prevention, unauthorized access to public and private telecommunications networks and user data privacy.

ETSI is custodian of these algorithms, as well as algorithms produced by other organizations. We are also custodians of other codes and test suites.

Our Role & Activities

ETSI Security Algorithms Group of Experts (SAGE) provides standards makers with cryptographic algorithms and protocols specific to fraud prevention, unauthorized access to public and private telecommunications networks and user data privacy.

The group's output includes algorithms for audiovisual services, 3GPPTM, DECTTM, GSMTM, TETRA, GPRS and Universal Personal Telecommunications (UPT). Where appropriate, the group collaborates with other ETSI committees and with other organizations in order to ensure that the algorithms produced fully meet the needs of the technologies and services in which they are used.

Mobile communications

For example, working with the 3GPP Organizational Partners, SAGE has produced the A5/3 encryption algorithms for GSM and EDGE (Enhanced Data rates for GSM Evolution), and the GEA3 algorithm for the General Packet Radio Service, GPRS.

SAGE is also responsible for the specification of the Milenage algorithm set, an example algorithm set for the 3GPP authentication and key generation functions.

SAGE has also developed security algorithms for the UMTS radio interface (UTRA) in collaboration with the 3GPP™ Organizational Partners.

Whilst the algorithms are considered to be extremely robust, there is always a need to have alternative solutions ready should a breach of security ever occur. For this reason, SAGE has produced an alternative set of security algorithms for UTRA and keeps working on new algorithms to anticipate future security needs.

ETSI's custodian role

Implementation of the various algorithms is generally subject to a license which restricts their utilization to the telecommunications equipment or service for which they have been designed.

ETSI acts as a custodian for the algorithms developed by SAGE, as well as other codes and algorithms, and is responsible for the distribution and licensing of confidential information and documents.

Standards

The following is a list of the 20 latest published ETSI standards on algorithms.

A full list of related standards in the public domain is accessible via the ETSI standards search. Via this interface you can also subscribe for alerts on updates of ETSI standards.

For work in progress see the ETSI Work Programme on the Portal.

Standard No. Standard title.
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 12.9.0 Release 12)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 13.4.0 Release 13)
TS 155 241 Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); GIA4 specification (3GPP TS 55.241 version 13.0.0 Release 13)
TS 155 251 Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); GEA5 and GIA5 algorithm specification (3GPP TS 55.251 version 13.0.0 Release 13)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 12.8.0 Release 12)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 13.3.0 Release 13)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 12.7.0 Release 12)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 13.2.0 Release 13)
GR QSC 001 Quantum-Safe Cryptography (QSC); Quantum-safe algorithmic framework
EG 203 310 CYBER; Quantum Computing Impact on security of ICT Systems; Recommendations on Business Continuity and Algorithm Selection
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 12.6.0 Release 12)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 13.1.0 Release 13)
TS 123 042 Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Compression algorithm for text messaging services (3GPP TS 23.042 version 13.0.0 Release 13)
TS 101 052 Rules for the management of the TETRA standard authentication and key management algorithm set TAA1
TS 101 053-1 Rules for the management of the TETRA standard encryption algorithms; Part 1: TEA1
TS 101 053-3 Rules for the management of the TETRA standard encryption algorithms; Part 3: TEA3
TS 101 053-4 Rules for the management of the TETRA standard encryption algorithms; Part 4: TEA4
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 13.0.0 Release 13)
TS 126 445 Universal Mobile Telecommunications System (UMTS); LTE; Codec for Enhanced Voice Services (EVS); Detailed algorithmic description (3GPP TS 26.445 version 12.5.0 Release 12)
TR 135 909 Universal Mobile Telecommunications System (UMTS); LTE; 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation (3GPP TR 35.909 version 13.0.0 Release 13)