CODES

ETSI algorithms & codes service assigns and manages codes for various technologies used in the communications industry to convey information about systems and equipment.

  • Cost: €150 per code (VAT excluded, administrative fees included).
  • Requirement: Customers must sign a contract and meet specified approval conditions.

 

ETSI’s Centre for Testing and Interoperability (CTI) assigns and registers codes for ETSI Technical Committees without requiring a contract or payment.

 

ALGORITHMS

 A security algorithm encrypts data using a mathematical procedure, encoding it so that a software key is required to decode it back into its original form. Encryption ensures effective and secure user authentication and is crucial for technology security.

ETSI as Custodian:

  • Distributes and licenses algorithms developed by ETSI or other organizations.
  • Manages specifications and confidential information.
  • Cost: €2,000 per algorithm (VAT excluded, administrative fees included).
  • Requirement: Customers must sign a contract and meet specified approval conditions.

Export Licence:

  • Required for countries outside the European Union (EU).
  • If the export authorization is not granted by the SBDU, ETSI will not refund the administrative fees incurred.

HOW TO ORDER AND PAY - Click here for more details

HOW TO ORDER AND PAY     -    Click here for more details
Both the payment and the completed, signed web form are required to obtain the code(s)/algorithm(s).

ORDER

1. First of all, CLICK on the PRODUCT you wish to order from this list:

NOTE: Customers must obtain a separate IPR Licence Agreement from DACAS China. In case of difficulties to register online for the free IPR licence for EEA3 & EIA3 algorithms, the temporary procedure to obtain the free IPR licence is for the Beneficiary (customer) to provide to DACAS a copy of their countersigned ETSI CRUU (Confidential Usage Undertaking form). Contact point is: Mrs Xiang Lu - zhuanlixuke@is.ac.cn.

2. From the drop down list (if any), SELECT the product you wish to order and the quantity (if relevant).

3. FILL IN all required details in the web form (company’s name, address, etc.). When moving the cursor over the fields, additional information is provided to help better understand what specific information is needed/requested.
Please note that foreign and special characters are not allowed
. Kindly ensure all content adheres to the approved English language.

4. SIGN the electronic form.

5. SEND the form.

6. An email will be automatically sent from Adobe Sign to CONFIRM your email address. If you do not receive this email, please check your junk or spam folder.

7. When the e-mail address has been confirmed, the ETSI Secretariat will automatically receive your order.

IMPORTANT

  • Please note that completing the web form is essential to obtain the code or the algorithm, and is separate from the payment process. You will receive the contract only at the final stage, after it has been countersigned by an ETSI legal representative and the payment has been processed.

  • If you require an invoice with your PO number, please send us this information as soon as possible in order to speed up the process. For a faster service, we recommend a payment via ETSI WEBstore (secured platform). Once the payment is received, the "web form" will be digitally countersigned by a duly authorized ETSI representative. You will then receive an e-mail from “Adobe Sign” with the contract (web form) containing the code(s) on the final page and the algorithms send via a secure platform.

PAYMENT

The administrative charge is 150€ for each code ordered and 2000€ for each algorithm ordered. Payment can be done with the following methods:

✓ by credit card: accepted through the designated payment service when the request is made online via the ETSI WEBstore;

✓ by wire transfer: to the bank account as designated in ETSI's invoice within thirty (30) days after issuing of the said invoice by ETSI.

Please contact us (algorithms@etsi.org) to obtain the proforma invoice.

Further details to place your order are available on PDF and detailed instructions on completing the web form and making the payment are available by watching this video.

For payment instructions only, watch this video, or access our online payment platform.

Codes [non-public - public]

Codes [non-public - public]
  • Non-public and public codes

    • Non-public codes
    • Here are some characteristics and contexts where non-public codes might be used:

      • Encryption: Encrypting and decrypting data to ensure only authorized access.
      • Authentication: Verifying the identity of users or devices.
      • Access Control: Granting or restricting access to resources or systems.
      • Fraud Prevention: Detecting and preventing fraudulent activities in financial transactions and networks.
      • Data Privacy: Ensuring the privacy and integrity of user data in telecommunications and online services.

      Non-public codes are crucial for maintaining the security and integrity of sensitive information and systems.

      Information related to these codes can be found in the following specifications:

      • Public codes
      • The list of public codes already assigned can be consulted here.

        Information related to these codes can be found in the following specifications:

        For further information, please contact Algorithms & codes service.

    Protocol Naming and Numbering Service

    Protocol Naming and Numbering Service

    ETSI’s Centre for Testing and Interoperability (CTI) assigns and registers ASN.1 object identifiers, protocol numbers, XML and URI namespaces, etc. for all ETSI Technical Bodies (TBs). ETSI CTI also allocates CNI codes for the broadcast industry.

    Many protocols require the allocation of globally unique names or numbers in order to interoperate successfully. Ranges of names or numbers are often allocated to standards bodies in order to distribute the task of allocation, while still maintaining global uniqueness. 

    In addition, ETSI CTI can manage, on behalf of an ETSI TB, a request for a protocol name or number allocation from another issuing authority. For example, allocations of Network Management Parameters or allocations for Diameter, XCAP, H.248 protocols can be managed.

    All details related to these codes can be found on the Protocol Naming and Numbering page on the ETSI Portal.

    To request one of these codes, please contact CTI_Support@etsi.org

    TETRA algorithms

    TETRA algorithms
    The TEA1 / TEA3 / TEA4 / TEA6 / TEA7 / TAA1 and TAA2 algorithms are distributed by ETSI.

    Please note that ETSI is NOT the Custodian for the TEA2 and TEA5 algorithms.

    For further details, please contact TCCA at SFPG@TCCA.info.

    Information related to TETRATM  algorithms can be found in the following specifications:

  • TEA1: ETSI TS 101 053-1.
  • TEA2: ETSI TS 101 053-2.
  • TEA3: ETSI TS 101 053-3.
  • TEA4: ETSI TS 101 053-4.
  • TEA5: ETSI TS 101 053-5.
  • TEA6: ETSI TS 101 053-6.
  • TEA7: ETSI TS 101 053-7.
  • TAA1: ETSI TS 101 052-1.
  • TAA2: ETSI TS 101 052-2.
    • 3GPP cellular algorithms

      The UEA1 & UIA1 / UEA2 & UIA2 / EEA3 & EIA3 are UMTSTM  and LTETM  algorithms distributed by ETSI.

      ETSI is NOT the Custodian of EEA2 & EIA2 algorithms. Please consult the Advanced Encryption Standard (AES) NIST FIPS 197 for further details.

      • The UEA1 & UIA1 algorithm specifications may be used only for the development and operation of 3GPP mobile communications and services.

      • The UEA2 & UIA2 algorithm specifications may be used only for the development and operation of equipment conforming to the UEA2 and UIA2 algorithm or standards based on it.
      The 128-EEA1 & 128-EIA1 algorithms (not distributed by ETSI) are identical to the UMTSTM algorithms UEA2 & UIA2 (distributed by ETSI) with a defined mapping of LTE parameters onto UMTSTM parameters. Development and operation of LTE equipment including 128-EEA1 or 128-EIA1 is considered to be an instance of "development and operation of equipment conforming to the UEA2 & UIA2 algorithm or standards based on it". 128-EEA1 and 128-EIA1 for LTE are considered to be an instance of using "UEA2 & UIA2 algorithm services".

      Information about the 128-EEA1 & 128-EIA1 specifications is also available in the Design and evaluation report (3GPP TR 35.924).

      • The EEA3 & EIA3 algorithm specifications may be used only for the development and operation of equipment conforming to the EEA3 and EIA3 algorithms or standards based on it. DACAS China holds essential patents on the ZUC algorithm, the stream cipher that forms the heart of 128-EEA3 and 128-EIA3.
      Customers must obtain a separate IPR Licence Agreement from DACAS China. In case of difficulties to register online for the free IPR licence for EEA3-EIA3 algorithms, the temporary procedure to obtain the free IPR licence is for the Beneficiary (customer) to provide to DACAS a copy of their countersigned ETSI CRUU (Confidential Usage Undertaking form). Contact point is: Mr Xiang Lu - zhuanlixuke@is.ac.cn.

      Information related to UMTSTM  and LTETM  algorithms can be found in the following specifications:

      UEA1 & UIA1:

      UEA2 & UIA2:

      EEA3 & EIA3:

      MILENAGE

      MILENAGE is an algorithm set for the UMTS, LTE and 5G authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

      This specification has been prepared by the 3GPP Task Force, and contains an example set of algorithms for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

      TUAK

      A more recently developed second algorithm set for UMTS, LTE and 5G authentication and key generation, based on the public KECCAK hash function family (which will also serve as the SHA-3 hash function standard). This specification contains a second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

      Old generation algorithms

      The following algorithms have been removed from the ETSI website; for enquiries about these algorithms please the algorithms and codes service.

      • The DSAA (DECTTM Standard Authentication algorithm)
      • The DSC (DECTTM standard cipher)
      • TESA-7 (TE9 authentication algorithm)
      • USA-4 (UPT authentication algorithm)
      • HIPERLAN (High PERformance Local Area Network)
      • GSM-CTS (Cordial)
      • A5-GMR1 (Encryption Algorithm)

      DVB CSA licences

      The DVB CSA Descrambling Technology is licensed to manufacturers of decoders and their components, and to providers, designers and other entities engaged in conditional access.

      The DVB CSA Scrambling Technology is licensed to manufacturers of scramblers, who will in turn sub-license to the purchasers of scramblers.

      To license DVB algorithms please contact:

      SISVEL - DVB CSA team dvbcsa@sisvel.com

      SISVEL SpA
      Via Sestriere, 100-10060 None Torinese (TO)
      Italy