extra_toc

Confidentiality & integrity algorithms for GSM and GPRS

The A5/4 and A5/3 encryption algorithms for GSM™ and EDGE, the GEA5, GEA4GEA3 and GEA2 encryption algorithms for the General Packet Radio Service (GPRS), and the GIA5 and GIA4 integrity algorithms for GPRS may be used only for the development and operation of GSM, EDGE and GPRS mobile communications and services.

The A5/4 and A5/3 and GEA4 and GEA3 algorithms are based on the Third Generation Partnership Project (3GPP™) ciphering algorithm, UEA1, for which the Mitsubishi Electric Corporation holds essential patents. For the purposes of implementing these algorithms, Mitsubishi has agreed to grant licences on a royalty free basis.

Beneficiaries must obtain an IPR licence agreement from the Mitsubishi Electric Corporation Japan.

Download the specifications

Confidentiality & integrity algorithms for UMTS and LTE

UEA2 & UIA2, UEA1 & UIA1, EEA3 & EIA3, EEA1 & EIA1

Usage and licences

  • The UEA2 and UIA2 algorithm specifications may be used only for the development and operation of equipment conforming to the UEA2 and UIA2 algorithm or standards based on it.
  • The UEA1 and UIA1 algorithm specifications may be used only for the development and operation of 3GPP mobile communications and services. Mitsubishi Electric Corporation holds essential patents on the algorithms. The Beneficiary must also obtain a separate IPR Licence Agreement from Mitsubishi Electric Corporation Japan.
  • The EEA3 and EIA3 algorithm specifications may be used only for the development and operation of equipment conforming to the EEA3 and EIA3 algorithm or standards based on it. DACAS China holds essential patents on the ZUC algorithm, the stream cipher that forms the heart of 128-EEA3 and 128-EIA3. The Beneficiary must therefore also obtain a separate IPR Licence Agreement from DACAS China.
    In case of difficulties to register online for the free IPR licence for EEA3-EIA3 algorithms, the temporary procedure in order to obtain the free IPR licence is for the Beneficiary (client) to provide to DACAS a copy of their countersigned Restricted Usage Undertaking form. Contact point is:  Ms.Limin LIU -  [email protected]
  • The 128-EEA1 and 128-EIA1 algorithms are identical to the UMTS algorithms UEA2 and UIA2 with a defined mapping of LTE parameters onto UMTS parameters. Development and operation of LTE equipment including 128-EEA1 or 128-EIA1 is considered to be an instance of ‘development and operation of equipment conforming to the UEA2 & UIA2 algorithm or standards based on it’. 128-EEA1 and 128-EIA1 for LTE are considered to be an instance of using ‘UEA2 and UIA2 algorithm services’.

Download the specifications

The UEA2 and UIA2 specifications can be downloaded below:

The UEA1 and UIA1 specifications can be downloaded below:

The EEA3 and EIA3 specifications can be downloaded below:

ETSI is not the custodian of EEA2 and EIA2 algorithms. For further details please consult pdfthis document from NIST referring to Advanced Encryption Standard (AES).

Information about the 128-EEA1 and 128-EIA1 specifications is also available in the Design and evaluation report (3GPP TR 35.924).

Every Beneficiary intending to implement and/or use the algorithms must sign a Confidentiality Usage Undertaking with a Custodian and demonstrate that he/she fulfils the approval criteria specified in that undertaking.

Please note that, for all countries outside the European Union (EU), the ETSI Secretariat will have to obtain an export licence from the French Authorities.

Licensing procedure within ETSI to obtain an algorithm

  1. OPEN the Confidentiality and Restricted Usage Undertaking form you wish to order:
  2. FILL IN your details in the "Confidentiality and Restricted Usage Undertaking" form.
    Important:  If the email address is not a professional one, the request will not be considered as a valid request and it will be impossible to finalize the order.

  3.  SIGN the electronic "Confidentiality and Restricted Usage Undertaking" form.

  4. You will receive an email, asking you to confirm your email address.
    NOTE: mails are sent by Adobe Sign/ETSI ([email protected] or [email protected]). If these emails are not received, please check the junk/spam folder of the server or Email address mailbox.

  5. When confirmed, you will receive a confirmation that the email address has been verified.
    NOTE: his will automatically send the request to you and to the ETSI Secretariat.

IMPORTANT: Requesting and algorithm via our online Confidentiality an Restricted Usage Undertaking form generates a unique entry in our database. Please beware that filling in the Confidentiality and Restricted Usage Undertaking" form is an indispensable process in order to obtain the Algorithm and is independent from the payment.

HOW TO PAY

The administrative charge is €2 000 for each algorithm ordered (VAT excluded).

Payment may be made by the following methods:

  • by credit card accepted by our payment service (i.e. American Express, Visa, Master Card, and CB) when the request is made online via the ETSI WEBstore (please see IMPORTANT note under "Licensing procedure within ETSI" above);
  • by wire transfer to the bank account as designated in ETSI's invoice within thirty (30) days after issuing of the said invoice by ETSI.

After payment reception, the "Confidentiality of and restricted usage undertaking" countersigned by the ETSI Director-General will be sent electronically to you with the algorithm.

For a faster service, we recommend a payment via ETSI WEBstore.

For further information, please contact us at [email protected].

Authentication & key generation algorithms

MILENAGE

MILENAGE is an algorithm set for the UMTS authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.

Download the algorithm specification (3GPP TS 35.206).

TUAK

A more recently developed second algorithm set for UMTS authentication and key generation, based on the public KECCAK hash function family (which will also serve as the SHA-3 hash function standard).

Download the algorithm specification (3GPP TS 35.231).

For further information, please contact us.