TR 101 053-2-2012
Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.2.4)

Standard No.
TR 101 053-2-2012
Release Date
2012
Published By
ETSI - European Telecommunications Standards Institute
Latest
TR 101 053-2-2012
Scope
The purpose of the present document is to specify the rules for the management of the TETRA standard encryption algorithm TEA2. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA2 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specifications. The parts 1 and 2 are confidential. Part 3 of each of the specifications is not confidential and can be obtained directly from the TEA2 Custodian. There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA2 (ETSI@ ETSI Technical Committee TETRA@ TEA2 Custodian and approved recipients) together with the relationships and interactions between them. Clause 5 is concerned with the rules for the use of TEA2. This clause is supplemented by clause E in which the states and territories are listed in which a User can become an approved recipient. The procedures for delivering TEA2 to approved recipients are defined in clause 6. This clause is supplemented by clause A that specifies the items that are to be delivered. Clause 7 is concerned with the criteria for approving an organization for receipt of TEA2 deliverables and with the responsibilities of an approved recipient. This clause is supplemented by annexes B@ C@ CA and D which contain a Confidentiality and Restricted Usage Undertaking to be signed by each approved recipient Manufacturer@ User and Third Party Supplier. Clause 8 is concerned with the appointment and responsibilities of the TEA2 Custodian.

TR 101 053-2-2012 history

  • 2012 TR 101 053-2-2012 Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.2.4)
  • 2010 TR 101 053-2-2010 Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.2.3)
  • 2008 TR 101 053-2-2008 Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.2.2)
  • 2005 TR 101 053-2-2005 Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.2.1)
  • 2003 TR 101 053-2-2003 Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2 (V2.1.1)
  • 1998 TR 101 053-2-1998 Security Algorithms Group of Experts (SAGE); Rules for the Management of the TETRA Standard Encryption Algorithms; Part 2: TEA2 (V1.1.2)
  • 1997 TR 101 053-2-1997 Security Algorithms Group of Experts (SAGE); Rules for the Management of the TETRA Standard Encryption Algoithms Part 2: TEA2 (V1.1.1)



Copyright ©2024 All Rights Reserved