![](https://csdnimg.cn/release/download_crawler_static/5581001/bg5.jpg)
ETSI
ETSI TS 133 102 V10.0.0 (2011
3GPP TS 33.102 version 10.0.0 Release 10
6.4.2 Ciphering and integrity mode negotiation .................................................................................................. 28
6.4.3 Cipher key and integrity key lifetime ......................................................................................................... 29
6.4.4 Cipher key and integrity key identification ................................................................................................. 29
6.4.5 Security mode set-up procedure .................................................................................................................. 30
6.4.6 Signalling procedures in the case of an unsuccessful integrity check ......................................................... 33
6.4.7 Signalling procedure for periodic local authentication ............................................................................... 33
6.4.8 Initialisation of synchronisation for ciphering and integrity protection ...................................................... 33
6.4.9 Emergency call handling ............................................................................................................................ 34
6.4.9.1 Security procedures applied .................................................................................................................. 34
6.4.9.2 Security procedures not applied ............................................................................................................ 34
6.5 Access link data integrity ................................................................................................................................. 35
6.5.1 General ........................................................................................................................................................ 35
6.5.2 Layer of integrity protection ....................................................................................................................... 35
6.5.3 Data integrity protection method ................................................................................................................ 35
6.5.4 Input parameters to the integrity algorithm ................................................................................................. 36
6.5.4.1 COUNT-I .............................................................................................................................................. 36
6.5.4.2 IK .......................................................................................................................................................... 36
6.5.4.3 FRESH .................................................................................................................................................. 37
6.5.4.4 DIRECTION ......................................................................................................................................... 37
6.5.4.5 MESSAGE ............................................................................................................................................ 37
6.5.5 Integrity key selection ................................................................................................................................. 37
6.5.6 UIA identification ....................................................................................................................................... 37
6.6 Access link data confidentiality ........................................................................................................................ 38
6.6.1 General ........................................................................................................................................................ 38
6.6.2 Layer of ciphering ....................................................................................................................................... 38
6.6.3 Ciphering method ....................................................................................................................................... 38
6.6.4 Input parameters to the cipher algorithm .................................................................................................... 39
6.6.4.1 COUNT-C ............................................................................................................................................. 39
6.6.4.2 CK ......................................................................................................................................................... 40
6.6.4.3 BEARER ............................................................................................................................................... 41
6.6.4.4 DIRECTION ......................................................................................................................................... 41
6.6.4.5 LENGTH ............................................................................................................................................... 41
6.6.5 Cipher key selection.................................................................................................................................... 41
6.6.6 UEA identification ...................................................................................................................................... 41
6.7 Void .................................................................................................................................................................. 42
6.8 Interoperation and handover between UMTS and GSM .................................................................................. 42
6.8.1 Authentication and key agreement of UMTS subscribers .......................................................................... 42
6.8.1.1 General .................................................................................................................................................. 42
6.8.1.2 R99+ HLR/AuC .................................................................................................................................... 43
6.8.1.3 R99+ VLR/SGSN ................................................................................................................................. 44
6.8.1.4 R99+ ME ............................................................................................................................................... 45
6.8.1.5 USIM ..................................................................................................................................................... 45
6.8.2 Authentication and key agreement for GSM subscribers............................................................................ 46
6.8.2.1 General .................................................................................................................................................. 46
6.8.2.2 R99+ HLR/AuC .................................................................................................................................... 47
6.8.2.3 VLR/SGSN ........................................................................................................................................... 47
6.8.2.4 R99+ ME ............................................................................................................................................... 47
6.8.3 Distribution and use of authentication data between VLRs/SGSNs ........................................................... 47
6.8.4 Intersystem handover for CS Services – from UTRAN to GSM BSS ........................................................ 48
6.8.4.1 UMTS security context ......................................................................................................................... 49
6.8.4.2 GSM security context ............................................................................................................................ 49
6.8.5 Intersystem handover for CS Services – from GSM BSS to UTRAN ........................................................ 50
6.8.5.1 UMTS security context ......................................................................................................................... 50
6.8.5.2 GSM security context ............................................................................................................................ 50
6.8.6 Intersystem change for PS Services – from UTRAN to GSM BSS ............................................................ 51
6.8.6.1 UMTS security context ......................................................................................................................... 51
6.8.6.2 GSM security context ............................................................................................................................ 51
6.8.7 Intersystem change for PS services – from GSM BSS to UTRAN............................................................. 51
6.8.7.1 UMTS security context ......................................................................................................................... 51
6.8.7.2 GSM security context ............................................................................................................................ 52
6.8.8 PS handover from Iu to Gb mode ............................................................................................................... 52
6.8.8.1 UMTS security context ......................................................................................................................... 52