1.
|
Clear description of the referenced document:
|
|
|
2.
|
Status of approval:
|
|
Approved by ETSI.
|
3.
|
Justification for the specific reference:
|
|
This ETSI standard defines the Secure channel between a UICC and an end-point terminal that are used in this Recommendation.
|
4.
|
Current information, if any, about IPR issues:
|
|
Some information may be available in the ETSI IPR archives at (http://webapp.etsi.org/IPR/home.asp).
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
None
|
6.
|
The degree of stability or maturity of the document:
|
|
Approved by ETSI.
|
7.
|
Relationship with other existing or emerging documents:
|
|
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
[1] ETSI TS 102 221: "Smart Cards; UICC-Terminal interface; Physical and logical characteristics"./
[2] IETF RFC 4346 (2006): "The Transport Layer Security (TLS) Protocol Version 1.1"./
[3] IETF RFC 4366 (2003): "Transport Layer Security (TLS) Extensions"./
[4] IETF RFC 4279 (2005): "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)"./
[5] Void./
[6] Void./
[7] ETSI TS 133 110: "Universal Mobile Telecommunications System (UMTS); Key establishment between a UICC and a terminal (3GPP TS 33.110)"./
[8] ETSI TS 102 412: "Smart Cards; Smart Card Platform Requirements Stage 1"./
[9] ETSI TS 102 223: "Smart Cards; Card Application Toolkit (CAT)"./
[10] ETSI TS 124 008: "Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (3GPP TS 24.008)"./
[11] IETF RFC 4634 (2006): US Secure Hash Algorithms (SHA and HMAC-SHA)./
[12] IETF RFC 2104 (1997): "HMAC: Keyed-Hashing for Message Authentication"./
[13] FIPS PUB 180-2: "Secure Hash Standard (SHS)"./
[14] ETSI TS 102 225 (V7.3.0): "Smart Cards; Secured packet structure for UICC based applications (Release 7)"./
[15] ETSI TS 102 600: "Smart Cards; UICC-Terminal interface; Characteristics of the USB interface"./
[16] ISO/IEC 9797-1: "Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher"./
[17] Void./
[18] IETF RFC 3268 (2002): "Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)"./
[19] IETF RFC 4306 (2005): "Internet Key Exchange (IKEv2) Protocol"./
[20] IETF RFC 4301 (2005): "Security Architecture for the Internet Protocol"./
[21] IETF RFC 4307 (2005): "Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)"./
[22] IETF RFC 4302 (2005): "IP Authentication Header"./
[23] IETF RFC 4303 (2005): "IP Encapsulating Security Payload (ESP)"./
[24] ETSI TS 102 483: "Smart cards; UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal"./
|
9.
|
Qualification of
ETSI:
|
|
ETSI is recognized under the provisions of ITU-T Recommendations A.5 and A.6. Qualifying information is on file at TSB.
|
10.
|
Other (for any supplementary information):
|
|
None.
|