ITU's 160 anniversary

Committed to connecting the world

  •  
Girls in ICT day 2025

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : Y.oneM2M.SEC.SOL     
  ITU-T A.5 justification information for referenced document ETSI TS 102 484 V7.0.0 (2007-12) in draft Y.oneM2M.SEC.SOL
1. Clear description of the referenced document:
Name: ETSI TS 102 484 V7.0.0 (2007-12)
Title: Smart Cards; Secure channel between a UICC and an end-point terminal (Release 7)
2. Status of approval:
Approved by ETSI.
3. Justification for the specific reference:
This ETSI standard defines the Secure channel between a UICC and an end-point terminal that are used in this Recommendation.
4. Current information, if any, about IPR issues:
Some information may be available in the ETSI IPR archives at (http://webapp.etsi.org/IPR/home.asp).
5. Other useful information describing the "Quality" of the document:
None
6. The degree of stability or maturity of the document:
Approved by ETSI.
7. Relationship with other existing or emerging documents:
8. Any explicit references within that referenced document should also be listed:
[1] ETSI TS 102 221: "Smart Cards; UICC-Terminal interface; Physical and logical characteristics"./
[2] IETF RFC 4346 (2006): "The Transport Layer Security (TLS) Protocol Version 1.1"./
[3] IETF RFC 4366 (2003): "Transport Layer Security (TLS) Extensions"./
[4] IETF RFC 4279 (2005): "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)"./
[5] Void./
[6] Void./
[7] ETSI TS 133 110: "Universal Mobile Telecommunications System (UMTS); Key establishment between a UICC and a terminal (3GPP TS 33.110)"./
[8] ETSI TS 102 412: "Smart Cards; Smart Card Platform Requirements Stage 1"./
[9] ETSI TS 102 223: "Smart Cards; Card Application Toolkit (CAT)"./
[10] ETSI TS 124 008: "Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (3GPP TS 24.008)"./
[11] IETF RFC 4634 (2006): US Secure Hash Algorithms (SHA and HMAC-SHA)./
[12] IETF RFC 2104 (1997): "HMAC: Keyed-Hashing for Message Authentication"./
[13] FIPS PUB 180-2: "Secure Hash Standard (SHS)"./
[14] ETSI TS 102 225 (V7.3.0): "Smart Cards; Secured packet structure for UICC based applications (Release 7)"./
[15] ETSI TS 102 600: "Smart Cards; UICC-Terminal interface; Characteristics of the USB interface"./
[16] ISO/IEC 9797-1: "Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher"./
[17] Void./
[18] IETF RFC 3268 (2002): "Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)"./
[19] IETF RFC 4306 (2005): "Internet Key Exchange (IKEv2) Protocol"./
[20] IETF RFC 4301 (2005): "Security Architecture for the Internet Protocol"./
[21] IETF RFC 4307 (2005): "Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)"./
[22] IETF RFC 4302 (2005): "IP Authentication Header"./
[23] IETF RFC 4303 (2005): "IP Encapsulating Security Payload (ESP)"./
[24] ETSI TS 102 483: "Smart cards; UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal"./
9. Qualification of ETSI:
ETSI is recognized under the provisions of ITU-T Recommendations A.5 and A.6. Qualifying information is on file at TSB.
10. Other (for any supplementary information):
None.
Note: This form is based on Recommendation ITU-T A.5