Progetto Selex Tetratac Siria

Page 421

166

ETSI EN 300 392-7 V2.3.1 (2006-06)

TB2: shall be used to compute K from UAK. The algorithm shall have the following properties: •

Input:

Bit string of length |UAK|;

Output:

Bit string of length |K|.

The algorithm should be designed such that the Output is dependent on every bit of the Input. TB3: shall be used to compute K from UAK and AC. The algorithm shall have the following properties: •

Input 1:

Bit string of length |AC|;

Input 2:

Bit string of length |UAK|;

Output:

Bit string of length |K|.

The algorithm should be designed such that the Output is dependent on every bit of both Inputs. TB4: shall be used to compute DCK from DCK1 and DCK2. The algorithm shall have the following properties: •

Input 1:

Bit string of length |DCK1|;

Input 2:

Bit string of length |DCK2|;

Output:

Bit string of length |DCK|.

The algorithm should be designed such that the Output is dependent on every bit of both Inputs. TB5: shall be used to compute ECK from CK, CC, CN (see EN 300 392-2 [2], clause 21.5) and LA. The algorithm shall have the following properties: •

Input 1:

Bit string of length |CK|;

Input 2:

Bit string of length |LA|;

Input 3:

Bit string of length |CN|;

Input 4:

Bit string of length |CC|;

Output:

Bit string of length |ECK|.

The algorithm should be designed such that the Output is dependent on every bit of all Inputs. TB6: Reserved for DMO Security (EN 300 396-6 [6]). TB7: shall be used to compute EGSKO from GSKO. The algorithm shall have the following properties: •

Input:

Bit string of length |GSKO|;

Output:

Bit string of length |EGSKO|.

The algorithm should be designed such that the Output is dependent on every bit of the Input.

ETSI


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.