166
ETSI EN 300 392-7 V2.3.1 (2006-06)
TB2: shall be used to compute K from UAK. The algorithm shall have the following properties: •
Input:
Bit string of length |UAK|;
•
Output:
Bit string of length |K|.
The algorithm should be designed such that the Output is dependent on every bit of the Input. TB3: shall be used to compute K from UAK and AC. The algorithm shall have the following properties: •
Input 1:
Bit string of length |AC|;
•
Input 2:
Bit string of length |UAK|;
•
Output:
Bit string of length |K|.
The algorithm should be designed such that the Output is dependent on every bit of both Inputs. TB4: shall be used to compute DCK from DCK1 and DCK2. The algorithm shall have the following properties: •
Input 1:
Bit string of length |DCK1|;
•
Input 2:
Bit string of length |DCK2|;
•
Output:
Bit string of length |DCK|.
The algorithm should be designed such that the Output is dependent on every bit of both Inputs. TB5: shall be used to compute ECK from CK, CC, CN (see EN 300 392-2 [2], clause 21.5) and LA. The algorithm shall have the following properties: •
Input 1:
Bit string of length |CK|;
•
Input 2:
Bit string of length |LA|;
•
Input 3:
Bit string of length |CN|;
•
Input 4:
Bit string of length |CC|;
•
Output:
Bit string of length |ECK|.
The algorithm should be designed such that the Output is dependent on every bit of all Inputs. TB6: Reserved for DMO Security (EN 300 396-6 [6]). TB7: shall be used to compute EGSKO from GSKO. The algorithm shall have the following properties: •
Input:
Bit string of length |GSKO|;
•
Output:
Bit string of length |EGSKO|.
The algorithm should be designed such that the Output is dependent on every bit of the Input.
ETSI