ETS 300 175-7 : 20003
Current
The latest, up-to-date edition.
RADIO EQUIPMENT AND SYSTEMS (RES); DIGITAL EUROPEAN CORDLESS TELECOMMUNICATIONS (DECT); COMMON INTERFACE (CI); SECURITY FEATURES
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Security architecture
4.1 Background
4.2 Security services
4.3 Security mechanisms
4.4 Cryptographic parameters and keys
4.5 Security processes
4.6 Combinations of security services
5 Algorithms for security processes
5.1 Background
5.2 Derivation of session authentication key(s)
5.3 Authentication and cipher key generation
processes
6 Integration of security
6.1 Background
6.2 Association of keys and identities
6.3 NWK layer procedures
6.4 MAC layer procedures
6.5 Security attributes
7 Use of security features
7.1 Background
7.2 Key management options
7.3 Confidentiality service with a Cordless Radio
Fixed Part (CRFP)
Annex A (informative): Security threats analysis
Annex B (informative): Security features and operating
environments
Annex C (informative): Reasons for not adopting public
key techniques
Annex D (informative): Overview of security features
Annex E (informative): Limitations of DECT security
Annex F (informative): Security features related to
target networks
Annex G (informative): Compatibility of DECT and GSM
authentication
Annex H (informative): DECT standard authentication
algorithm
Annex J (informative): DECT standard cipher
Annex K (informative): Bibliography
Annex L (normative): Clarifications, bit mappings and
examples for DSAA and DSC
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.