Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $21.80
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

The purpose of the present document is to specify the rules for the management of the TETRA standard encryption algorithm TEA2. This algorithm is intended for air interface encryption in TETRA products.

The specification for TEA2 consists of the following three parts:
Part 1: Algorithm specification;
Part 2: Design conformance test data;
Part 3: Algorithm input/output test data.
The procedures described in the present document apply to parts 1 and 2 of the specifications. The parts 1 and 2 are confidential.

Part 3 of each of the specifications is not confidential and can be obtained directly from the TEA2 Custodian (see clause 6.5). There are no restrictions on the distribution of this part of the specifications.

The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA2 (ETSI, ETSI Technical Committee TETRA, TEA2 Custodian and approved recipients) together with the relationships and interactions between them.

Clause 5 is concerned with the rules for the use of TEA2. This clause is supplemented by clause E in which the states and territories are listed in which a User can become an approved recipient.

The procedures for delivering TEA2 to approved recipients are defined in clause 6. This clause is supplemented by clause A that specifies the items that are to be delivered.

Clause 7 is concerned with the criteria for approving an organization for receipt of TEA2 deliverables and with the responsibilities of an approved recipient. This clause is supplemented by annexes B, C, CA and D which contain a Confidentiality and Restricted Usage Undertaking to be signed by each approved recipient Manufacturer, User and Third Party Supplier.

Clause 8 is concerned with the appointment and responsibilities of the TEA2 Custodian.
 

Document History

  1. ETSI TR 101 053-2

    👀 currently
    viewing


    Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2

    • Most Recent
  2. ETSI TR 101 053-2


    Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2

    • Historical Version
  3. ETSI TR 101 053-2


    Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2

    • Historical Version