4 General algorithm requirements
33.1053G Security3GPPCryptographic algorithm requirementsRelease 17TS
4.1 Resilience
The functions should be designed with a view to its continued use for a period of at least 20 years. Successful attacks with a work load significantly less than exhaustive key search through the effective key space should be impossible.
The designers of above functions should design algorithms to a strength that reflects the above qualitative requirements.
4.2 World-wide availability and use
Legal restrictions on the use or export of equipment containing cryptographic functions may prevent the use of such equipment in certain countries.
It is the intention that UE and USIMs which embody such algorithms should be free from restrictions on export or use, in order to allow the free circulation of 3G terminals. Network equipment, including RNC and AuC, may be expected to come under more stringent restrictions. It is the intention is that RNC and AuC which embody such algorithms should be exportable under the conditions of the Wassenaar Arrangement [2].