2 References
33.1803GPPRelease 17Security of the Mission Critical (MC) serviceTS
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
– References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
– For a specific reference, subsequent revisions do not apply.
– For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
[2] 3GPP TS 23.379: "Functional architecture and information flows to support Mission Critical Push To Talk (MCPTT); Stage 2".
[3] 3GPP TS 22.179: "Mission Critical Push To Talk (MCPTT); Stage 1".
[4] 3GPP TS 33.210: ”3G security; Network Domain Security (NDS); IP network layer security”.
[5] 3GPP TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)".
[6] 3GPP TS 33.203: "3G security; Access security for IP-based services".
[7] 3GPP TS 33.179 Release 13: "Security of Mission Critical Push To Talk (MCPTT) over LTE".
[8] 3GPP TS 33.328: ”IP Multimedia Subsystem (IMS) media plane security”.
[9] IETF RFC 6507: ”Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)”.
[10] IETF RFC 6508: ”Sakai-Kasahara Key Encryption (SAKKE)”.
[11] IETF RFC 6509: ”MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY)”.
[12] IETF RFC 3550: ”RTP: A Transport Protocol for Real-Time Applications”.
[13] IETF RFC 3711: "The Secure Real-time Transport Protocol (SRTP)".
[14] 3GPP TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
[15] 3GPP TS 23.228: "IP Multimedia Subsystem (IMS); Stage 2".
[16] 3GPP TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)".
[17] 3GPP TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[18] NIST FIPS 180-4: "Secure Hash Standard (SHS)".
[19] IETF RFC 6749: "The OAuth 2.0 Authorization Framework".
[20] IETF RFC 6750: "The OAuth 2.0 Authorization Framework: Bearer Token Usage".
[21] OpenID Connect 1.0: "OpenID Connect Core 1.0 incorporating errata set 1", http://openid.net/specs/openid-connect-core-1_0.html.
[22] IETF RFC 3830: "MIKEY: Multimedia Internet KEYing".
[23] IETF RFC 3602: "The AES-CBC Cipher Algorithm and Its Use with IPsec".
[24] IETF RFC 4771: "Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP)".
[25] IETF RFC 6043: "MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY)".
[26] IETF RFC 7714: ”AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP)”.
[27] W3C: "XML Encryption Syntax and Processing Version 1.1", https://www.w3.org/TR/xmlenc-core1/.
[28] W3C: "XML Signature Syntax and Processing (Second Edition)", http://www.w3.org/TR/xmldsig-core/.
[29] IETF RFC 5905: "Network Time Protocol Version 4: Protocol and Algorithms Specification".
[30] IETF RFC 5480: "Elliptic Curve Cryptography Subject Public Key Information".
[31] IETF RFC 6090: "Fundamental Elliptic Curve Cryptography Algorithms".
[32] IETF RFC 7519: "JSON Web Token (JWT)".
[33] IETF RFC 7662: "OAuth 2.0 Token Introspection".
[34] IETF RFC 3394: "Advanced Encryption Standard (AES) Key Wrap Algorithm".
[35] IETF RFC 7515: "JSON Web Signature (JWS)".
[36] 3GPP TS 23.280: "Common functional architecture to support mission critical services; Stage 2".
[37] 3GPP TS 23.281: "Functional architecture and information flows for mission critical video; Stage 2".
[38] 3GPP TS 23.282: "Functional model and information flows for Mission Critical Data".
[39] 3GPP TS 23.002: "Network Architecture".
[40] IETF RFC 2045: "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies".
[41] IETF RFC 2392: "Content-ID and Message-ID Uniform Resource Locators".
[42] NIST Special Publication 800-38D: "Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC".
[43] IETF RFC 5116: "An Interface and Algorithms for Authenticated Encryption".
[45] IETF RFC 7521: "Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants".
[46] IETF RFC 7523: "JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants".
[47] 3GPP TS 22.280: " Mission Critical Services Common Requirements; Stage 1".
[48] 3GPP TS 23.283: " Mission Critical Communication Interworking with Land Mobile Radio Systems; Stage 2".
[49] 3GPP TS 24.379: "Mission Critical Push To Talk (MCPTT) call control; Protocol specification."
[50] 3GPP TS 24.282: "Mission Critical Data (MCData) signalling control; Protocol specification. "
[51] IETF RFC 3711 Errata ID 3712, https://www.rfc-editor.org/errata/eid3712.
[52] IANA: "Multimedia Internet KEYing (MIKEY) Payload Name Spaces", https://www.iana.org/assignments/mikey-payloads/mikey-payloads.xhtml.
[53] IETF RFC 7636: "Proof Key for Code Exchange by OAuth public clients".
[54] 3GPP TS 23.289: "Mission Critical services over 5G System; Stage 2".
[55] 3GPP TS 33.501: "Security architecture and procedures for 5G System".