Foreword1 Scope2 References3 Definitions, abbreviations symbols and conventions4 Generic Bootstrapping Architecture5 UICC-based enhancements to Generic Bootstrapping Architecture (GBA_U)B.1 IntroductionB.2 Generic key derivation functionB.3 NAF specific key derivation in GBA and GBA_UB.4 Derivation of TMPIB.5 Derivation of passwd and KsB.6 NAF specific key derivation in GBA_DigestG.1 GBA_U Bootstrapping procedureG.2 GBA_U NAF Derivation procedureH.1 DefinitionH.2 Organization OctetH.3 Ua security protocol identifiers for 3GPP specified protocolsI.0 IntroductionI.1 Reference modelI.2 Network elementsI.3 Bootstrapping architecture and reference pointsI.4 Requirements and principles for bootstrappingI.5 ProceduresI.6 TLS ProfileJ.1 GeneralJ.2 Usage scenariosK.1 Example on interoperator GBA setupK.1 Example on interoperator GBA setupK.2 Example on interoperator GBA operationL.1 Impersonation of the UE to the BSF during the run of the Ub protocolL.2 Impersonation of the BSF to the UE during the run of the Ub protocolL.3 Finding the GBA key Ks during or after the Ub protocol runL.4 Bidding down attackM.1 GeneralM.2 Reference modelM.3 Network elementsM.4 Bootstrapping architecture and reference pointsM.5 Requirements and principles for bootstrappingM.6 ProceduresM.7 TLS ProfileAnnex N (normative): Support of SBA in GBAN.1 GeneralN.2 GAA/GBA SBA ServicesN.3 SBI Capable NF Discovery and Selection Annex N (normative): Support of SBA in GBA 33.2203GPPGeneric Authentication Architecture (GAA)Generic Bootstrapping Architecture (GBA)TS Tools: ARFCN - Frequency Conversion for 5G NR/LTE/UMTS/GSM