6.3.3 Security control information elements
36.3313GPPEvolved Universal Terrestrial Radio Access (E-UTRA)Protocol specificationRadio Resource Control (RRC)Release 17TS
– NextHopChainingCount
The IE NextHopChainingCount is used to update the KeNB key and corresponds to parameter NCC: See TS 33.401 [32], clause 7.2.8.4.
NextHopChainingCount information element
— ASN1START
NextHopChainingCount ::= INTEGER (0..7)
— ASN1STOP
– SecurityAlgorithmConfig
The IE SecurityAlgorithmConfig is used to configure AS integrity protection algorithm and AS ciphering algorithm for SRBs and DRBs. For RNs, the IE SecurityAlgorithmConfig is also used to configure AS integrity protection algorithm for DRBs between the RN and the E-UTRAN.
SecurityAlgorithmConfig information element
— ASN1START
SecurityAlgorithmConfig ::= SEQUENCE {
cipheringAlgorithm CipheringAlgorithm-r12,
integrityProtAlgorithm ENUMERATED {
eia0-v920, eia1, eia2, eia3-v1130, spare4, spare3,
spare2, spare1, …}
}
CipheringAlgorithm-r12 ::= ENUMERATED {
eea0, eea1, eea2, eea3-v1130, spare4, spare3,
spare2, spare1, …}
— ASN1STOP
|
SecurityAlgorithmConfig field descriptions |
|---|
|
cipheringAlgorithm Indicates the ciphering algorithm to be used for SRBs and DRBs, as specified in TS 33.401 [32], clause 5.1.3.2. |
|
integrityProtAlgorithm Indicates the integrity protection algorithm to be used for SRBs, as specified in TS 33.401 [32], clause 5.1.4.2. For RNs, this field also indicates the integrity protection algorithm to be used for integrity protection-enabled DRB(s). For UEs capable of user plane integrity protection, this field also indicates the integrity protection algorithm to be used to derive the KUPint key. |
– ShortMAC-I
The IE ShortMAC-I is used to identify and verify the UE at RRC connection re-establishment. The 16 least significant bits of the MAC-I calculated using the security configuration of the source PCell, as specified in 5.3.7.4.
ShortMAC-I information element
— ASN1START
ShortMAC-I ::= BIT STRING (SIZE (16))
— ASN1STOP