4 Introductory information
3GPP55.236Release 17Specification of A8_V MILENAGE Algorithm: An example algorithm for the key generation function A8_VTS
4.1 Introduction
For VGCS and VBS ciphering in the GSM system the security function A8_V has been specified. The operation of this function falls completely within the domain of an individual operator, and the function is therefore to be specified by each operator rather than being fully standardized. The algorithm specified in this document is an example that may be used by an operator which does not wish to design its own.
The inputs and outputs of the function A8_V is defined in clause 4.4.
4.2 Notation
4.2.1 Bit/byte ordering
All data variables in this specification are presented with the most significant bit (or byte) on the left hand side and the least significant bit (or byte) on the right hand side. Where a variable is broken down into a number of substrings, the leftmost (most significant) substring is numbered 0, the next most significant is numbered 1, and so on through to the least significant. When a variable, with bit length L, is shown in hexadecimal format, bit 0 is the most significant bit of the leftmost hexadecimal digit, and bit L-1 is the least significant bit of the rightmost hexadecimal digit.
4.2.2 List of symbols
See clause 3.2
4.3 List of variables
For V_Ki, VSTK_RAND and VSTK see TS 43.020 [4]
For all f3-function related variables see TS 35.206 [1]
4.4 Algorithm inputs and outputs
The inputs to the algorithm are given in table 1, the output in table 2 below.
Table 1: Inputs to A8_V
Parameter |
Size (bits) |
Comment |
V_Ki |
128 |
Group key V_Ki[0]…V_Ki[127] |
VSTK_RAND |
36 |
Random challenge VSTK_RAND[0]…VSTK_RAND[35] |
Table 2: Outputs from A8_V
Parameter |
Size (bits) |
Comment |
VSTK |
128 |
Cipher key VSTK[0]…VSTK[127] |