Terrestrial Trunked Radio (TETRA); Security aspects; Subscriber Identity Module to Mobile Equipment (SIM - ME) interface

To define a specification for an IC card (SIM) to be used in TETRA terminals.

Prizemni snopovni radio (TETRA) - Varnostni vidiki - Vmesnik med naročniško identifikacijsko kartico in mobilno opremo (SIM-ME)

General Information

Status
Published
Publication Date
30-Nov-2003
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Dec-2003
Due Date
01-Dec-2003
Completion Date
01-Dec-2003

Buy Standard

Standard
ETS 300 812 E1:2003
English language
137 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST ETS 300 812 E1:2003
01-december-2003
3UL]HPQLVQRSRYQLUDGLR 7(75$ 9DUQRVWQLYLGLNL9PHVQLNPHGQDURþQLãNR
LGHQWLILNDFLMVNRNDUWLFRLQPRELOQRRSUHPR 6,00(
Terrestrial Trunked Radio (TETRA); Security aspects; Subscriber Identity Module to
Mobile Equipment (SIM - ME) interface
Ta slovenski standard je istoveten z: ETS 300 812 Edition 1
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
SIST ETS 300 812 E1:2003 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST ETS 300 812 E1:2003

---------------------- Page: 2 ----------------------

SIST ETS 300 812 E1:2003
EUROPEAN ETS 300 812
TELECOMMUNICATION November 1998
STANDARD
Source: TETRA Reference: DE/TETRA-07017
ICS: 33.020
Key words: Card, security, TETRA
Terrestrial Trunked Radio (TETRA);
Security aspects;
Subscriber Identity Module to Mobile Equipment (SIM - ME)
interface
ETSI
European Telecommunications Standards Institute
ETSI Secretariat
Postal address: F-06921 Sophia Antipolis CEDEX - FRANCE
Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE
Internet: secretariat@etsi.fr
- http://www.etsi.org
Tel.: +33 4 92 94 42 00 - Fax: +33 4 93 65 47 16
Copyright Notification:
No part may be reproduced except as authorized by written permission. The copyright and the
foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 1998. All rights reserved.

---------------------- Page: 3 ----------------------

SIST ETS 300 812 E1:2003
Page 2
ETS 300 812: November 1998
Whilst every care has been taken in the preparation and publication of this document, errors in content,
typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to
"ETSI Standards Making Support Dept." at the address shown on the title page.

---------------------- Page: 4 ----------------------

SIST ETS 300 812 E1:2003
Page 3
ETS 300 812: November 1998
Content
Foreword .9
1 Scope . 11
2 Normative references . 11
3 Definitions, abbreviations and symbols. 13
3.1 Definitions. 13
3.2 Abbreviations. 15
3.3 Symbols. 16
4 SIM characteristics. 16
4.1 Format and layout. 16
4.1.1 SIM. 17
4.1.2 Plug-in SIM. 17
4.1.3 Virtual SIM. 17
4.2 Temperature range for card operation . 17
4.3 Contacts. 17
4.3.1 Provision of contacts . 17
4.3.2 Activation and deactivation. 17
4.3.3 Inactive contacts (contact conditions in the ME switched-off state). 18
4.3.4 Contact pressure. 18
4.4 Precedence (multiple SIM operation). 18
4.5 Static protection. 18
5 Electronic signals and transmission protocols . 18
5.1 Supply voltage Vcc (contact C1). 19
5.1.1 5 V technology SIM. 19
5.1.2 3 V technology SIM. 19
5.1.3 3 V technology SIM identification. 19
5.1.4 3 V technology ME. 19
5.1.5 3 V Only ME . 19
5.1.6 Activation and deactivation of 3 V technology SIM. 19
5.1.7 Supply voltage switching. 20
5.1.8 Cross compatibility. 20
5.1.9 Technology outlook. 20
5.2 Reset (RST) (contact C2). 20
5.3 Programming voltage Vpp (contact C6). 20
5.4 Clock CLK (contact C3). 20
5.5 Input/Output (I/O) (contact C7) . 20
5.6 States . 21
5.7 Baud rate . 21
5.8 Answer To Reset (ATR) . 21
5.9 Bit/character duration and sampling time. 21
5.10 Error handling . 21
6 Logical model. 21
6.1 General description. 21
6.2 File identifier. 22
6.3 Dedicated Files (DF) . 22
6.4 Elementary Files (EF). 23
6.4.1 Transparent EF. 23
6.4.2 Linear fixed EF. 23
6.4.3 Key EF. 24
6.4.4 Cyclic EF. 24
6.5 Methods for selecting a file. 25
6.6 Reservation of file IDs . 26

---------------------- Page: 5 ----------------------

SIST ETS 300 812 E1:2003
Page 4
ETS 300 812: November 1998
7 Security features.26
7.1 Authentication and cipher key generation procedure.27
7.2 Support of Over The Air Re-keying (OTAR) distribution of cipher keys .27
7.3 Support of SIM-ME enhanced security.27
7.4 File access conditions.27
7.5 Storage of CHV information.29
7.6 Storage of DCK .29
8 Description of the functions .29
8.1 SELECT.29
8.2 STATUS.30
8.3 READ BINARY.30
8.4 UPDATE BINARY.30
8.5 READ RECORD.30
8.6 READ KEY.31
8.7 UPDATE RECORD.31
8.8 SEEK.32
8.9 VERIFY CHV.33
8.10 CHANGE CHV .33
8.11 DISABLE CHV .34
8.12 ENABLE CHV .34
8.13 UNBLOCK CHV.34
8.14 INVALIDATE.35
8.15 REHABILITATE.35
8.16 TETRA authentication algorithms.35
8.16.1 GET RANDOM.35
8.16.2 TA11/12 ALGORITHM.36
8.16.3 TA21/22 ALGORITHM.36
8.16.4 TB4/TE ALGORITHM.36
8.17 OTAR algorithms.36
8.17.1 TA32 ALGORITHM .37
8.17.2 TA82 ALGORITHM .37
8.17.3 TA41/52 ALGORITHM.37
8.17.4 TA71 ALGORITHM .37
9 Description of the commands .38
9.1 Mapping principles.38
9.2 Coding of the commands .39
9.2.1 SELECT .41
9.2.2 STATUS .43
9.2.3 READ BINARY.43
9.2.4 UPDATE BINARY.43
9.2.5 READ RECORD.43
9.2.6 UPDATE RECORD.44
9.2.7 READ KEY .44
9.2.8 SEEK .44
9.2.9 VERIFY CHV .45
9.2.10 CHANGE CHV.45
9.2.11 DISABLE CHV .45
9.2.12 ENABLE CHV.45
9.2.13 UNBLOCK CHV.46
9.2.14 INVALIDATE.46
9.2.15 REHABILITATE.46
9.2.16 GET RANDOM.46
9.2.17 TA11/12 ALGORITHM.46
9.2.18 TA21/22 ALGORITHM.47
9.2.19 TB4/TE ALGORITHM.47
9.2.20 TA32 ALGORITHM .47
9.2.21 TA82 ALGORITHM .48
9.2.22 TA41/52 ALGORITHM.48

---------------------- Page: 6 ----------------------

SIST ETS 300 812 E1:2003
Page 5
ETS 300 812: November 1998
9.2.23 TA71 ALGORITHM . 48
9.2.24 GET RESPONSE. 48
9.3 Definitions and coding. 49
9.4 Status conditions returned by the card. 50
9.4.1 Responses to commands which are correctly executed. 50
9.4.2 Memory management. 50
9.4.3 Referencing management . 50
9.4.4 Security management. 51
9.4.5 Application independent errors . 51
9.4.6 Commands versus possible status responses. 52
10 Contents of the EFs. 52
10.1 Contents of EFs located either at application level or above . 53
10.1.1 EF . 53
CHV
10.2 Contents of the EFs at the MF level. 54
10.2.1 EF (Card Identification). 54
ICCD
10.2.2 EF (Application directory). 55
DIR
10.2.3 EF (Language Preference). 56
LP
10.3 Contents of the EFs at the TETRA application level . 56
10.3.1 EF (SIM Service Table). 56
SST
10.3.2 EF (Individual Tetra Subscriber Identity). 59
ITSI
10.3.3 EF (ITSI Disabled). 60
ITSIDIS
10.3.4 EF (Username). 61
UNAME
10.3.5 EF (Subscriber Class Table). 61
SCT
10.3.6 EF (Phase identification) . 62
PHASE
10.3.7 EF (Common Cipher Key) . 63
CCK
10.3.8 EF (CCK location areas) . 64
CCKLOC
10.3.9 EF (Static Cipher Keys) . 65
SCK
10.3.10 EF (Static GSSIs) . 67
GSSIS
10.3.11 EF (Group related data for static GSSIs) . 68
GRDS
10.3.12 EF (Dynamic GSSIs). 70
GSSID
10.3.13 EF (Group related data for dynamic GSSIs) . 70
GRDD
10.3.14 EF (Group Cipher Keys). 71
GCK
10.3.15 EF (Modified Group Cipher Keys). 72
MGCK
10.3.16 EF (User's group information) . 73
GINFO
10.3.17 EF (Security settings) . 75
SEC
10.3.18 EF (Forbidden networks). 75
FORBID
10.3.19 EF (Preferred networks) . 77
PREF
10.3.20 EF (Service Provider Name) . 78
SPN
10.3.21 EF (Location information). 78
LOCI
10.3.22 EF (Broadcast network information) . 79
DNWRK
10.3.23 EF (Network table). 81
NWT
10.3.24 EF (Gateway table). 82
GWT
10.3.25 EF (Call Modifier Table). 83
CMT
10.3.26 EF (Abbreviated Dialling Number) . 85
ADN
10.3.27 EF (Extension1) . 87
EXT1
10.3.28 EF (Abbreviated dialling numbers for TETRA network). 88
ADNTETRA
10.3.29 EF (Extension A). 89
EXTA
10.3.30 EF (Fixed dialling numbers). 90
FDN
10.3.31 EF (Extension2) . 91
EXT2
10.3.32 EF (Fixed dialling numbers for TETRA network). 91
FDNTETRA
10.3.33 EF (Extension B). 92
EXTB
10.3.34 EF (Last number dialled) . 92
LND
10.3.35 EF (Last numbers dialled for TETRA network). 93
LNDTETRA
10.3.36 EF (Service Dialling Numbers) . 93
SDN
10.3.37 EF (Extension3) . 94
EXT3
10.3.38 EF (Service Dialling Numbers for TETRA network) . 94
SDNTETRA
10.3.39 EF (Status message texts) . 95
STXT
10.3.40 EF (SDS-1 message texts) . 96
MSGTXT
10.3.41 EF (Status and SDS type 1, 2 and 3 message storage). 97
SDS123

---------------------- Page: 7 ----------------------

SIST ETS 300 812 E1:2003
Page 6
ETS 300 812: November 1998
10.3.42 EF (SDS type 4 message storage). 104
SDS4
10.3.43 EF (Message Extension). 107
MSGEXT
10.3.44 EF (Emergency addresses) . 107
EADDR
10.3.45 EF (Emergency call information). 109
EINFO
10.3.46 EF (DMO channel information). 110
DMOCh
10.3.47 EF (MS allocation of DMO channels) . 110
MSCh
10.3.48 EF (List of Key Holders) . 111
KH
10.3.49 EF (DMO repeater and gateway list). 112
REPGATE
10.3.50 EF (Administrative data). 113
AD
11 Application protocol . 115
11.1 General procedures. 117
11.1.1 Reading an EF . 117
11.1.2 Updating an EF . 117
11.1.3 Invalidating an EF. 117
11.2 SIM management procedures . 117
11.2.1 SIM initialization. 117
11.2.2 TETRA session initialization. 117
11.2.3 TETRA session termination . 118
11.2.4 Language preference request. 118
11.2.5 Administrative information request. 119
11.2.6 SIM service table request . 119
11.2.7 SIM phase request . 119
11.2.8 SIM presence detection. 119
11.2.9 SIM card number request. 119
11.2.10 Common Cipher Key request. 119
11.3 CHV related procedures . 119
11.3.1 CHV verification. 119
11.3.2 CHV value substitution . 120
11.3.3 CHV disabling. 120
11.3.4 CHV enabling . 120
11.3.5 CHV unblocking. 120
11.4 TETRA security related procedures. 121
11.4.1 Authentication procedures and generation of DCK. 121
11.4.1.1 Mutual authentication requirement request . 121
11.4.1.2 SIM authentication . 121
11.4.1.3 SwMI authentication. 121
11.4.2 TETRA OTAR key computation (CCK, GCK, SCK) . 121
11.4.2.1 CCK distribution. 121
11.4.2.2 CCK changeover. 121
11.4.2.3 GCK distribution . 122
11.4.2.4 SCK distribution. 122
11.4.3 ITSI request. 122
11.4.4 ITSI disabling/re-enabling. 122
11.5 Subscription related procedures . 123
11.5.1 Username request. 123
11.5.2 ITSI temporarily disabled enquiry. 123
11.5.3 Subscriber class request. 123
11.5.4 Location information. 123
11.5.5 Group identity information . 123
11.5.6 Group related data . 123
11.5.7 User's group information . 124
11.5.8 Call modifiers. 124
11.5.9 Service Provider Name . 124
11.5.10 DMO channel procedures. 124
11.5.11 Emergency addresses. 124
11.5.12 Interrupted emergency call request. 124
11.6 Network related procedures. 125
11.6.1 Forbidden networks. 125
11.6.2 Preferred networks. 125

---------------------- Page: 8 ----------------------

SIST ETS 300 812 E1:2003
Page 7
ETS 300 812: November 1998
11.7 Phonebook related procedures. 125
11.7.1 Dialling numbers. 125
11.7.2 FDN specific procedures. 127
11.7.2.1 FDN capability request. 127
11.7.2.2 FDN disabling. 127
11.7.2.3 FDN enabling. 127
11.8 Status and short data message procedures . 127
11.8.1 Display of status message texts. 127
11.8.2 Display of SDS1 message texts . 128
11.8.3 Storage of status and SDS messages types 1, 2 and 3. 128
11.8.4 Storage of SDS messages type 4 . 128
Annex A (normative): Plug-in SIM. 129
Annex B (informative): FDN Procedures. 130
Annex C (informative): Suggested contents of EFs at pre-personalization . 131
Annex D (normative): Database structure for group IDs and phone books. 132
Annex E (informative): Emergency call facilities and procedures. 134
Annex F (informative): Bibliography. 136
History. 137

---------------------- Page: 9 ----------------------

SIST ETS 300 812 E1:2003
Page 8
ETS 300 812: November 1998
Blank page

---------------------- Page: 10 ---------------------
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.