Digital Enhanced Cordless Telecommunications (DECT); DECT Authentication Module (DAM);

Specification covering physical/electrical aspects of the authentication module.

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Avtentikacijski modul (DAM) DECT-a

General Information

Status
Published
Publication Date
31-Aug-1998
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Sep-1998
Due Date
01-Sep-1998
Completion Date
01-Sep-1998

Buy Standard

Standard
ETS 300 331:1998
English language
91 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST ETS 300 331:1998
01-september-1998
'LJLWDOQHL]EROMãDQHEUH]YUYLþQHWHOHNRPXQLNDFLMH '(&7 $YWHQWLNDFLMVNLPRGXO
'$0 '(&7D
Digital Enhanced Cordless Telecommunications (DECT); DECT Authentication Module
(DAM);
Ta slovenski standard je istoveten z: ETS 300 331 Edition 1
ICS:
33.070.30 'LJLWDOQHL]EROMãDQH Digital Enhanced Cordless
EUH]YUYLþQHWHOHNRPXQLNDFLMH Telecommunications (DECT)
'(&7
SIST ETS 300 331:1998 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST ETS 300 331:1998

---------------------- Page: 2 ----------------------

SIST ETS 300 331:1998
EUROPEAN ETS 300 331
TELECOMMUNICATION November 1995
STANDARD
Source: ETSI TC-RES Reference: DE/RES-03013
ICS: 33.060.50
DECT, DAM
Key words:
Radio Equipment and Systems (RES);
Digital European Cordless Telecommunications (DECT);
DECT Authentication Module (DAM)
ETSI
European Telecommunications Standards Institute
ETSI Secretariat
F-06921 Sophia Antipolis CEDEX - FRANCE
Postal address:
650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE
Office address:
c=fr, a=atlas, p=etsi, s=secretariat - secretariat@etsi.fr
X.400: Internet:
Tel.: +33 92 94 42 00 - Fax: +33 93 65 47 16
Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the
foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 1995. All rights reserved.
New presentation - see History box

---------------------- Page: 3 ----------------------

SIST ETS 300 331:1998
Page 2
ETS 300 331: November 1995
Whilst every care has been taken in the preparation and publication of this document, errors in content,
typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to
"ETSI Editing and Committee Support Dept." at the address shown on the title page.

---------------------- Page: 4 ----------------------

SIST ETS 300 331:1998
Page 3
ETS 300 331: November 1995
Contents
Foreword.7
1 Scope .9
2 Normative references .9
3 Definitions symbols and abbreviations .10
3.1 Definitions.10
3.2 Symbols.11
3.3 Abbreviations.12
4 Physical characteristics.13
4.1 Format and layout .13
4.1.1 ID-1 Card . 13
4.1.2 Plug-in Card.13
4.2 Temperature range for card operation .13
4.3 Contacts.14
4.3.1 Provision of contacts .14
4.3.2 Activation and deactivation.14
4.3.3 Inactive contacts .14
4.3.4 Contact pressure.14
4.4 Precedence .14
4.5 Static Protection .14
5 Electronic signals and transmission protocols .15
5.1 Supply voltage Vcc (contact C1).15
5.2 Reset RST (contact C2) .16
5.3 Programming voltage Vpp (contact C6).16
5.4 Clock CLK (contact C3).16
5.5 I/O (contact C7).17
5.6 States.17
5.7 Baudrate .17
5.8 Answer To Reset (ATR) .17
5.8.1 Structure and contents.17
5.8.2 Protocol Type Select (PTS) procedure.19
5.9 Bit/character duration and sampling time.20
5.10 Error handling .20
5.11 Presence of the DAM .20
6 Logical model.20
6.1 General description .20
6.2 File identifier.21
6.3 Dedicated Files (DF) . 21
6.4 Elementary Files (EF).21
6.4.1 Transparent EF.21
6.4.2 Linear fixed EF.22
6.4.3 Cyclic EF.23
6.5 Methods for selecting the DECT application .23
6.6 Methods for selecting a file .23
6.7 Reservation of file IDs .24
7 Security services and facilities.25
7.1 Overview.25
7.1.1 Authentication keys.25

---------------------- Page: 5 ----------------------

SIST ETS 300 331:1998
Page 4
ETS 300 331: November 1995
7.1.2 Cipher key .26
7.1.3 Algorithms and processes .26
7.2 Authentication .27
7.2.1 Authentication of a Portable radio Termination (PT).27
7.2.2 Authentication of a Fixed Termination (FT).28
7.2.3 User authentication .28
7.2.4 Mutual authentication .28
7.3 UAK allocation.28
7.4 Data confidentiality .29
7.5 Access rights to the DECT system .29
7.6 File access control .30
7.7 Identification, keying and algorithm information .31
7.7.1 Subscription registration information.31
7.7.2 IPUI.31
7.7.3 PARK.31
7.7.4 TPUI.31
7.7.5 ZAP.31
7.7.6 User Authentication Key(s) (UAK) .31
7.7.7 Authentication Code(s) (AC).32
7.7.8 Derived Cipher Key (DCK) .32
7.8 Subscription registration maintenance .32
7.8.1 Entering a new subscription registration .32
7.8.2 Updating an existing subscription registration .32
7.8.3 Terminating an existing subscription registration.32
8 Description of the functions .33
8.1 SELECT.33
8.2 STATUS.33
8.3 READ BINARY.34
8.4 UPDATE BINARY.34
8.5 READ RECORD.34
8.6 UPDATE RECORD.35
8.7 SEEK .36
8.8 INCREASE .37
8.9 VERIFY CHV.37
8.10 CHANGE CHV .37
8.11 DISABLE CHV .38
8.12 ENABLE CHV .38
8.13 UNBLOCK CHV.39
8.14 INVALIDATE.39
8.15 REHABILITATE.39
8.16 ASK RANDOM.40
8.17 PT AUTHENTICATION .40
8.18 FT AUTHENTICATION.40
8.19 USER AUTHENTICATION.41
8.20 UAK ALLOCATION .41
9 Description of the commands .41
9.1 Mapping principles.41
9.2 Coding of the commands .43
9.2.1 SELECT .43
9.2.2 STATUS .47
9.2.3 READ BINARY.48
9.2.4 UPDATE BINARY.48
9.2.5 READ RECORD.48
9.2.6 UPDATE RECORD.49
9.2.7 SEEK .49
9.2.8 INCREASE .50
9.2.9 VERIFY CHV .50
9.2.10 CHANGE CHV.50

---------------------- Page: 6 ----------------------

SIST ETS 300 331:1998
Page 5
ETS 300 331: November 1995
9.2.11 DISABLE CHV .51
9.2.12 ENABLE CHV .51
9.2.13 UNBLOCK CHV.51
9.2.14 INVALIDATE.52
9.2.15 REHABILITATE.52
9.2.16 ASK RANDOM.52
9.2.17 PT AUTHENTICATION .52
9.2.18 FT AUTHENTICATION.53
9.2.19 USER AUTHENTICATION.53
9.2.20 UAK ALLOCATION .54
9.2.21 GET RESPONSE.54
9.3 Definitions and coding.54
9.4 Status conditions returned by the DAM .56
9.4.1 Responses to commands which are correctly executed.56
9.4.2 Memory management.56
9.4.3 Referencing management .56
9.4.4 Security management .57
9.4.5 Application independent errors .57
9.4.6 Commands versus possible status responses.58
10 Contents of the EFs.58
10.1 Contents of the EFs at the MF level.59
10.1.1 EF .60
ICC
10.1.2 EF .62
ID
10.1.3 EF .63
NAME
10.1.4 EF .63
IC
10.1.5 EF .64
DIR
10.1.6 EF .65
LANG
10.2 Contents of EFs at the parent level of the DECT application .66
10.2.1 EF .66
CHV
10.3 Contents of the EFs at the DECT application level .67
10.3.1 EF .67
LSR
10.3.2 EF .67
LCSR
10.3.3 EF .68
IPDI
10.4 Contents of the EFs at the subscription registration level.68
10.4.1 EF .68
SR
10.4.2 EF .69
IPUI
10.4.3 EF .70
PARK
10.4.4 EF .70
TPUI
10.4.5 EF .71
ZAP
10.4.6 EF .71
DCK
10.4.7 EF .72
UAK
10.4.8 EF .72
AC
10.4.9 EF .73
ST
11 Application protocol .74
11.1 General procedures .76
11.1.1 Reading an EF.76
11.1.2 Updating an EF .76
11.1.3 Increasing an EF .76
11.2 DAM management procedures.76
11.2.1 DAM initialisation.76
11.2.2 DAM session termination .77
11.2.3 Language preference.77
11.2.4 Service table request. 77
11.2.5 DAM presence detection. 77
11.3 CHV related procedures . 77
11.3.1 CHV verification.78
11.3.2 CHV value substitution .78
11.3.3 CHV disabling .78

---------------------- Page: 7 ----------------------

SIST ETS 300 331:1998
Page 6
ETS 300 331: November 1995
11.3.4 CHV enabling .78
11.3.5 CHV unblocking .79
11.4 Authentication procedures.79
11.4.1 Authentication of a PT.79
11.4.2 Authentication of an FT .80
11.4.3 User authentication .82
11.4.4 Mutual authentication .84
11.5 UAK allocation.84
11.6 General information procedures.86
11.6.1 EF request .86
ICC
11.6.2 EF request.86
ID
11.6.3 EF request .86
NAME
11.6.4 EF request.86
IC
11.7 Subscription registration maintenance .86
11.7.1 Entering a new subscription registration .86
11.7.2 Updating an existing subscription registration .87
11.7.3 Terminating an existing subscription registration.87
Annex A (normative): Plug-in Card.88
Annex B (informative): Service class .89
Annex C (informative): Bibliography.90
History .91

---------------------- Page: 8 ----------------------

SIST ETS 300 331:1998
Page 7
ETS 300 331: November 1995
Foreword
This European Telecommunication Standard (ETS) has been prepared by the Radio Equipment and
Systems (RES) Technical Committee of the European Telecommunications Standards Institute (ETSI).
Proposed transposition dates
Date of adoption of this ETS: 10 November 1995
Date of latest announcement of this ETS (doa): 28 February 1996
Date of latest publication of new National Standard
or endorsement of this ETS (dop/e): 31 August 1996
Date of withdrawal of any conflicting National Standard (dow): 31 August 1996

---------------------- Page: 9 ----------------------

SIST ETS 300 331:1998
Page 8
ETS 300 331: November 1995
Blank page

---------------------- Page: 10 ----------------------

SIST ETS 300 331:1998
Page 9
ETS 300 331: November 1995
1 Scope
This European Telecommunication Standard (ETS) specifies the interface between the DECT
Authentication Module (DAM) and the Portable Equipment (PE) for use in the Digital European Cordless
Telecommunications (DECT) system as well as those aspects of the internal organisation of the DAM
which are related to this use. This is to ensure interoperability between a DAM and a PE independently of
the respective manufacturers and operators. The concept of a split of the Portable Part (PP) into a DAM,
a type of Integrated Circuit (IC) card, and a PE is described in ETS 300 175-7 [4]. Where equivalent
functions are provided in both the PE and the DAM, the DAM functions take precedence over the functions
implemented in the PE.
This ETS specifies:
- the requirements for the physical characteristics of the DAM, the electronic signals and the
transmission protocols;
- the model which shall be used as a basis for the design of the logical structure of the DAM;
- the security services and facilities;
- the DAM functions which may be requested by the PE over the interface;
- the commands;
- the contents of the files required for the DECT application;
- the application protocol.
This ETS does not specify any aspects related to the administrative management phase. Any internal
technical realization of either the DAM or the PE are only specified where these reflect over the interface.
This ETS does not specify any of the security algorithms which may be used.
2 Normative references
This ETS incorporates, by dated or undated reference, provisions from other publications. These normative
references are cited at the appropriate places in the text and the publications are listed hereafter. For
dated references, subsequent amendments to or revisions of any of these publications apply to this ETS
only when incorporated in it by amendment or revision. For undated references the latest edition of the
publication referred to applies.
[1] ETS 300 175-1 (1992): "Radio Equipment and Systems (RES); Digital European
Cordless Telecommunications (DECT); Common Interface Part 1: Overview".
[2] ETS 300 175-5 (1992): "Radio Equipment and Systems (RES); Digital European
Cordless Telecommunications (DECT); Common Interface Part 5: Network
layer".
[3] ETS 300 175-6 (1992): "Radio Equipment and Systems (RES); Digital European
Cordless Telecommunications (DECT); Common Interface Part 6: Identities and
addressing".
[4] ETS 300 175-7 (1992): "Radio Equipment and Systems (RES); Digital European
Cordless Telecommunications (DECT); Common Interface Part 7: Security
features".
[5] CCITT Recommendation E.118 (1988): "Automated international telephone
credit card system".
[6] ISO Publication 639 (1988): "Codes for the representation of names of
languages".

---------------------- Page: 11 ----------------------

SIST ETS 300 331:1998
Page 10
ETS 300 331: November 1995
[7] ISO Publication 3166 (1988): "Codes for the representation of names of
countries".
[8] ISO Publication 7811-1 (1985): "Identification cards - Recording technique - Part
1: Embossing".
[9] ISO Publication 7811-3 (1985): "Identification cards - Recording technique - Part
3: Location of embossed characters on ID-1 cards".
[10] ISO Publication 7816-1 (1987): "Identification cards - Integrated circuit(s) cards
with contacts - Part 1: Physical characteristics".
[11] ISO Publication 7816-2 (1988): "Identification cards - Integrated circuit(s) cards
with contacts - Part 2: Dimensions and location of the contacts".
[12] ISO/IEC Publication 7816-3 (1989): "Identification cards - Integrated circuit(s)
cards with contacts - Part 3: Electronic signals and transmission protocols".
[13] ISO/IEC Publication 7816-5 (1993): "Identification cards - Integrated circuit(s)
cards with contacts - Part 5: Numbering system and registration procedure for
application identifiers".
[14] ISO Publication 8859-1 (1987): "Information processing - 8-bit single-byte coded
graphic character sets, Part 1: Latin alphabet No. 1".
[15] EN 726-3 (1994): "Terminal Equipment (TE); Requirements for IC cards and
terminals for telecommunication use - Part 3: Application independent card
requirements".
[16] ETS 300 608: "European digital cellular telecommunications system
(Phase 2); Specification of the Subscriber Identity Module - Mobile Equipment
(SIM-ME) interface" (GSM 11.11, version 4.13.1).
3 Definitions symbols and abbreviations
3.1 Definitions
For the purposes of this ETS, the following definitions apply:
access conditions: A set of security attributes associated with a file.
application: An application consists of a set of security mechanisms, files, data, protocols (excluding
transmission protocols).
application protocol: The set of procedures required by the application.
Application Specific Command (ASC) set: To a Dedicated File (DF) can be associated, optionally, an
ASC-set (an application specific command set and/or an application specific program). This means that
when selecting this application, the general command set of the card is extended or modified by this
specific command set. The ASC is valid for the whole subt
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.