Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

REN/DECT-00357

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 7. del: Varnostne lastnosti

Ta dokument je eden od delov specifikacije skupnega vmesnika (CI) za digitalne izboljšane brezvrvične telekomunikacije (DECT).
V tem dokumentu so določeni varnostna arhitektura, vrste zahtevanih kriptografskih algoritmov in način njihove uporabe ter zahteve za integriranje varnostnih lastnosti arhitekture v skupni vmesnik za digitalne izboljšane brezvrvične telekomunikacije. Opisuje tudi načine upravljanja funkcij ter njihovo povezavo z določenimi fiksnimi sistemi digitalnih izboljšanih brezvrvičnih telekomunikacij in lokalnimi konfiguracijami omrežij.
Varnostna arhitektura je določena v okviru varnostnih storitev, ki jih podpira skupni vmesnik, pri čemer mehanizmi tega vmesnika zagotavljajo storitve ter kriptografske parametre, ključe in procese, povezane s temi mehanizmi.
Varnostni procesi, opredeljeni v tem dokumentu, so osnovani na treh kriptografskih algoritmih:
• algoritem preverjanja pristnosti,
• generator toka ključev za šifriranje plasti kode MAC ter
• generator toka ključev in generator kode pristnosti sporočil za preverjeno šifriranje CCM.
Vendar je arhitektura neodvisna od algoritma, zato je načeloma mogoče uporabiti algoritme standarda digitalnih izboljšanih brezvrvičnih telekomunikacij, ustrezne lastniške algoritme ali kombinacijo obeh. Uporaba algoritma je določena v tem dokumentu.
Integriranje varnostnih lastnosti je določeno v okviru protokolnih elementov in postopkov, ki se zahtevajo v omrežnih (NWK) plasteh in plasteh krmiljenja dostopa do prenosnega medija (MAC) skupnega vmesnika.
Razmerje med varnostnimi lastnostmi in različnimi omrežnimi elementi je opisano glede na lokacije, na katerih bodo zagotovljeni varnostni postopki in funkcije upravljanja.
Ta dokument ne obravnava vprašanj uvedbe. Ta dokument na primer ne vsebuje nobene navedbe, ki bi določala uvedbo DSAA ali DSAA2 v PP med proizvodnjo oz. uvedbo DSAA, DSAA2 ali lastniškega algoritma za preverjanje pristnosti v snemljivi modul. Prav tako ta dokument ne določa uvedbe DSC ali DSC2 v strojno opremo vseh PP-jev med proizvodnjo oz. proizvodnje posebnih PP-jev z vgrajenimi DSC, DSC2 ali lastniškimi šiframi. Varnostna arhitektura podpira vse te možnosti, čeprav lahko uporaba lastniških algoritmov omejuje gostovanje in hkratno uporabo PP-jev v različnih okoljih.
V okviru standardnih algoritmov za preverjanje pristnosti so DSAA2, DSC2 in CCM zanesljivejši od DSAA in DSC ter zagotavljajo nadstandardno zaščito. DSAA2 in DSC2 temeljita na AES [10] ter sta bila izdelana leta 2011. Tudi CCM temelji na AES [10] in je bil v standard dodan leta 2012.
Ta dokument vključuje novo generacijo digitalnih izboljšanih brezvrvičnih telekomunikacij, nadaljnji razvoj standarda o digitalnih izboljšanih brezvrvičnih telekomunikacijah, ki uvaja širokopasovni govor, izpopolnjene podatkovne storitve, nove tipe rež in druge tehnične izpopolnitve.
Ta dokument vključuje tudi DECT ULE (ultra nizka poraba energije), podatkovno tehnologijo nizke stopnje, ki temelji na DECT in je namenjena uporabi M2M z ultra nizko porabo energije.

General Information

Status
Not Published
Current Stage
12 - Completion
Due Date
06-Apr-2022
Completion Date
28-Mar-2022

Overview

ETSI EN 300 175-7 V2.9.1 (2022-03) specifies the security features of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). It defines a security architecture for DECT CI, the classes of cryptographic algorithms required, how they are used, and the protocol-level integration of security into the CI. The document covers authentication, confidentiality and authenticated encryption (CCM), key management concepts, and how security services map to Network (NWK) and Medium Access Control (MAC) layers. It applies to Classic DECT, New Generation DECT (wideband speech and improved data) and DECT Ultra Low Energy (ULE) for M2M/IoT.

Key topics and technical requirements

  • Security architecture: Defined in terms of supported security services, mechanisms to provide them, and associated cryptographic parameters, keys and processes.
  • Authentication services: Procedures for PT (portable terminal) and FT (fixed terminal) authentication, including type 1 and type 2 procedures and mutual authentication.
  • Cryptographic algorithm types:
    • An authentication algorithm (e.g., DSAA, DSAA2)
    • A key stream generator for MAC-layer encryption (e.g., DSC, DSC2)
    • A key stream generator + MAC generator for CCM authenticated encryption
  • Algorithm independence: The architecture supports DECT standard algorithms or proprietary alternatives; usage rules for chosen algorithms are specified.
  • AES-based enhancements: DSAA2 and DSC2 (based on AES) and CCM (AES-based) provide stronger protection; DSAA2/DSC2 were introduced in 2011, CCM added in 2012.
  • Key management and parameters: Definitions for authentication keys (K), session keys (KS), cipher keys (CK), derived/ static/ default keys and provisions for random number generation.
  • Integration details: Protocol elements and processes required at NWK and MAC layers, association of keys and identities, transfer of cipher keys and management functions across network elements.
  • Scope limitations: The standard does not mandate specific implementation choices (e.g., hardware vs detachable modules) - it focuses on architecture and protocol-level requirements rather than manufacturing details.

Practical applications and users

  • Who uses it:
    • DECT device manufacturers (handsets, base stations, repeaters)
    • Module designers and chipset vendors (implementing CI security primitives)
    • System integrators and network operators (deploying DECT, New Generation DECT, ULE)
    • Security architects and auditors (evaluating compliance and risk)
    • Certification bodies and regulators adopting national ETSI transpositions (e.g., SIST)
  • Use cases:
    • Securing voice and data sessions in residential and enterprise DECT systems
    • Enabling secure roaming and multi-environment interoperability
    • Protecting low-power M2M/IoT endpoints using DECT ULE
    • Implementing authenticated encryption (CCM) for integrity + confidentiality

Related standards

  • Part of the DECT CI series (ETSI EN 300 175 family). For full system conformance combine this Part 7 security specification with the other EN 300 175 CI parts and relevant ETSI DECT system specifications.

Keywords: DECT security, DECT CI, authentication, CCM, DSAA2, DSC2, AES, DECT ULE, New Generation DECT, MAC layer encryption.

Standard
ETSI EN 300 175-7 V2.8.5 (2021-12) - Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features
English language
179 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ETSI EN 300 175-7 V2.9.1 (2022-03) - Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features
English language
179 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
EN 300 175-7 V2.9.1:2022
English language
179 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


Draft ETSI EN 300 175-7 V2.8.5 (2021-12)

EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT)
Common Interface (CI);
Part 7: Security features
2 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)

Reference
REN/DECT-00357
Keywords
authentication, DECT, IMT-2000, mobility, radio,
security, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© ETSI 2021.
All rights reserved.
ETSI
3 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)
Contents
Intellectual Property Rights . 10
Foreword . 10
Modal verbs terminology . 11
Introduction . 11
1 Scope . 15
2 References . 16
2.1 Normative references . 16
2.2 Informative references . 17
3 Definition of terms, symbols and abbreviations . 17
3.1 Terms . 17
3.2 Symbols . 18
3.3 Abbreviations . 18
4 Security architecture . 20
4.1 Background . 20
4.2 Security services . 20
4.2.1 Authentication of a PT . 20
4.2.2 Authentication of an FT . 20
4.2.3 Mutual authentication . 21
4.2.4 Data confidentiality. 21
4.2.5 User authentication . 21
4.3 Security mechanisms . 21
4.3.0 General . 21
4.3.1 Authentication of a PT (type 1 procedure) . 21
4.3.2 Authentication of an FT (type 1 procedure) . 23
4.3.3 Mutual authentication . 24
4.3.4 Data confidentiality. 24
4.3.4.0 General . 24
4.3.4.1 Derived Cipher Key (DCK) . 25
4.3.4.2 Static Cipher Key (SCK) . 25
4.3.4.3 Default Cipher Key (DefCK) . 25
4.3.5 User authentication . 25
4.3.6 Authentication of a PT (type 2 procedure) . 26
4.3.7 Authentication of a FT (type 2 procedure) . 28
4.4 Cryptographic parameters and keys . 30
4.4.1 Overview . 30
4.4.2 Cryptographic parameters . 31
4.4.2.0 Description of parameters . 31
4.4.2.1 Provisions related to the generation of random numbers . 33
4.4.3 Cryptographic keys . 33
4.4.3.0 General . 33
4.4.3.1 Authentication key K . 33
4.4.3.2 Authentication session keys KS and KS' . 34
4.4.3.3 Cipher key CK . 35
4.5 Security processes . 36
4.5.1 Overview . 36
4.5.2 Derivation of authentication key, K . 36
4.5.2.0 General . 36
4.5.2.1 K is derived from UAK . 36
4.5.2.2 K is derived from AC . 36
4.5.2.3 K is derived from UAK and UPI . 37
4.5.3 Authentication processes . 37
4.5.3.0 General . 37
4.5.3.1 Processes for the derivation of KS and KS' . 37
4.5.3.2 Processes for the derivation of DCK, RES1 and RES2 . 37
ETSI
4 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)
4.5.4 Key stream generation . 38
4.5.5 CCM Authenticated Encryption . 39
4.6 Combinations of security services . 39
4.6.0 Service combinations and related considerations . 39
4.6.1 Combinations of security algorithms . 40
4.6.1.0 General . 40
4.6.1.1 Limitations related to capering algorithms . 40
5 Algorithms for security processes . 40
5.1 Background . 40
5.1.0 General . 40
5.1.1 A algorithm . 41
5.1.1.0 A algorithm, general. 41
5.1.1.1 A algorithm, DSAA based (A-DSAA) . 41
5.1.1.2 A algorithm, DSAA2 based (A-DSAA2) . 41
5.1.1.3 A algorithm, proprietary . 42
5.2 Derivation of session authentication key(s) . 42
5.2.1 A11 process . 42
5.2.2 A21 process . 43
5.3 Authentication and cipher key generation processes . 43
5.3.1 A12 process . 43
5.3.2 A22 process . 44
5.4 CCM algorithm . 45
6 Integration of security . 45
6.1 Background . 45
6.2 Association of keys and identities . 45
6.2.1 Authentication key . 45
6.2.1.0 General . 45
6.2.1.1 K is derived from UAK . 45
6.2.1.2 K derived from AC. 46
6.2.1.3 K derived from UAK and UPI . 46
6.2.2 Cipher keys . 46
6.2.3 Cipher keys for CCM . 47
6.2.3.0 General . 47
6.2.3.1 Single use of the keys for CCM . 47
6.2.3.2 Cipher keys for CCM encryption of C/L multicast channels . 48
6.3 NWK layer procedures . 48
6.3.1 Background . 48
6.3.2 Authentication exchanges . 48
6.3.3 Authentication procedures . 50
6.3.3.1 Authentication of a PT type 1 procedure . 50
6.3.3.2 Authentication of an FT type 1 procedure . 50
6.3.3.3 Authentication of a PT type 2 procedure . 51
6.3.3.4 Authentication of an FT type 2 procedure . 51
6.3.4 Transfer of Cipher Key, CK. 52
6.3.5 Re-Keying . 52
6.3.6 Encryption with Default Cipher Key . 52
6.3.7 Transfer of Cipher Key CK for CCM . 52
6.3.7.0 General . 52
6.3.7.1 Transfer by Virtual Call setup CC procedure . 52
6.3.7.2 Transfer using MM procedures for CCM re-keying and sequence reset . 53
6.3.8 Transfer of Cipher Keys for CCM encryption of multicast channels . 53
6.3.8.1 General . 53
6.3.8.2 Multicast encryption parameter assignation procedure, FT initiated . 53
6.3.8.2.0 General . 53
6.3.8.2.1 Transport of the security parameters . 54
6.3.8.2.2 <> coding . 54
6.3.8.3 Multicast encryption parameter retrieval procedure, PT initiated . 54
6.3.8.3.0 General . 54
6.3.8.3.1 Transport of the security parameters . 55
6.3.8.3.2 <> coding . 55
ETSI
5 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)
6.3.8.4 Error cases . 55
6.3.8.4.1 FT initiated parameter assignation procedure - PT reject . 55
6.3.8.4.2 PT initiated parameter retrieval procedure - FT reject . 55
6.3.8.4.3 Coding of the {MM-INFO-REJECT} in the error cases . 56
6.3.9 Transfer of Cipher Keys to Wireless Relay Stations (WRS) . 56
6.3.9.1 General . 56
6.3.9.2 Security considerations . 56
6.3.9.3 Indication of cipher key FT initiated procedure . 56
6.3.9.4 Cipher key retrieval procedure. PT initiated . 57
6.3.9.5 Error cases . 59
6.3.9.5.1 PT initiated cipher key retrieval procedure - FT reject . 59
6.4 MAC layer procedures . 60
6.4.1 Background . 60
6.4.2 MAC layer field structure . 60
6.4.3 Data to be encrypted . 62
6.4.4 Encryption process . 62
6.4.5 Initialization and synchronization of the encryption process . 65
6.4.5.0 General . 65
6.4.5.1 Construction of CK . 65
6.4.5.2 The Initialization Vector (IV) . 65
6.4.5.3 Generation of two Key Stream segments . 65
6.4.6 Encryption mode control . 66
6.4.6.1 Background . 66
6.4.6.2 MAC layer messages. 66
6.4.6.3 Procedures for switching to encrypt mode . 66
6.4.6.3.1 General . 66
6.4.6.3.2 PT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.3 FT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.4 PT procedure for switching from clear to encrypt mode with a Default Cipher Key (DefCK) . 68
6.4.6.3.5 Error handling - poor link . 70
6.4.6.4 Procedures for switching to clear mode . 72
6.4.6.5 Procedures for re-keying . 73
6.4.6.5.1 Re-keying to a DCK . 73
6.4.6.5.2 Re-keying to a DefCK . 74
6.4.6.5.3 FT Indication of re-keying to a DefCK . 75
6.4.6.6 Insertion of WAIT . 76
6.4.7 Handover of the encryption process . 77
6.4.7.0 General . 77
6.4.7.1 Bearer handover, uninterrupted ciphering . 77
6.4.7.2 Connection handover, uninterrupted ciphering . 77
6.4.7.3 External handover - handover with ciphering . 78
6.4.8 Modifications for half and long slot specifications (2-level modulation) . 78
6.4.8.1 Background . 78
6.4.8.2 MAC layer field structure . 78
6.4.8.3 Data to be encrypted. 79
6.4.8.4 Encryption process . 79
6.4.8.5 Initialization and synchronization of the encryption process . 80
6.4.8.6 Encryption mode control . 80
6.4.8.7 Handover of the encryption process . 80
6.4.9 Modifications for double slot specifications (2-level modulation) . 80
6.4.9.1 Background . 80
6.4.9.2 MAC layer field structure . 80
6.4.9.3 Data to be encrypted. 81
6.4.9.4 Encryption process . 81
6.4.9.5 Initialization and synchronization of the encryption process . 82
6.4.9.6 Encryption mode control . 82
6.4.9.7 Handover of the encryption process . 82
6.4.10 Modifications for multi-bearer specifications . 83
6.4.11 Modifications for 4-level, 8-level, 16-level and 64-level modulation formats . 83
6.4.11.1 Background . 83
6.4.11.2 MAC layer field structure . 83
6.4.11.3 Data to be encrypted. 83
ETSI
6 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)
6.4.11.4 Encryption process . 84
6.4.11.4.0 General . 84
6.4.11.4.1 Encryption process for the A-field and for the unprotected format . 84
6.4.11.4.2 Encryption process for the single subfield protected format . 85
6.4.11.4.3 Encryption process for the multi-subfield protected format . 86
6.4.11.4.4 Encryption process for the constant-size-subfield protected format . 88
6.4.11.4.5 Encryption process for the encoded protected format (MAC service I ) . 88
PX
6.4.11.5 Initialization and synchronization of the encryption process . 90
6.4.11.6 Encryption mode control . 90
6.4.11.7 Handover of the encryption process . 90
6.4.12 Procedures for CCM re-keying and sequence reset . 90
6.5 Security attributes . 90
6.5.1 Background . 90
6.5.2 Authentication protocols . 91
6.5.2.0 General . 91
6.5.2.1 Authentication of a PT type 1 procedure . 91
6.5.2.2 Authentication of an FT type 1 procedure . 92
6.5.2.3 Authentication of a PT type 2 procedure . 93
6.5.2.4 Authentication of an FT type 2 procedure . 94
6.5.3 Confidentiality protocols . 95
6.5.4 Access-rights protocols . 97
6.5.5 Key numbering and storage . 98
6.5.5.0 General . 98
6.5.5.1 Authentication keys . 98
6.5.5.2 Cipher keys . 98
6.5.6 Key allocation . 99
6.5.6.1 Introduction . 99
6.5.6.2 UAK allocation (DSAA algorithm) . 100
6.5.6.3 UAK allocation (DSAA2 algorithm) . 101
6.6 DLC layer procedures . 101
6.6.1 Background . 101
6.6.2 CCM Authenticated Encryption . 102
6.6.2.0 CCM overview . 102
6.6.2.1 CCM operation . 102
6.6.2.2 Key management . 103
6.6.2.3 CCM Initialization Vector . 103
6.6.2.3.0 CCM Initialization Vector: overview . 103
6.6.2.3.1 CCM Initialization Vector: first byte . 103
6.6.2.3.2 CCM Initialization Vector: bytes 8-11 . 104
6.6.2.3.3 CCM Initialization Vector: bytes 12. 104
6.6.2.4 CCM Sequence Number . 104
6.6.2.5 CCM Start and Stop . 105
6.6.2.6 CCM Sequence resetting and re-keying . 105
6.6.2.7 CCM encryption for multicast channels . 105
6.6.2.7.0 General . 105
6.6.2.7.1 Applicable types of multicast channels and identifiers . 105
6.6.2.7.2 Process for encryption of multicast channels . 105
6.6.2.7.3 DLC service for encrypted multicast channels . 105
6.6.2.7.4 Encryption key for multicast channels . 105
6.6.2.7.5 CCM and DLC sequence numbers . 106
6.6.2.7.6 Initialization Vector for multicast channels . 106
6.6.2.7.7 Security provisions regarding the key . 107
6.6.2.8 CCM encryption for service channels . 107
6.6.2.8.0 General . 107
6.6.2.8.1 Initialization Vector for service channels . 108
6.7 Security meta-procedures . 108
6.7.1 General . 108
6.7.2 Re-keying . 108
6.7.2.1 Aim and strategy . 108
6.7.2.2 Re-keying procedure . 108
6.7.2.3 Re-keying procedure with Wireless Relay Stations (WRSs) . 109
ETSI
7 Draft ETSI EN 300 175-7 V2.8.5 (2021-12)
6.7.2.3.1 General . 109
6.7.2.3.2 Key aging model. 110
6.7.3 Early encryption . 110
6.7.3.1 Aim and strategy . 110
6.7.3.2 The Default Cipher Keys (DefCK) . 110
6.7.3.3 The Default Cipher Key Index . 111
6.7.3.4 Generation and refresh strategy. 111
6.7.3.5 Running the procedure . 111
6.7.3.6 Security considerations . 111
7 Use of security features . 112
7.1 Background . 112
7.2 Key management options . 112
7.2.1 Overview of security parameters relevant for key management . 112
7.2.2 Generation of authentication keys . 113
7.2.3 Initial distribution and installation of keys . 114
7.2.4 Use of keys within the fixed network . 115
7.2.4.0 Use of keys within the fixed network: general . 115
7.2.4.1 Use of keys within the fixed network: diagrams for authentication type 1 scenarios . 117
7.2.4.2 Use of keys within the fixed network: diagrams for authentication type 2 scenarios . 120
7.3 Confidentiality service with a Cordless Radio Fixed Part (CRFP). 122
7.3.1 General . 122
7.3.2 CRFP initialization of PT cipher key . 122
Annex A (informative): Security threats analysis . 123
A.1 Introduction . 123
A.2 Threat A - Impersonating a subscriber identity . 124
A.3 Threat B - Illegal use of a handset (PP) . 124
A.4 Threat C - Illegal use of a base station (FP) . 124
A.5 Threat D - Impersonation of a base station (FP) . 125
A.6 Threat E - Illegally obtaining user data and user related signalling information . 125
A.7 Conclusions and comments . 126
Annex B (informative): Security features and operating environments . 128
B.1 Introduction .
...


EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 7: Security features
2 ETSI EN 300 175-7 V2.9.1 (2022-03)

Reference
REN/DECT-00357
Keywords
authentication, DECT, IMT-2000, mobility, radio,
security, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© ETSI 2022.
All rights reserved.
ETSI
3 ETSI EN 300 175-7 V2.9.1 (2022-03)
Contents
Intellectual Property Rights . 10
Foreword . 10
Modal verbs terminology . 11
Introduction . 11
1 Scope . 15
2 References . 16
2.1 Normative references . 16
2.2 Informative references . 17
3 Definition of terms, symbols and abbreviations . 17
3.1 Terms . 17
3.2 Symbols . 18
3.3 Abbreviations . 18
4 Security architecture . 20
4.1 Background . 20
4.2 Security services . 20
4.2.1 Authentication of a PT . 20
4.2.2 Authentication of an FT . 20
4.2.3 Mutual authentication . 21
4.2.4 Data confidentiality. 21
4.2.5 User authentication . 21
4.3 Security mechanisms . 21
4.3.0 General . 21
4.3.1 Authentication of a PT (type 1 procedure) . 21
4.3.2 Authentication of an FT (type 1 procedure) . 23
4.3.3 Mutual authentication . 24
4.3.4 Data confidentiality. 24
4.3.4.0 General . 24
4.3.4.1 Derived Cipher Key (DCK) . 25
4.3.4.2 Static Cipher Key (SCK) . 25
4.3.4.3 Default Cipher Key (DefCK) . 25
4.3.5 User authentication . 25
4.3.6 Authentication of a PT (type 2 procedure) . 26
4.3.7 Authentication of a FT (type 2 procedure) . 28
4.4 Cryptographic parameters and keys . 30
4.4.1 Overview . 30
4.4.2 Cryptographic parameters . 31
4.4.2.0 Description of parameters . 31
4.4.2.1 Provisions related to the generation of random numbers . 33
4.4.3 Cryptographic keys . 33
4.4.3.0 General . 33
4.4.3.1 Authentication key K . 33
4.4.3.2 Authentication session keys KS and KS' . 34
4.4.3.3 Cipher key CK . 35
4.5 Security processes . 36
4.5.1 Overview . 36
4.5.2 Derivation of authentication key, K . 36
4.5.2.0 General . 36
4.5.2.1 K is derived from UAK . 36
4.5.2.2 K is derived from AC . 36
4.5.2.3 K is derived from UAK and UPI . 37
4.5.3 Authentication processes . 37
4.5.3.0 General . 37
4.5.3.1 Processes for the derivation of KS and KS' . 37
4.5.3.2 Processes for the derivation of DCK, RES1 and RES2 . 37
ETSI
4 ETSI EN 300 175-7 V2.9.1 (2022-03)
4.5.4 Key stream generation . 38
4.5.5 CCM Authenticated Encryption . 39
4.6 Combinations of security services . 39
4.6.0 Service combinations and related considerations . 39
4.6.1 Combinations of security algorithms . 40
4.6.1.0 General . 40
4.6.1.1 Limitations related to capering algorithms . 40
5 Algorithms for security processes . 40
5.1 Background . 40
5.1.0 General . 40
5.1.1 A algorithm . 41
5.1.1.0 A algorithm, general. 41
5.1.1.1 A algorithm, DSAA based (A-DSAA) . 41
5.1.1.2 A algorithm, DSAA2 based (A-DSAA2) . 41
5.1.1.3 A algorithm, proprietary . 42
5.2 Derivation of session authentication key(s) . 42
5.2.1 A11 process . 42
5.2.2 A21 process . 43
5.3 Authentication and cipher key generation processes . 43
5.3.1 A12 process . 43
5.3.2 A22 process . 44
5.4 CCM algorithm . 45
6 Integration of security . 45
6.1 Background . 45
6.2 Association of keys and identities . 45
6.2.1 Authentication key . 45
6.2.1.0 General . 45
6.2.1.1 K is derived from UAK . 45
6.2.1.2 K derived from AC. 46
6.2.1.3 K derived from UAK and UPI . 46
6.2.2 Cipher keys . 46
6.2.3 Cipher keys for CCM . 47
6.2.3.0 General . 47
6.2.3.1 Single use of the keys for CCM . 47
6.2.3.2 Cipher keys for CCM encryption of C/L multicast channels . 48
6.3 NWK layer procedures . 48
6.3.1 Background . 48
6.3.2 Authentication exchanges . 48
6.3.3 Authentication procedures . 50
6.3.3.1 Authentication of a PT type 1 procedure . 50
6.3.3.2 Authentication of an FT type 1 procedure . 50
6.3.3.3 Authentication of a PT type 2 procedure . 51
6.3.3.4 Authentication of an FT type 2 procedure . 51
6.3.4 Transfer of Cipher Key, CK. 52
6.3.5 Re-Keying . 52
6.3.6 Encryption with Default Cipher Key . 52
6.3.7 Transfer of Cipher Key CK for CCM . 52
6.3.7.0 General . 52
6.3.7.1 Transfer by Virtual Call setup CC procedure . 52
6.3.7.2 Transfer using MM procedures for CCM re-keying and sequence reset . 53
6.3.8 Transfer of Cipher Keys for CCM encryption of multicast channels . 53
6.3.8.1 General . 53
6.3.8.2 Multicast encryption parameter assignation procedure, FT initiated . 53
6.3.8.2.0 General . 53
6.3.8.2.1 Transport of the security parameters . 54
6.3.8.2.2 <> coding . 54
6.3.8.3 Multicast encryption parameter retrieval procedure, PT initiated . 54
6.3.8.3.0 General . 54
6.3.8.3.1 Transport of the security parameters . 55
6.3.8.3.2 <> coding . 55
ETSI
5 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.3.8.4 Error cases . 55
6.3.8.4.1 FT initiated parameter assignation procedure - PT reject . 55
6.3.8.4.2 PT initiated parameter retrieval procedure - FT reject . 55
6.3.8.4.3 Coding of the {MM-INFO-REJECT} in the error cases . 56
6.3.9 Transfer of Cipher Keys to Wireless Relay Stations (WRS) . 56
6.3.9.1 General . 56
6.3.9.2 Security considerations . 56
6.3.9.3 Indication of cipher key FT initiated procedure . 56
6.3.9.4 Cipher key retrieval procedure. PT initiated . 57
6.3.9.5 Error cases . 59
6.3.9.5.1 PT initiated cipher key retrieval procedure - FT reject . 59
6.4 MAC layer procedures . 60
6.4.1 Background . 60
6.4.2 MAC layer field structure . 60
6.4.3 Data to be encrypted . 62
6.4.4 Encryption process . 62
6.4.5 Initialization and synchronization of the encryption process . 65
6.4.5.0 General . 65
6.4.5.1 Construction of CK . 65
6.4.5.2 The Initialization Vector (IV) . 65
6.4.5.3 Generation of two Key Stream segments . 65
6.4.6 Encryption mode control . 66
6.4.6.1 Background . 66
6.4.6.2 MAC layer messages. 66
6.4.6.3 Procedures for switching to encrypt mode . 66
6.4.6.3.1 General . 66
6.4.6.3.2 PT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.3 FT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.4 PT procedure for switching from clear to encrypt mode with a Default Cipher Key (DefCK) . 68
6.4.6.3.5 Error handling - poor link . 70
6.4.6.4 Procedures for switching to clear mode . 72
6.4.6.5 Procedures for re-keying . 73
6.4.6.5.1 Re-keying to a DCK . 73
6.4.6.5.2 Re-keying to a DefCK . 74
6.4.6.5.3 FT Indication of re-keying to a DefCK . 75
6.4.6.6 Insertion of WAIT . 76
6.4.7 Handover of the encryption process . 77
6.4.7.0 General . 77
6.4.7.1 Bearer handover, uninterrupted ciphering . 77
6.4.7.2 Connection handover, uninterrupted ciphering . 77
6.4.7.3 External handover - handover with ciphering . 78
6.4.8 Modifications for half and long slot specifications (2-level modulation) . 78
6.4.8.1 Background . 78
6.4.8.2 MAC layer field structure . 78
6.4.8.3 Data to be encrypted. 79
6.4.8.4 Encryption process . 79
6.4.8.5 Initialization and synchronization of the encryption process . 80
6.4.8.6 Encryption mode control . 80
6.4.8.7 Handover of the encryption process . 80
6.4.9 Modifications for double slot specifications (2-level modulation) . 80
6.4.9.1 Background . 80
6.4.9.2 MAC layer field structure . 80
6.4.9.3 Data to be encrypted. 81
6.4.9.4 Encryption process . 81
6.4.9.5 Initialization and synchronization of the encryption process . 82
6.4.9.6 Encryption mode control . 82
6.4.9.7 Handover of the encryption process . 82
6.4.10 Modifications for multi-bearer specifications . 83
6.4.11 Modifications for 4-level, 8-level, 16-level and 64-level modulation formats . 83
6.4.11.1 Background . 83
6.4.11.2 MAC layer field structure . 83
6.4.11.3 Data to be encrypted. 83
ETSI
6 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.4.11.4 Encryption process . 84
6.4.11.4.0 General . 84
6.4.11.4.1 Encryption process for the A-field and for the unprotected format . 84
6.4.11.4.2 Encryption process for the single subfield protected format . 85
6.4.11.4.3 Encryption process for the multi-subfield protected format . 86
6.4.11.4.4 Encryption process for the constant-size-subfield protected format . 88
6.4.11.4.5 Encryption process for the encoded protected format (MAC service I ) . 88
PX
6.4.11.5 Initialization and synchronization of the encryption process . 90
6.4.11.6 Encryption mode control . 90
6.4.11.7 Handover of the encryption process . 90
6.4.12 Procedures for CCM re-keying and sequence reset . 90
6.5 Security attributes . 90
6.5.1 Background . 90
6.5.2 Authentication protocols . 91
6.5.2.0 General . 91
6.5.2.1 Authentication of a PT type 1 procedure . 91
6.5.2.2 Authentication of an FT type 1 procedure . 92
6.5.2.3 Authentication of a PT type 2 procedure . 93
6.5.2.4 Authentication of an FT type 2 procedure . 94
6.5.3 Confidentiality protocols . 95
6.5.4 Access-rights protocols . 97
6.5.5 Key numbering and storage . 98
6.5.5.0 General . 98
6.5.5.1 Authentication keys . 98
6.5.5.2 Cipher keys . 98
6.5.6 Key allocation . 99
6.5.6.1 Introduction . 99
6.5.6.2 UAK allocation (DSAA algorithm) . 100
6.5.6.3 UAK allocation (DSAA2 algorithm) . 101
6.6 DLC layer procedures . 101
6.6.1 Background . 101
6.6.2 CCM Authenticated Encryption . 102
6.6.2.0 CCM overview . 102
6.6.2.1 CCM operation . 102
6.6.2.2 Key management . 103
6.6.2.3 CCM Initialization Vector . 103
6.6.2.3.0 CCM Initialization Vector: overview . 103
6.6.2.3.1 CCM Initialization Vector: first byte . 103
6.6.2.3.2 CCM Initialization Vector: bytes 8-11 . 104
6.6.2.3.3 CCM Initialization Vector: bytes 12. 104
6.6.2.4 CCM Sequence Number . 104
6.6.2.5 CCM Start and Stop . 105
6.6.2.6 CCM Sequence resetting and re-keying . 105
6.6.2.7 CCM encryption for multicast channels . 105
6.6.2.7.0 General . 105
6.6.2.7.1 Applicable types of multicast channels and identifiers . 105
6.6.2.7.2 Process for encryption of multicast channels . 105
6.6.2.7.3 DLC service for encrypted multicast channels . 105
6.6.2.7.4 Encryption key for multicast channels . 105
6.6.2.7.5 CCM and DLC sequence numbers . 106
6.6.2.7.6 Initialization Vector for multicast channels . 106
6.6.2.7.7 Security provisions regarding the key . 107
6.6.2.8 CCM encryption for service channels . 107
6.6.2.8.0 General . 107
6.6.2.8.1 Initialization Vector for service channels . 108
6.7 Security meta-procedures . 108
6.7.1 General . 108
6.7.2 Re-keying . 108
6.7.2.1 Aim and strategy . 108
6.7.2.2 Re-keying procedure . 108
6.7.2.3 Re-keying procedure with Wireless Relay Stations (WRSs) . 109
ETSI
7 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.7.2.3.1 General . 109
6.7.2.3.2 Key aging model. 110
6.7.3 Early encryption . 110
6.7.3.1 Aim and strategy . 110
6.7.3.2 The Default Cipher Keys (DefCK) . 110
6.7.3.3 The Default Cipher Key Index . 111
6.7.3.4 Generation and refresh strategy. 111
6.7.3.5 Running the procedure . 111
6.7.3.6 Security considerations . 111
7 Use of security features . 112
7.1 Background . 112
7.2 Key management options . 112
7.2.1 Overview of security parameters relevant for key management . 112
7.2.2 Generation of authentication keys . 113
7.2.3 Initial distribution and installation of keys . 114
7.2.4 Use of keys within the fixed network . 115
7.2.4.0 Use of keys within the fixed network: general . 115
7.2.4.1 Use of keys within the fixed network: diagrams for authentication type 1 scenarios . 117
7.2.4.2 Use of keys within the fixed network: diagrams for authentication type 2 scenarios . 120
7.3 Confidentiality service with a Cordless Radio Fixed Part (CRFP). 122
7.3.1 General . 122
7.3.2 CRFP initialization of PT cipher key . 122
Annex A (informative): Security threats analysis . 123
A.1 Introduction . 123
A.2 Threat A - Impersonating a subscriber identity . 124
A.3 Threat B - Illegal use of a handset (PP) . 124
A.4 Threat C - Illegal use of a base station (FP) . 124
A.5 Threat D - Impersonation of a base station (FP) . 125
A.6 Threat E - Illegally obtaining user data and user related signalling information . 125
A.7 Conclusions and comments . 126
Annex B (informative): Security features and operating environm
...


SLOVENSKI STANDARD
01-maj-2022
Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 7.
del: Varnostne lastnosti
Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part
7: Security features
Ta slovenski standard je istoveten z: ETSI EN 300 175-7 V2.9.1 (2022-03)
ICS:
33.070.30 Digitalne izboljšane Digital Enhanced Cordless
brezvrvične telekomunikacije Telecommunications (DECT)
(DECT)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 7: Security features
2 ETSI EN 300 175-7 V2.9.1 (2022-03)

Reference
REN/DECT-00357
Keywords
authentication, DECT, IMT-2000, mobility, radio,
security, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© ETSI 2022.
All rights reserved.
ETSI
3 ETSI EN 300 175-7 V2.9.1 (2022-03)
Contents
Intellectual Property Rights . 10
Foreword . 10
Modal verbs terminology . 11
Introduction . 11
1 Scope . 15
2 References . 16
2.1 Normative references . 16
2.2 Informative references . 17
3 Definition of terms, symbols and abbreviations . 17
3.1 Terms . 17
3.2 Symbols . 18
3.3 Abbreviations . 18
4 Security architecture . 20
4.1 Background . 20
4.2 Security services . 20
4.2.1 Authentication of a PT . 20
4.2.2 Authentication of an FT . 20
4.2.3 Mutual authentication . 21
4.2.4 Data confidentiality. 21
4.2.5 User authentication . 21
4.3 Security mechanisms . 21
4.3.0 General . 21
4.3.1 Authentication of a PT (type 1 procedure) . 21
4.3.2 Authentication of an FT (type 1 procedure) . 23
4.3.3 Mutual authentication . 24
4.3.4 Data confidentiality. 24
4.3.4.0 General . 24
4.3.4.1 Derived Cipher Key (DCK) . 25
4.3.4.2 Static Cipher Key (SCK) . 25
4.3.4.3 Default Cipher Key (DefCK) . 25
4.3.5 User authentication . 25
4.3.6 Authentication of a PT (type 2 procedure) . 26
4.3.7 Authentication of a FT (type 2 procedure) . 28
4.4 Cryptographic parameters and keys . 30
4.4.1 Overview . 30
4.4.2 Cryptographic parameters . 31
4.4.2.0 Description of parameters . 31
4.4.2.1 Provisions related to the generation of random numbers . 33
4.4.3 Cryptographic keys . 33
4.4.3.0 General . 33
4.4.3.1 Authentication key K . 33
4.4.3.2 Authentication session keys KS and KS' . 34
4.4.3.3 Cipher key CK . 35
4.5 Security processes . 36
4.5.1 Overview . 36
4.5.2 Derivation of authentication key, K . 36
4.5.2.0 General . 36
4.5.2.1 K is derived from UAK . 36
4.5.2.2 K is derived from AC . 36
4.5.2.3 K is derived from UAK and UPI . 37
4.5.3 Authentication processes . 37
4.5.3.0 General . 37
4.5.3.1 Processes for the derivation of KS and KS' . 37
4.5.3.2 Processes for the derivation of DCK, RES1 and RES2 . 37
ETSI
4 ETSI EN 300 175-7 V2.9.1 (2022-03)
4.5.4 Key stream generation . 38
4.5.5 CCM Authenticated Encryption . 39
4.6 Combinations of security services . 39
4.6.0 Service combinations and related considerations . 39
4.6.1 Combinations of security algorithms . 40
4.6.1.0 General . 40
4.6.1.1 Limitations related to capering algorithms . 40
5 Algorithms for security processes . 40
5.1 Background . 40
5.1.0 General . 40
5.1.1 A algorithm . 41
5.1.1.0 A algorithm, general. 41
5.1.1.1 A algorithm, DSAA based (A-DSAA) . 41
5.1.1.2 A algorithm, DSAA2 based (A-DSAA2) . 41
5.1.1.3 A algorithm, proprietary . 42
5.2 Derivation of session authentication key(s) . 42
5.2.1 A11 process . 42
5.2.2 A21 process . 43
5.3 Authentication and cipher key generation processes . 43
5.3.1 A12 process . 43
5.3.2 A22 process . 44
5.4 CCM algorithm . 45
6 Integration of security . 45
6.1 Background . 45
6.2 Association of keys and identities . 45
6.2.1 Authentication key . 45
6.2.1.0 General . 45
6.2.1.1 K is derived from UAK . 45
6.2.1.2 K derived from AC. 46
6.2.1.3 K derived from UAK and UPI . 46
6.2.2 Cipher keys . 46
6.2.3 Cipher keys for CCM . 47
6.2.3.0 General . 47
6.2.3.1 Single use of the keys for CCM . 47
6.2.3.2 Cipher keys for CCM encryption of C/L multicast channels . 48
6.3 NWK layer procedures . 48
6.3.1 Background . 48
6.3.2 Authentication exchanges . 48
6.3.3 Authentication procedures . 50
6.3.3.1 Authentication of a PT type 1 procedure . 50
6.3.3.2 Authentication of an FT type 1 procedure . 50
6.3.3.3 Authentication of a PT type 2 procedure . 51
6.3.3.4 Authentication of an FT type 2 procedure . 51
6.3.4 Transfer of Cipher Key, CK. 52
6.3.5 Re-Keying . 52
6.3.6 Encryption with Default Cipher Key . 52
6.3.7 Transfer of Cipher Key CK for CCM . 52
6.3.7.0 General . 52
6.3.7.1 Transfer by Virtual Call setup CC procedure . 52
6.3.7.2 Transfer using MM procedures for CCM re-keying and sequence reset . 53
6.3.8 Transfer of Cipher Keys for CCM encryption of multicast channels . 53
6.3.8.1 General . 53
6.3.8.2 Multicast encryption parameter assignation procedure, FT initiated . 53
6.3.8.2.0 General . 53
6.3.8.2.1 Transport of the security parameters . 54
6.3.8.2.2 <> coding . 54
6.3.8.3 Multicast encryption parameter retrieval procedure, PT initiated . 54
6.3.8.3.0 General . 54
6.3.8.3.1 Transport of the security parameters . 55
6.3.8.3.2 <> coding . 55
ETSI
5 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.3.8.4 Error cases . 55
6.3.8.4.1 FT initiated parameter assignation procedure - PT reject . 55
6.3.8.4.2 PT initiated parameter retrieval procedure - FT reject . 55
6.3.8.4.3 Coding of the {MM-INFO-REJECT} in the error cases . 56
6.3.9 Transfer of Cipher Keys to Wireless Relay Stations (WRS) . 56
6.3.9.1 General . 56
6.3.9.2 Security considerations . 56
6.3.9.3 Indication of cipher key FT initiated procedure . 56
6.3.9.4 Cipher key retrieval procedure. PT initiated . 57
6.3.9.5 Error cases . 59
6.3.9.5.1 PT initiated cipher key retrieval procedure - FT reject . 59
6.4 MAC layer procedures . 60
6.4.1 Background . 60
6.4.2 MAC layer field structure . 60
6.4.3 Data to be encrypted . 62
6.4.4 Encryption process . 62
6.4.5 Initialization and synchronization of the encryption process . 65
6.4.5.0 General . 65
6.4.5.1 Construction of CK . 65
6.4.5.2 The Initialization Vector (IV) . 65
6.4.5.3 Generation of two Key Stream segments . 65
6.4.6 Encryption mode control . 66
6.4.6.1 Background . 66
6.4.6.2 MAC layer messages. 66
6.4.6.3 Procedures for switching to encrypt mode . 66
6.4.6.3.1 General . 66
6.4.6.3.2 PT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.3 FT procedure for switching from clear to encrypt mode with a DCK . 67
6.4.6.3.4 PT procedure for switching from clear to encrypt mode with a Default Cipher Key (DefCK) . 68
6.4.6.3.5 Error handling - poor link . 70
6.4.6.4 Procedures for switching to clear mode . 72
6.4.6.5 Procedures for re-keying . 73
6.4.6.5.1 Re-keying to a DCK . 73
6.4.6.5.2 Re-keying to a DefCK . 74
6.4.6.5.3 FT Indication of re-keying to a DefCK . 75
6.4.6.6 Insertion of WAIT . 76
6.4.7 Handover of the encryption process . 77
6.4.7.0 General . 77
6.4.7.1 Bearer handover, uninterrupted ciphering . 77
6.4.7.2 Connection handover, uninterrupted ciphering . 77
6.4.7.3 External handover - handover with ciphering . 78
6.4.8 Modifications for half and long slot specifications (2-level modulation) . 78
6.4.8.1 Background . 78
6.4.8.2 MAC layer field structure . 78
6.4.8.3 Data to be encrypted. 79
6.4.8.4 Encryption process . 79
6.4.8.5 Initialization and synchronization of the encryption process . 80
6.4.8.6 Encryption mode control . 80
6.4.8.7 Handover of the encryption process . 80
6.4.9 Modifications for double slot specifications (2-level modulation) . 80
6.4.9.1 Background . 80
6.4.9.2 MAC layer field structure . 80
6.4.9.3 Data to be encrypted. 81
6.4.9.4 Encryption process . 81
6.4.9.5 Initialization and synchronization of the encryption process . 82
6.4.9.6 Encryption mode control . 82
6.4.9.7 Handover of the encryption process . 82
6.4.10 Modifications for multi-bearer specifications . 83
6.4.11 Modifications for 4-level, 8-level, 16-level and 64-level modulation formats . 83
6.4.11.1 Background . 83
6.4.11.2 MAC layer field structure . 83
6.4.11.3 Data to be encrypted. 83
ETSI
6 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.4.11.4 Encryption process . 84
6.4.11.4.0 General . 84
6.4.11.4.1 Encryption process for the A-field and for the unprotected format . 84
6.4.11.4.2 Encryption process for the single subfield protected format . 85
6.4.11.4.3 Encryption process for the multi-subfield protected format . 86
6.4.11.4.4 Encryption process for the constant-size-subfield protected format . 88
6.4.11.4.5 Encryption process for the encoded protected format (MAC service I ) . 88
PX
6.4.11.5 Initialization and synchronization of the encryption process . 90
6.4.11.6 Encryption mode control . 90
6.4.11.7 Handover of the encryption process . 90
6.4.12 Procedures for CCM re-keying and sequence reset . 90
6.5 Security attributes . 90
6.5.1 Background . 90
6.5.2 Authentication protocols . 91
6.5.2.0 General . 91
6.5.2.1 Authentication of a PT type 1 procedure . 91
6.5.2.2 Authentication of an FT type 1 procedure . 92
6.5.2.3 Authentication of a PT type 2 procedure . 93
6.5.2.4 Authentication of an FT type 2 procedure . 94
6.5.3 Confidentiality protocols . 95
6.5.4 Access-rights protocols . 97
6.5.5 Key numbering and storage . 98
6.5.5.0 General . 98
6.5.5.1 Authentication keys . 98
6.5.5.2 Cipher keys . 98
6.5.6 Key allocation . 99
6.5.6.1 Introduction . 99
6.5.6.2 UAK allocation (DSAA algorithm) . 100
6.5.6.3 UAK allocation (DSAA2 algorithm) . 101
6.6 DLC layer procedures . 101
6.6.1 Background . 101
6.6.2 CCM Authenticated Encryption . 102
6.6.2.0 CCM overview . 102
6.6.2.1 CCM operation . 102
6.6.2.2 Key management . 103
6.6.2.3 CCM Initialization Vector . 103
6.6.2.3.0 CCM Initialization Vector: overview . 103
6.6.2.3.1 CCM Initialization Vector: first byte . 103
6.6.2.3.2 CCM Initialization Vector: bytes 8-11 . 104
6.6.2.3.3 CCM Initialization Vector: bytes 12. 104
6.6.2.4 CCM Sequence Number . 104
6.6.2.5 CCM Start and Stop . 105
6.6.2.6 CCM Sequence resetting and re-keying . 105
6.6.2.7 CCM encryption for multicast channels . 105
6.6.2.7.0 General . 105
6.6.2.7.1 Applicable types of multicast channels and identifiers . 105
6.6.2.7.2 Process for encryption of multicast channels . 105
6.6.2.7.3 DLC service for encrypted multicast channels . 105
6.6.2.7.4 Encryption key for multicast channels . 105
6.6.2.7.5 CCM and DLC sequence numbers . 106
6.6.2.7.6 Initialization Vector for multicast channels . 106
6.6.2.7.7 Security provisions regarding the key . 107
6.6.2.8 CCM encryption for service channels . 107
6.6.2.8.0 General . 107
6.6.2.8.1 Initialization Vector for service channels . 108
6.7 Security meta-procedures . 108
6.7.1 General . 108
6.7.2 Re-keying . 108
6.7.2.1 Aim and strategy . 108
6.7.2.2 Re-keying procedure . 108
6.7.2.3 Re-keying procedure with Wireless Relay Stations (WRSs) . 109
ETSI
7 ETSI EN 300 175-7 V2.9.1 (2022-03)
6.7.2.3.1 General . 109
6.7.2.3.2 Key aging model. 110
6.7.3 Early encryption . 110
6.7.3.1 Aim and strategy . 110
6.7.3.2 The Default Cipher Keys (DefCK) . 110
6.7.3.3 The Default Cipher Key Index . 111
6.7.3.4 Generation and refresh strategy. 111
6.7.3.5 Running the procedure . 111
6.7.3.6 Security considerations . 111
7 Use of security features . 112
7.1 Background . 112
7.2 Key management options . 112
7.2.1 Overview of security parameters relevant for key management . 112
7.2.2 Generation of authentication keys . 113
7.2.3 Initial distribution and installation of keys . 114
7.2.4 Use of keys within the fixed network . 115
7.2.4.0 Use of keys within the fixed network: general . 115
7.2.4.1 Use of keys within the fixed network: diagrams for authentication type 1 scenarios . 117
7.2.4.2 Use of keys within the fixed network: diagrams for authentication type 2 scenarios . 120
7.3 Confidentiality service with a Cordless Radio Fixed Part (CRFP). 122
7.3.1 General . 122
7.3.2 CRFP initialization of PT cipher key . 122
Annex A (informative): Security threats analysis . 123
A.1 Introduction .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

Frequently Asked Questions

ETSI EN 300 175-7 V2.9.1 (2022-03) is a standard published by the European Telecommunications Standards Institute (ETSI). Its full title is "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features". This standard covers: REN/DECT-00357

REN/DECT-00357

You can purchase ETSI EN 300 175-7 V2.9.1 (2022-03) directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ETSI standards.