update on security and li activities in etsi
DESCRIPTION
GSC11/Joint(06)10. Update on Security and LI activities in ETSI. Charles Brookson OCG Security Chairman. Security work in ETSI. 3G and GSM (via www.3gpp.org ) DECT cordless phones TETRA – Public Service mobile NGN – Next Generation Networks in TISPAN7 - PowerPoint PPT PresentationTRANSCRIPT
Update on Security and LI activities in ETSI
Charles Brookson
OCG Security Chairman
SOURCE: Charles Brookson, OCG Security Chairman
TITLE: Update on Security activities in ETSI
AGENDA ITEM: Joint 4.3
CONTACT: Charles Brookson ([email protected])
GSC11/Joint(06)10
Security work in ETSI• 3G and GSM (via www.3gpp.org)• DECT cordless phones• TETRA – Public Service mobile• NGN – Next Generation Networks in TISPAN7
– based on 3GPP’s IMS-SIP (intrinsic resilience of IP networks)• Digital signatures• Emergency communications (see GSC11_Joint_07)• Lawful Interception (see GSC11_Joint_17)• Security workshop (January 2006, free!!)
– workshop review on www.etsi.org• White Paper: Security for ICT - the Work of ETSI (see
GSC11_Joint_18)
Algorithms
• ETSI is a world leader in creating cryptographic algorithms and protocols to prevent fraud and unauthorised access to ICT and broadcast networks, and to protect customers’ privacy
• ETSI algorithms include:– algorithms used to protect GPRS, GSM and 3GPP
communications• extremely robust in real-life situations
– Dual-Tone Multi-Frequency (DTMF) receiver algorithm for PBX and Central Office applications
• used around the world, outperforming all traditional solutions– Conditional Access for TV etc
ongoing work• Lawful Interception (see GSC11_Joint_17)
– service specific details for IP multimedia services intercept– considerations for CSP domain IP interception– service-specific details for IP delivery of PSTN/ISDN Services
interception– Technical Report on Stored Data Handover
• Smart cards– GSM SIM card standards for security, authentication etc– extended the USIM and UICC for 3G and other applications,
including access control to WLANs and for PC security functions • Electronic signatures
– supporting the development of a European electronic signature infrastructure