update on security and li activities in etsi

4
Update on Security and LI activities in ETSI Charles Brookson OCG Security Chairman SOURCE: Charles Brookson, OCG Security Chairman TITLE: Update on Security activities in ETSI AGENDA ITEM: Joint 4.3 CONTACT: Charles Brookson ([email protected]) GSC11/ Joint(06)10

Upload: oneida

Post on 06-Jan-2016

22 views

Category:

Documents


0 download

DESCRIPTION

GSC11/Joint(06)10. Update on Security and LI activities in ETSI. Charles Brookson OCG Security Chairman. Security work in ETSI. 3G and GSM (via www.3gpp.org ) DECT cordless phones TETRA – Public Service mobile NGN – Next Generation Networks in TISPAN7 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Update on Security and LI activities in ETSI

Update on Security and LI activities in ETSI

Charles Brookson

OCG Security Chairman

SOURCE: Charles Brookson, OCG Security Chairman

TITLE: Update on Security activities in ETSI

AGENDA ITEM: Joint 4.3

CONTACT: Charles Brookson ([email protected])

GSC11/Joint(06)10

Page 2: Update on Security and LI activities in ETSI

Security work in ETSI• 3G and GSM (via www.3gpp.org)• DECT cordless phones• TETRA – Public Service mobile• NGN – Next Generation Networks in TISPAN7

– based on 3GPP’s IMS-SIP (intrinsic resilience of IP networks)• Digital signatures• Emergency communications (see GSC11_Joint_07)• Lawful Interception (see GSC11_Joint_17)• Security workshop (January 2006, free!!)

– workshop review on www.etsi.org• White Paper: Security for ICT - the Work of ETSI (see

GSC11_Joint_18)

Page 3: Update on Security and LI activities in ETSI

Algorithms

• ETSI is a world leader in creating cryptographic algorithms and protocols to prevent fraud and unauthorised access to ICT and broadcast networks, and to protect customers’ privacy

• ETSI algorithms include:– algorithms used to protect GPRS, GSM and 3GPP

communications• extremely robust in real-life situations

– Dual-Tone Multi-Frequency (DTMF) receiver algorithm for PBX and Central Office applications

• used around the world, outperforming all traditional solutions– Conditional Access for TV etc

Page 4: Update on Security and LI activities in ETSI

ongoing work• Lawful Interception (see GSC11_Joint_17)

– service specific details for IP multimedia services intercept– considerations for CSP domain IP interception– service-specific details for IP delivery of PSTN/ISDN Services

interception– Technical Report on Stored Data Handover

• Smart cards– GSM SIM card standards for security, authentication etc– extended the USIM and UICC for 3G and other applications,

including access control to WLANs and for PC security functions • Electronic signatures

– supporting the development of a European electronic signature infrastructure