1 / 8

ETSI Security activities

Source: ETSI GTSC-1 Agenda item 7.1.6 For: Information. GSC-8 060. ETSI Security activities. Charles Brookson Chairman OCG Security. Security activities. ETSI has, since inception, has taken the lead in setting security standards.

varen
Download Presentation

ETSI Security activities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Source: ETSI GTSC-1 Agenda item 7.1.6 For: Information GSC-8 060 ETSI Security activities Charles Brookson Chairman OCG Security

  2. Security activities • ETSI has, since inception, has taken the lead in setting security standards. • Started GSM, which included authentication, anonymity and customer privacy. • The first full worldwide deployment of encryption and smart cards. • Other security standards include DECT, Video standards, Multimedia IP such as TIPHON, and subsequent mobile and fixed services GTSC#1- April 2003, OTTAWA

  3. Security working methods ETSI Board External bodies EC 3GPP OMA etc ETSI OCG Security is co-ordinated for new issues by email discussion group ETSI working groups GTSC#1- April 2003, OTTAWA

  4. Lawful interception • ETSI LI is defining overall standards to cover the delivery of intercepted material in the Technical Committee LI • Each individual technology contributes towards the delivery specification • Standards supporting LI include Mobile, Internet. GTSC#1- April 2003, OTTAWA

  5. Algorithms ETSI SAGE • ETSI SAGE has developed algorithms to meet the requirements of ETSI work groups. • Recent work has been to produce algorithms for • 3GPP (Kasumi and Milenage), • new security to improve GSM (A5/3, G Milenage) and GPRS (GEA3). • SAGE also continuously reviews the published literature to ensure that existing algorithms withstand new types of attack. GTSC#1- April 2003, OTTAWA

  6. Electronic Signatures and Infrastructures • To meet the requirements of business and commerce. • By providing a secure framework • Supporting the Digital Signatures Directive within Europe. • Provides standards for an open environment. • Influence early developments. GTSC#1- April 2003, OTTAWA

  7. Mobile security • 3G continues in new areas such as Digital Rights Management, Wireless LANs and security within and between networks. • TETRA is now a mature standard, as is GSM for the Railways (GSM-R). • Smart card work continues within the Smart Card Platform group, which is defining the UICC platform for 3GPP and 3GPP2, and the card application toolkit. GTSC#1- April 2003, OTTAWA

  8. The future challenges • Convergence of conventional switched telephony and IP solutions. • Terminal devices are also becoming smarter, opening the possibility of attack • We are noticing an increase in legislation worldwide, driven by security concerns over the last two years. GTSC#1- April 2003, OTTAWA

More Related