CODESETSI algorithms & codes service assigns and manages codes for various technologies used in the communications industry to convey information about systems and equipment.
ETSI’s Centre for Testing and Interoperability (CTI) assigns and registers codes for ETSI Technical Committees without requiring a contract or payment.
| ALGORITHMSA security algorithm encrypts data using a mathematical procedure, encoding it so that a software key is required to decode it back into its original form. Encryption ensures effective and secure user authentication and is crucial for technology security. ETSI as Custodian:
Export Licence:
|
HOW TO ORDER AND PAY - Click here for more details
ORDER
1. First of all, CLICK on the PRODUCT you wish to order from this list:
- Non-public CODES
- Public CODES
- TETRA ALGORITHMS
- ALGORITHMS: GEA2 or GIA4 or GEA5/GIA5 or UEA1/UIA1
- A5/3 GEA3 algorithm
- A5/A GEA4 algorithm
- EEA3 & EIA3 algorithm (see note)
- UEA2 & UIA2 algorithm
NOTE: Customers must obtain a separate IPR Licence Agreement from DACAS China. In case of difficulties to register online for the free IPR licence for EEA3 & EIA3 algorithms, the temporary procedure to obtain the free IPR licence is for the Beneficiary (customer) to provide to DACAS a copy of their countersigned ETSI CRUU (Confidential Usage Undertaking form). Contact point is: Mrs Xiang Lu - zhuanlixuke@is.ac.cn.
2. From the drop down list (if any), SELECT the product you wish to order and the quantity (if relevant). 3. FILL IN all required details in the web form (company’s name, address, etc.). When moving the cursor over the fields, additional information is provided to help better understand what specific information is needed/requested.Please note that foreign and special characters are not allowed. Kindly ensure all content adheres to the approved English language.
4. SIGN the electronic form.
5. SEND the form.
6. An email will be automatically sent from Adobe Sign to CONFIRM your email address. If you do not receive this email, please check your junk or spam folder.
7. When the e-mail address has been confirmed, the ETSI Secretariat will automatically receive your order.
IMPORTANT
- Please note that completing the web form is essential to obtain the code or the algorithm, and is separate from the payment process. You will receive the contract only at the final stage, after it has been countersigned by an ETSI legal representative and the payment has been processed.
- If you require an invoice with your PO number, please send us this information as soon as possible in order to speed up the process. For a faster service, we recommend a payment via ETSI WEBstore (secured platform). Once the payment is received, the "web form" will be digitally countersigned by a duly authorized ETSI representative. You will then receive an e-mail from “Adobe Sign” with the contract (web form) containing the code(s) on the final page and the algorithms send via a secure platform.
PAYMENT
The administrative charge is 150€ for each code ordered and 2000€ for each algorithm ordered. Payment can be done with the following methods:
✓ by credit card: accepted through the designated payment service when the request is made online via the ETSI WEBstore;
✓ by wire transfer: to the bank account as designated in ETSI's invoice within thirty (30) days after issuing of the said invoice by ETSI.
Please contact us (algorithms@etsi.org) to obtain the proforma invoice.
Further details to place your order are available on PDF and detailed instructions on completing the web form and making the payment are available by watching this video.
For payment instructions only, watch this video, or access our online payment platform.
Codes [non-public - public]
Non-public and public codes
- Non-public codes Here are some characteristics and contexts where non-public codes might be used:
- Encryption: Encrypting and decrypting data to ensure only authorized access.
- Authentication: Verifying the identity of users or devices.
- Access Control: Granting or restricting access to resources or systems.
- Fraud Prevention: Detecting and preventing fraudulent activities in financial transactions and networks.
- Data Privacy: Ensuring the privacy and integrity of user data in telecommunications and online services.
- DECTTM EIC (Equipment Installer’s Code): EN 300 175-6.
- DECTTM EMC (Equipment Manufacturer Code): EN 300 175-6.
- DECTTM POC (Public Operator Code): EN 300 175 6.
- TETRATM TAC (Type Approval Code): EN 300 392-2.
- Public codes The list of public codes already assigned can be consulted here.
- DMR (Digital Mobile Radio) MFID: TS 102 361-1.
- TETRATM FAC (Final Assembly Code): EN 300 392-2.
- TTETRATM Location System Coding scheme (Equipment Manufacturer Code): EN 300 392-2.
- TETRATM proprietary AT command name family: TS 100 392 5.
- TETRATM proprietary element owner: EN 300 392-2.
- TETRATM SDS-TL protocol identifier: EN 300 392-2.
Non-public codes are crucial for maintaining the security and integrity of sensitive information and systems.
Information related to these codes can be found in the following specifications:
Information related to these codes can be found in the following specifications:
For further information, please contact Algorithms & codes service.
Protocol Naming and Numbering Service
ETSI’s Centre for Testing and Interoperability (CTI) assigns and registers ASN.1 object identifiers, protocol numbers, XML and URI namespaces, etc. for all ETSI Technical Bodies (TBs). ETSI CTI also allocates CNI codes for the broadcast industry.
Many protocols require the allocation of globally unique names or numbers in order to interoperate successfully. Ranges of names or numbers are often allocated to standards bodies in order to distribute the task of allocation, while still maintaining global uniqueness.
In addition, ETSI CTI can manage, on behalf of an ETSI TB, a request for a protocol name or number allocation from another issuing authority. For example, allocations of Network Management Parameters or allocations for Diameter, XCAP, H.248 protocols can be managed.
All details related to these codes can be found on the Protocol Naming and Numbering page on the ETSI Portal.
To request one of these codes, please contact CTI_Support@etsi.org.
TETRA algorithms
Please note that ETSI is NOT the Custodian for the TEA2 and TEA5 algorithms.
For further details, please contact TCCA at SFPG@TCCA.info.
Information related to TETRATM algorithms can be found in the following specifications:
3GPP cellular algorithms
ETSI is NOT the Custodian of EEA2 & EIA2 algorithms. Please consult the Advanced Encryption Standard (AES) NIST FIPS 197 for further details.
- The UEA1 & UIA1 algorithm specifications may be used only for the development and operation of 3GPP mobile communications and services.
- The UEA2 & UIA2 algorithm specifications may be used only for the development and operation of equipment conforming to the UEA2 and UIA2 algorithm or standards based on it.
Information about the 128-EEA1 & 128-EIA1 specifications is also available in the Design and evaluation report (3GPP TR 35.924).
- The EEA3 & EIA3 algorithm specifications may be used only for the development and operation of equipment conforming to the EEA3 and EIA3 algorithms or standards based on it. DACAS China holds essential patents on the ZUC algorithm, the stream cipher that forms the heart of 128-EEA3 and 128-EIA3.
Information related to UMTSTM and LTETM algorithms can be found in the following specifications:
UEA1 & UIA1:
- UEA1 and UIA1 algorithm specifications (3GPP TS 35.201)
- KASUMI algorithm specification (3GPP TS 35.202)
- Implementors’ test data (3GPP TS 35.203)
- Design conformance test data (3GPP TS 35.204)
- UEA2 & UIA2 specifications (3GPP TS 35.215)
- SNOW 3G specification (3GPP TS 35.216)
- Implementors’ test data (3GPP TS 35.217)
- Design conformance test data (3GPP TS 35.218)
- Design and evaluation report (3GPP TR 35.919)
- EEA3 & EIA3 specifications (3GPP TS 35.221)
- ZUC specification (3GPP TS 35.222)
- Implementors’ test data (3GPP TS 35.223)
- Design and evaluation report (3GPP TR 35.924)
MILENAGE
MILENAGE is an algorithm set for the UMTS, LTE and 5G authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*.
- Download the Milenage specification (3GPP TS 35.206).
TUAK
A more recently developed second algorithm set for UMTS, LTE and 5G authentication and key generation, based on the public KECCAK hash function family (which will also serve as the SHA-3 hash function standard).
- Download the algorithm specification (3GPP TS 35.231).
Old generation algorithms
- The DSAA (DECTTM Standard Authentication algorithm)
- The DSC (DECTTM standard cipher)
- TESA-7 (TE9 authentication algorithm)
- USA-4 (UPT authentication algorithm)
- HIPERLAN (High PERformance Local Area Network)
- GSM-CTS (Cordial)
- A5-GMR1 (Encryption Algorithm)
DVB CSA licences
The DVB CSA Scrambling Technology is licensed to manufacturers of scramblers, who will in turn sub-license to the purchasers of scramblers.
To license DVB algorithms please contact:
SISVEL - DVB CSA team dvbcsa@sisvel.com
SISVEL SpA
Via Sestriere, 100-10060 None Torinese (TO)
Italy