Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2
安全算法专家组(SAGE);TETRA标准加密算法的管理规则;第2部分:TEA2
The purpose of the present document is to specify the rules for the management of the TETRA standard encryption
algorithm TEA2. This algorithm is intended for air interface encryption in TETRA products.The specification for TEA2 consists of the following three parts:Part 1: Algorithm specification;Part 2: Design conformance test data;Part 3: Algorithm input/output test data.The procedures described in the present document apply to parts 1 and 2 of the specifications. The parts 1 and 2 are
confidential.Part 3 of each of the specifications is not confidential and can be obtained directly from the TEA2 Custodian
(see clause 6.5). There are no restrictions on the distribution of this part of the specifications.The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the
management of TEA2 (ETSI, ETSI Technical Committee TETRA, TEA2 Custodian and approved recipients) together
with the relationships and interactions between them.Clause 5 is concerned with the rules for the use of TEA2. This clause is supplemented by clause E in which the states
and territories are listed in which a User can become an approved recipient.The procedures for delivering TEA2 to approved recipients are defined in clause 6. This clause is supplemented by
clause A that specifies the items that are to be delivered.Clause 7 is concerned with the criteria for approving an organization for receipt of TEA2 deliverables and with the
responsibilities of an approved recipient. This clause is supplemented by annexes B, C, CA and D which contain a
Confidentiality and Restricted Usage Undertaking to be signed by each approved recipient Manufacturer, User and
Third Party Supplier.Clause 8 is concerned with the appointment and responsibilities of the TEA2 Custodian.