P218703
ADt 001 M
B
© 2021 « Any reproduction of this document whether total or partial without the written consent of ACTIA Automotive is forbidden”
Page 36 sur 37
XI
EXPORT CONTROL
TGU-R includes cryptographic functionalities for:
-
Authentication
-
Integrity
-
Confidentiality
-
Signature
List of cryptographic algorithms:
NAD modules: All below NAD algorithms are standard algorithms used for protection of mobile network communication
and they are only used for this purpose.
Algorithm
Key size
Function/Used in
A3
128
GSM
A8
128
GSM
A5-1
64
GSM Circuit Switched Ciphering Algorithms
A5-3
128
GSM EDGE Circuit Switched Ciphering Algorithms
GEA1
64
GPRS/GEA Ciphering Algorithms
GEA2
64
GPRS/GEA Ciphering Algorithms
GEA3
128
GPRS/GEA Ciphering Algorithms
UEA1
128
UTMS ciphering algorithm
UIA1
128
UTMS Integrity protection algorithms
AKA SHA-1
128
UMTS Authentication and Key Agreement
EEA1
128
LTE ciphering algorithms
EIA1
128
LTE Integrity protection algorithms
EEA2
128
LTE ciphering algorithms
EIA2
128
LTE Integrity protection algorithms
EEA3
128
LTE ciphering algorithms
EIA3
128
LTE Integrity protection algorithms
WLAN module:
In the WLAN module the following cryptographic algorithms are available:
Algorithm
Key size
Function/Used in
WEP
64 & 128
WiFi
WPA-PSK
128
WiFi
WPA2-PSK
128
WiFi
WPA2-Enterprise (AES/CCMP)
128
WiFi
E0
128
Bluetooth
AES-CCM
128
Bluetooth
These algorithms are the standard protection for WiFi & Bluetooth, they are only used for this purpose.
Other keys available for customer applications usage:
Algorithm
Key size
Function/Used in
AES
128
Authentication, signature of distant customer server
RSA
1024
Customer data exchange protection
AES
256
CPU – bootloader Authentication
RSA
4096
CPU – bootloader Authentication