Well, as long as the documentation at
http://www.gsmworld.com/technicalprojects/wp-content/uploads/2012/04/snow3gspec.doc
is sufficient to do an actual implementation, it shouldn't be too hard to write
the
necessary code with a GPLv2+ compatible license - the actual spec is very short
(6 pages).
Ciao
Jörg
On Wed, Jan 15, 2014 at 03:32:43PM -0800, Guy Harris wrote:
>
> On Jan 15, 2014, at 3:17 PM, Pascal Quantin <[email protected]> wrote:
>
> > I don't know if it matters or not (as I'm not a lawyer and barely know
> > anything about GPLv2 requirements) but the algorithm source code is
> > available from here:
> > http://www.gsma.com/technicalprojects/fraud-security/security-algorithms
>
> ...under terms that probably aren't GPL compatible.
>
> 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
>
> ...
>
> Individuals or companies intending to implement and/or use the 128-EEA3 &
> 128-EIA3 Algorithms will be required to sign a Restricted Usage Undertaking
> with an appointed custodian, such as the GSM Association. Commercial
> implementors of the algorithms will need to demonstrate that they satisfy
> approval criteria specified in the Restricted Usage Undertaking and formal
> permission to use the algorithms will need to be obtained by way of signing
> the Restricted Usage Undertaking and paying the EUR4,000 administrative
> charges that applies to non-members of the GSMA.
>
> The 128-EEA3 & 128-EIA3 algorithms are based on the ZUC algorithm, for which
> the DCS Centre holds essential patents. Beneficiaries of the 128-EEA3 &
> 128-EIA3 algorithms must also be licensed by DACAS. DACAS grants royalty-free
> licenses under those patents under separate written license agreements and
> subject to other terms and conditions which are believed fair and
> commercially reasonable. DACAS reserves the right to refuse or withdraw the
> license to/from the parties that refuse to license, or claim unfair,
> unreasonable or discriminatory royalty rates for their essential IPR.
> Implementors can apply for the ZUC patent license here.
>
> ...
>
> Every Beneficiary must send to the GSM Association two signed paper copies of
> the Restricted Usage Undertaking – one copy will be countersigned and
> returned. Non-GSM Association members must also enclose the Administrative
> Charge of € 4,000.
>
> 3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2
> The GSMA , having cooperated in the development of the 3GPP Confidentiality
> and Integrity Algorithms UEA2 and UIA2 ("The UEA2 & UIA2 Algorithm"), has
> been granted distribution rights to the Algorithms that have been developed
> through the collaborative efforts of the 3GPP Organisational Partners.
>
> The UEA2 and UIA2 Algorithm specifications are available below and may be
> used only for the development and operation of equipment conforming to the
> UEA2 & UIA2 Algorithm or standards based on it. Every Beneficiary intending
> to implement and/or use the UEA2 & UIA2 Algorithm must sign a Restricted
> Usage Undertaking with a Custodian and demonstrate that they satisfy the
> approval criteria specified in the Restricted Usage Undertaking. A fee of
> EUR4,000 is chargeable to non-members of the GSMA wishing to implement
> and/or use the UEA2 and UIA2 Algorithm.
>
> ...
>
> Every Beneficiary must send to the GSM Association two signed paper copies of
> the Restricted Usage Undertaking – one copy will be countersigned and
> returned. Non-GSM Association members must also enclose the Administrative
> Charge of € 4,000.
> ___________________________________________________________________________
> Sent via: Wireshark-dev mailing list <[email protected]>
> Archives: http://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
> mailto:[email protected]?subject=unsubscribe
--
Joerg Mayer <[email protected]>
We are stuck with technology when what we really want is just stuff that
works. Some say that should read Microsoft instead of technology.
___________________________________________________________________________
Sent via: Wireshark-dev mailing list <[email protected]>
Archives: http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
mailto:[email protected]?subject=unsubscribe