The present document specifies the security architecture, i.e., the security features and the security mechanisms for the 5G System and the 5G Core, and the security procedures performed within the 5G System including the 5G Core and the 5G New Radio.
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
For a specific reference, subsequent revisions do not apply.
For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012) - IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
5G security context:
The state that is established locally at the UE and a serving network domain and represented by the "5G security context data" stored at the UE and a serving network.
5G AS security context for 3GPP access:
The cryptographic keys at AS level with their identifiers, the Next Hop parameter (NH), the Next Hop Chaining Counter parameter (NCC) used for next hop access key derivation, the identifiers of the selected AS level cryptographic algorithms, the UE security capabilities, and the UP Security Policy at the network side, UP security activation status and the counters used for replay protection.
5G AS security context for non-3GPP access:
The key KN3IWF, the cryptographic keys, cryptographic algorithms and tunnel security association parameters used at IPsec layer for the protection of IPsec SA.
5G AS Secondary Cell security context:
The cryptographic keys at AS level for secondary cell with their identifiers, the identifier of the selected AS level cryptographic algorithms for secondary cell, the UP Security Policy at the network side, and counters used for replay protection.
5G Home Environment Authentication Vector:
authentication data consisting of RAND, AUTN, XRES*, and KAUSF for the purpose of authenticating the UE using 5G AKA.
5G Authentication Vector:
authentication data consisting of RAND, AUTN, HXRES*, and KSEAF.
5G NAS security context:
The key KAMF with the associated key set identifier, the UE security capabilities, the uplink and downlink NAS COUNT values.
5G Serving Environment Authentication Vector:
a vector consisting of RAND, AUTN and HXRES*.
ABBA parameter:
Parameter that provides antibidding down protection of security features against security features introduced in higher release to a lower release and indicates the security features that are enabled in the current network.
activation of security context:
The process of taking a security context into use.
anchor key:
The security key KSEAF provided during authentication and used for derivation of subsequent security keys.
application Layer Security:
mechanism by which HTTP messages, exchanged between a Network Function in one PLMN and a Network Function in another PLMN, are protected on the N32-f interface between the two SEPPs in the two PLMNs.
authentication data:
An authentication vector or transformed authentication vector.
authentication vector:
A vector consisting of CK, IK, RAND, AUTN, and XRES.
backward security:
The property that for an entity with knowledge of Kn, it is computationally infeasible to compute any previous Kn-m (m>0) from which Kn is derived.
The fulfilment of the property that for an entity with knowledge of Km that is used between that entity and a second entity, it is computationally infeasible to predict any future Km+n (n>0) used between a third entity and the second entity.
full native 5G security context:
A native 5G security context for which the 5G NAS security context is full according to the above definition.
Home Network Identifier:
An identifier identifying the home network of the subscriber.
Home Network Public Key Identifier:
An identifier used to indicate which public/private key pair is used for SUPI protection and de-concealment of the SUCI.
A native 5G security context that is not the current one.
Operator Group Roaming Hub:
Roaming hub used by a group of network operators that reside in the same security domain to consolidate and secure operator group roaming.
partial native 5G security context:
A partial native 5G security context consists of KAMF with the associated key set identifier, the UE security capabilities, and the uplink and downlink NAS COUNT values, which are initially set to zero before the first NAS SMC procedure for this security context.
producer's RI (pRI):
RI with a business relationship with the pSEPP operator.
producer's NRF (pNRF):
The NRF where the service producer NF is registered in the PLMN where the service producer NF is located.
producer's PLMN (pPLMN):
The PLMN where the service producer NF is located.
producer's SEPP (pSEPP):
The SEPP residing in the PLMN where the service producer NF is located.
Protection Scheme Identifier:
An identifier identifying a protection scheme that is used for concealing the SUPI.
A type of Roaming Intermediary that provides a set of services to client PLMNs to facilitate the deployment and the operation of roaming and interworking services; as defined by GSMA.
Roaming Intermediary:
an entity that provides roaming related services.
Routing Indicator:
An indicator defined in TS 23.003 that can be used for AUSF or UDM selection.
Scheme Output:
the output of a public key protection scheme used for SUPI protection.
security anchor function:
The function SEAF that serves in the serving network as the anchor for security in 5G.
The set of values in the USIM and in the home operator's network, consisting of at least the long-term key(s) and the subscription identifier SUPI, used to uniquely identify a subscription and to mutually authenticate the UE and 5G core network.
subscription identifier:
The SUbscription Permanent Identifier (SUPI).
subscription concealed identifier:
A one-time use subscription identifier, called the SUbscription Concealed Identifier (SUCI), which contains the Scheme-Output, and additional non-concealed information needed for home network routing and protection scheme usage.
subscription identifier de-concealing function:
The Subscription Identifier De-concealing Function (SIDF) service offered by the network function UDM in the home network of the subscriber responsible for de-concealing the SUPI from the SUCI.
transformed authentication vector:
an authentication vector where CK and IK have been replaced with CK' and IK'.
UE 5G security capability:
The UE security capabilities for 5G AS and 5G NAS.
UE security capabilities:
The set of identifiers corresponding to the ciphering and integrity algorithms implemented in the UE.
For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
5GC
5G Core Network
5G-AN
5G Access Network
5G-RG
5G Residential Gateway
NG-RAN
5G Radio Access Network
5G AV
5G Authentication Vector
5G HE AV
5G Home Environment Authentication Vector
5G NSWO
5G Non-Seamless WLAN Offload
5G SE AV
5G Serving Environment Authentication Vector
ABBA
Anti-Bidding down Between Architectures
AEAD
Authenticated Encryption with Associated Data
AES
Advanced Encryption Standard
AKA
Authentication and Key Agreement
AMF
Access and Mobility Management Function
AMF
Authentication Management Field
ARPF
Authentication credential Repository and Processing Function