Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.834
Word version: 16.1.0
1…
4…
4
Background
5
Identification of long term keys
6
USIM related key stores and key transport processes
7
Key issues
8
Evaluation Criteria
9
Solutions
10
Conclusions
$
Change History
4
Background
p. 9
5
Identification of long term keys
p. 10
5.1
Introduction
p. 10
5.2
K / Ki
p. 10
5.3
OP / Opc / TOP / TOPc
p. 11
5.4
OTA Keys
p. 11
6
USIM related key stores and key transport processes
p. 12
6.1
Introduction
p. 12
6.2
Potential Key Stores
p. 12
6.2.1
Personalisation centre
p. 12
6.2.2
eSIM provisioning elements
p. 12
6.2.3
Network operator provisioning system
p. 12
6.2.4
HSS / AuC
p. 13
6.2.5
USIM / SIM
p. 13
6.3
Example key transport interfaces
p. 13
7
Key issues
p. 13
7.1
Key Issue 1: individual subscription - K exposed
p. 13
7.1.1
Issue description
p. 13
7.1.2
Threat Description
p. 13
7.1.3
Potential Security requirements
p. 14
7.2
Key Issue 2: batch of subscriptions - K exposed
p. 14
7.2.1
Issue description
p. 14
7.2.2
Threat Description
p. 14
7.2.3
Security requirements
p. 15
7.3
Key Issue 3: LTK Derivation vs. LTK Transport
p. 15
7.3.1
Issue description
p. 15
7.3.2
Threat Description
p. 15
7.3.3
Security requirements
p. 15
8
Evaluation Criteria
p. 17
8.1
Overview
p. 17
8.2
Key Issues Addressed
p. 17
8.3
Impact on USIM and ISIM, types and releases
p. 17
8.4
Impact on USIM hardware and software
p. 17
8.5
Key exchange protocols and their transportation
p. 18
8.6
3GPP technologies supported
p. 18
8.7
Assessment of additional risks
p. 18
8.8
Lawful Interception impacts
p. 18
8.9
Impact on core and RAN networks
p. 18
8.10
Ease of implementation
p. 18
9
Solutions
p. 18
9.1
Solution #1: 'Replace the affected Profile on eUICC'
p. 18
9.1.1
Introduction
p. 18
9.1.2
Solution Description
p. 18
9.1.3
Solution Evaluation
p. 19
9.1.3.1
General evaluation
p. 19
9.1.3.2
Key Issues
p. 19
9.1.3.3
USIM and ISIM types applicable
p. 19
9.1.3.4
Potential hardware and software impacts
p. 19
9.1.3.5
Key exchange protocols and transportation
p. 19
9.1.3.6
3GPP technologies supported
p. 19
9.1.3.7
Assessment of additional risks
p. 19
9.1.3.8
Conclusion
p. 19
9.2
Solution #2: Pre-installed multiple key pairs
p. 20
9.2.1
Introduction
p. 20
9.2.2
Solution Description
p. 20
9.2.3
Solution Evaluation
p. 20
9.2.3.1
Key Issues
p. 20
9.2.3.2
USIM and ISIM types applicable
p. 21
9.2.3.3
Potential hardware and software impacts
p. 21
9.2.3.4
Key exchange protocols and transportation
p. 21
9.2.3.5
3GPP technologies supported
p. 21
9.2.3.6
Assessment of additional risks
p. 21
9.2.3.7
Conclusion
p. 21
9.3
Solution #3: Certificate based negotiation
p. 22
9.3.1
Introduction
p. 22
9.3.2
Solution Description
p. 22
9.3.3
Solution Evaluation
p. 23
9.3.3.1
Key Issues
p. 23
9.3.3.2
USIM and ISIM types applicable
p. 23
9.3.3.3
Potential hardware and software impacts
p. 23
9.3.3.4
Key exchange protocols and transportation
p. 23
9.3.3.5
3GPP technologies supported
p. 23
9.3.3.6
Assessment of additional risks
p. 23
9.3.3.7
Conclusion
p. 23
9.4
Solution #4: Diffe-Hellman based Key agreement
p. 23
9.4.1
Introduction
p. 23
9.4.2
Solution Description
p. 24
9.4.2.1
Solution overview
p. 24
9.4.2.2
Notes on statefulness at the HSS
p. 25
9.4.2.3
Proposed message flow
p. 26
9.4.2.4
Transport over new Signalling protocol (Solution 4a)
p. 26
9.4.2.5
Transport over USIM OTA protocol (Solution 4b)
p. 26
9.4.2.6
Transport over USSD protocol (Solution 4c)
p. 27
9.4.2.7
Transport over BEST protocol (Solution 4d)
p. 27
9.4.2.8
Transport over AUTHENTICATION protocol (Solution 4e)
p. 27
9.4.3
Solution Evaluation
p. 28
9.4.3.1
Key Issues
p. 28
9.4.3.2
USIM and ISIM types applicable
p. 28
9.4.3.3
Potential hardware and software impacts
p. 28
9.4.3.4
Key exchange protocols and transportation
p. 28
9.4.3.5
3GPP technologies supported
p. 29
9.4.3.6
Assessment of additional risks
p. 29
9.4.3.7
Conclusion
p. 29
9.5
Solution #5: Multiple sets of parameters
p. 29
9.5.1
Introduction
p. 29
9.5.2
Solution Description
p. 29
9.5.3
Solution Evaluation
p. 31
9.5.3.1
Key Issues
p. 31
9.5.3.2
UICC applications types applicable
p. 31
9.5.3.3
Potential hardware and software impacts
p. 31
9.5.3.4
Key exchange protocols and transportation
p. 31
9.5.3.5
3GPP technologies supported
p. 31
9.5.3.6
Assessment of additional risks
p. 31
9.5.3.7
Lawful interception impacts
p. 31
9.5.3.8
Core and RAN networks impacts
p. 31
9.5.3.9
Ease of implementation
p. 32
9.6
Solution #6: LTK generation
p. 32
9.6.1
Introduction
p. 32
9.6.2
Solution Description
p. 32
9.6.3
Solution Evaluation
p. 33
9.6.3.1
Key Issues
p. 33
9.6.3.2
USIM and ISIM types applicable
p. 33
9.6.3.3
Potential hardware and software impacts
p. 33
9.6.3.4
Key exchange protocols and transportation
p. 33
9.6.3.5
3GPP technologies supported
p. 33
9.6.3.6
Assessment of additional risks
p. 33
9.6.3.7
Conclusion
p. 33
10
Conclusions
p. 34
$
Change History
p. 35