Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.846
Word version: 17.0.0
1…
5…
6…
5
Key issues
5
Key issues
p. 9
5.1
Key issues on anchor keys security
p. 9
5.1.0
General
p. 9
5.2
Key issues on resilience against identifier linkability
p. 9
5.2.1
Key Issue #2.1: Linkability by distinguishing MAC failure and synchronization failure
p. 9
5.2.1.1
Issue details
p. 9
5.2.1.2
Security Threats
p. 10
5.2.1.3
Potential security requirements
p. 10
5.2.2
Key Issue #2.2: SUCI based attacks
p. 10
5.2.2.1
Key issue details
p. 10
5.2.2.1.0
General
p. 10
5.2.2.1.1
Linkability attack
p. 10
5.2.2.1.1.1
Linkability by SUCI replay
p. 10
5.2.2.1.1.2
Linkability by generation of different SUCIs
p. 11
5.2.2.1.2
DoS attack
p. 11
5.2.2.2
Potential threats
p. 11
5.2.2.2.1
Linkability attack
p. 11
5.2.2.2.2
DoS attack
p. 12
5.2.2.3
Potential security requirements
p. 12
5.3
Key issues on availability aspects of SUCI usage
p. 12
5.3.1
Key Issue #3.1: Attack due to expired authentication result in the UDM
p. 12
5.3.1.1
Key issue details
p. 12
5.3.1.2
Security threats
p. 12
5.3.1.3
Potential security requirements
p. 12
5.3.2
Key Issue #3.2: SUPI guessing attacks
p. 12
5.3.2.1
Key issue details
p. 12
5.3.2.2
Security threats
p. 13
5.3.2.3
Potential security requirements
p. 13
5.4
Key issues on re-synchronisation in AKA
p. 13
5.4.1
Key Issue #4.1: Protection of SQN during AKA re-synchronisations
p. 13
5.4.1.1
Key issue details
p. 13
5.4.1.2
Security threats
p. 13
5.4.1.3
Potential security requirements
p. 13