Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.846  Word version:  17.0.0

Top   Top   Up   Prev   None
1…   5…   6…

 

6  Solutionsp. 14

6.0  Mapping of solutions to key issuesp. 14

6.1  Solutions for anchor keys securityp. 14

6.1.0  Generalp. 14

6.2  Solutions for resilience against identifier linkabilityp. 15

6.2.1  Solution #2.1: Handling of Sync failure and MAC failure by AUTS/random number encryption and failure codep. 15

6.2.2  Solution #2.2: Encryption of authentication failure message types by UE with new keys derived from K_AUSFp. 17

6.2.3  Solution #2.3: Unified authentication response message by UEp. 19

6.2.4  Solution #2.4: MAC-S based solutionp. 21

6.2.5  Solution #2.5: Encryption of authentication failure message with SUCI methodp. 24

6.2.6  Solution #2.6: Certificate based encryption of unicast NAS messagesp. 26

6.2.7  Solution #2.7: Mitigation against the SUCI replay attackp. 29

6.2.8  Solution #2.8: Assuring SUCI generation by Legitimate SUPI owner using KSUCIp. 32

6.2.9  Solution #2.9: MAC, SYNCH failure cause concealmentp. 33

6.2.10  Solution to Key Issue #2.2: SUCI replay.p. 35

6.2.11  Solution #2.11: Mitigate the SUCI replay based on UE's public keyp. 38

6.2.12  Solution #2.12: Adding randomness on both sides to mitigate all replay-attacks and assuring SUCI generation by legitimate entity using MAC calculation on secret keyp. 39

6.3  Solutions for availability aspects of SUCI usagep. 41

6.4  Solutions on re-synchronisation in AKAp. 46

6.4.1  Solution #4.1: Using MACS as freshness in the calculation of AKp. 46

6.4.2  Solution #4.2: Using symmetric encryption function to protect SQN during a re-synchronisation procedure in AKAp. 47

6.4.3  Solution #4.3: SQN protection by concealment with SUPI in USIMp. 48

6.4.4  Solution #4.4: SQN protection during re-synchronisation procedure in AKAp. 55

6.4.5  Solution #4.5: AUTS SQNMS solution for 5GSp. 57

6.4.6  Solution #4.6: Using time-based or partly time-based SQN generationp. 59

6.4.7  Solution #4.7: SQN protection by concealment with SUPI with f5*p. 59

7  Conclusionsp. 61

$  Change historyp. 64


Up   Top