Authentication And Key Agreement (Aka)

Escrito por: Redacción    8 abril 2021     1 minuto

One of aka`s main advantages over CAVE-based authentication is: AKA, a mechanism that authenticates and distributes session keys on UMTS (Universal Mobile Telecommunications System) networks. AKA is a challenge-based mechanism that uses symmetrical cryptography. The AKA is typically run in an UMTS IP (ISIM) multimedia services identification module, an example of an application on a universal integrated circuit map (UICC). AKA is set in RFC 3310. AKA is not yet implanted in CDMA2000 networks, although it is probably used for IMS. In order to ensure interoperability with current devices and partner networks, it is likely that AKA support in CDMA networks and hands will be added to CAVE-based authentication. Authentication and Key Agreement (AKA) is a security protocol used on 3G networks. AKA is also used for the unique password compilation mechanism for Digest access authentication. AKA is a challenge-based mechanism that uses symmetrical cryptography. AKA is the basis of the 3G authentication mechanism, which is defined as the successor to CAVE-based authentication, and provides mutual authentication procedures for the Mobile Station (MS) and service system.

The successful execution of the AKA leads to the establishment of a security system (i.e. a security data set) between the SS and the service system, allowing the provision of a number of security services. For more information on roaming AKA, see CDG #138. MAP TIA-41 support for AKA was defined in TIA-945 (3GPP2 X.S0006), integrated into TIA-41 (3GPP2 X.S0004). An attack was reported against all AKA variants, including 5G.[1] AKA – Authentication and key agreement a.k.a. 3G Authentication, Enhanced Subscriber Authorization (ESA). Air interface support for AKA is included in all versions of CDMA2000 Rev C.


Comentarios cerrados