In this paper, we present constructions for 3GPP Authentication and Key Agreement (AKA) that provides Perfect Forward Secrecy for the session key. Further, the constructs prevents an attacker, with access to the long-term pre-shared key, from simply eavesdropping the challenge RAND in the AKA run, and use the RAND and long-term pre-shared key to derive the session key.

We focus on making it possible to re-use large portions of the current structure of 3GPP interfaces and functions, with the rationale that this will make the constructions more likely to be adopted by the industry. In particular, the constructions maintain the interface between the Universal Subscriber Identification Module (USIM) and the mobile terminal intact. As a consequence, there is no need to roll out new credentials to existing subscribers.

Full abstract in IEEE Xplore, DOI:10.1109/CLOUD.2015.82


Jari Arkko, Karl Norrman, Mats Näslund, Bengt Sahlin

Download paper

Presented 21 August 2015 at the International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.