-The process start with an AUTHENTICATION REQUEST
message, composed by an authentication challenge RAND,
AUTN parameter to verify the freshness of the key material
besides of serving network authenticity, and KSIASME, a
value used by the mobile equipment to generate the same key
value for KASME.
-Once the ME receives the message, it retrieves the
KSIASME parameter and passes the other ones to the
Universal Subscriber Identity Module (USIM). USIM verifies
the freshness of the authentication vector, deriving the
sequence number from the AUTN parameter. If the derived
value match with the expected sequence, a challenge response
RES is computed and send back to the UE. Then, two keys
are derived from the master key K, one for integrity (IK) and
another for confidentiality (CK).
-An AUTHENTICATION RESPONSE is sent back to the
MME, generating on it the same key pairs CK/IK and completing
the AKA process. Now, both extremes are able to generate
the same key material, following the scheme of figure 4.
-Each time an AKA process is called, key material is regenerated
based on the new value of KASME. Master key
K is securely stored in the HSS and IMSI, without being
-The process start with an AUTHENTICATION REQUEST
message, composed by an authentication challenge RAND,
AUTN parameter to verify the freshness of the key material
besides of serving network authenticity, and KSIASME, a
value used by the mobile equipment to generate the same key
value for KASME.
-Once the ME receives the message, it retrieves the
KSIASME parameter and passes the other ones to the
Universal Subscriber Identity Module (USIM). USIM verifies
the freshness of the authentication vector, deriving the
sequence number from the AUTN parameter. If the derived
value match with the expected sequence, a challenge response
RES is computed and send back to the UE. Then, two keys
are derived from the master key K, one for integrity (IK) and
another for confidentiality (CK).
-An AUTHENTICATION RESPONSE is sent back to the
MME, generating on it the same key pairs CK/IK and completing
the AKA process. Now, both extremes are able to generate
the same key material, following the scheme of figure 4.
-Each time an AKA process is called, key material is regenerated
based on the new value of KASME. Master key
K is securely stored in the HSS and IMSI, without being
การแปล กรุณารอสักครู่..
