Tech-invite   World Map
3GPP     Specs     Glossaries     UICC       IETF     RFCs     Groups     SIP     ABNFs       T+       Search     Home
Top        in Index        Prev        Next

draft-TR 33.834 (SA3)
Study on Long Term Key Update Procedures

|   ToC   |   3GPP‑Page   |   Help   |

V0.3.0 (Wzip)    2018/01    27 p.

Rapporteur:  Mr. Evans, Tim P.
See also:  –

The present document is a study on the remote update of 3GPP long term secret keys held in a SIM / USIM. It:
  • Identifies which Long Term Keys should be updatable within this proposed feature.
  • Identifies the 3GPP/non 3GPP elements that would be affected by the update of these keys.
  • Identifies the Key Issues relating to the updating of long term keys.
  • Identifies potential requirements for the updating of long term keys.
  • Identifies the applicability of Long Term Key Updating to GSM, UMTS, LTE and 5G and how the requirements may change across these technologies.
  • Identifies solutions for the updating of long term keys.
  • Evaluates solutions for the updating of long term keys.
  • Concludes on the best solutions(s) for the updating of long term keys.
  • Makes recommendations for further work.
This study will consider existing and new solutions that can be used for the update of 3GPP Long Term Keys. The management of subscriptions is out of scope for this document.


Here        Top


1 Scope    2 References    3 Definitions and abbreviations    3.1 Definitions    3.2 Abbreviations    4 Background    5 Identification of long term keys    5.1 Introduction    5.2 K / Ki    5.3 OP / Opc / TOP / TOPc    5.4 OTA Keys    6 USIM related key stores and key transport processes    6.1 Introduction    6.2 Potential Key Stores    6.3 Example key transport interfaces    7 Key issues    7.1 Key Issue 1: individual subscription - K exposed    7.2 Key Issue 2: batch of subscriptions - K exposed    7.3 Key Issue 3: LTK Derivation vs. LTK Transport    7.x Key Issue x: <Key Issue Title>    8 Evaluation Criteria    8.1 Overview    8.2 Key Issues Addressed    8.3 USIM and ISIM types addressed    8.4 Impact on USIM hardware and software    8.5 Key exchange protocols and their transportation    8.6 3GPP technologies supported    8.7 Assessment of additional risks    8.8 Lawful Interception impacts    8.9 Ease of implementation    9 Solutions    9.1 Solution #1: 'Replace the affected Profile on eUICC'    9.2 Solution #2: Pre-installed multiple key pairs    9.3 Solution #3: Certificate based negotiation    9.4 Solution #4: Diffe-Hellman based Key agreement    9.5 Solution #5: Extended USIM OTA process    9.6 Solution #6: In-line with authentication    9.x Solution #x: 'Title of solution'    10 Conclusions    A Review of relevant standardization efforts in other SDOs and industry associations    X Change history   


1   Scope   Word-p. 6
2   References
3   Definitions and abbreviations
4   Background
5   Identification of long term keys   Word-p. 8
6   USIM related key stores and key transport processes   Word-p. 10
7   Key issues      Up
8   Evaluation Criteria
9   Solutions
9.1   Solution #1: 'Replace the affected Profile on eUICC'
9.2   Solution #2: Pre-installed multiple key pairs
9.3   Solution #3: Certificate based negotiation   Word-p. 18
9.4   Solution #4: Diffe-Hellman based Key agreement   Word-p. 19
9.5   Solution #5: Extended USIM OTA process   Word-p. 24
9.6   Solution #6: In-line with authentication
9.x   Solution #x: 'Title of solution'   Word-p. 25
10   Conclusions
A   Review of relevant standardization efforts in other SDOs and industry associations
X   Change history   Word-p. 27

Up        Top