Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.401
System Architecture Evolution (SAE) –
Security Architecture

V19.0.0 (Wzip)2025/06  … p.
V18.3.0 (PDF)  2025/03  179 p.
V17.7.0  2025/03  179 p.
V16.4.0  2024/09  174 p.
V15.12.0  2024/09  166 p.
V14.6.0  2018/09  155 p.
V13.5.0  2016/12  152 p.
V12.16.0  2015/12  134 p.
V11.9.0  2015/12  123 p.
V10.7.0  2015/12  118 p.
V9.9.0  2015/12  107 p.
V8.8.0  2011/06  101 p.
Rapporteur:
Dr. Prasad, Anand
NEC Europe Ltd

EPS key hierarchy

essential Table of Contents for  TS 33.401  Word version:  18.3.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 4-1Overview of the security architecture
Figure 6.1.1-1Successful EPS AKA authentication
Figure 6.1.2-1Distribution of authentication data from HE to MME
Figure 6.1.3-1User identity query
Figure 6.1.4-1Distribution of IMSI and authentication data within one serving domain
Figure 6.2-1Key hierarchy in E-UTRAN
Figure 6.2-2Key distribution and key derivation scheme for EPS (in particular E-UTRAN) for network nodes.
Figure 6.2-3Key derivation scheme for EPS (in particular E-UTRAN) for the ME.
Figure 7.2.4.4-1NAS Security Mode Command procedure
Figure 7.2.4.5-1AS security setup
Figure 7.2.8.1-1Model for the handover key chaining
Figure 7.3.4-1User plane (UP) integrity protection activation mechanism
Figure 7.5-1eNB periodic local authentication procedure
Figure 9.2.2.1-1Handover from UTRAN to E-UTRAN
Figure 14.3.1-1SRVCC handover from UTRAN/GERAN to E-UTRAN. Key derivations in the Figure are only shown for UMTS subscribers.
Figure A.2-1Encoding of SN id as an octet string
Table A.7-1Algorithm type distinguishers
Figure B.1-1Ciphering of data
Figure B.2-1Derivation of MAC-I/NAS-MAC (or XMAC-I/XNAS-MAC)
Figure E.1.2-1Dual Connectivity architecture with an SeNB
Figure E.1.3-1Offload architecture for EN-DC
Figure E.2.3-1SeNB encryption/decryption activation
Figure E.2.4.2-1Addition to the Key Hierarchy for the SeNB
Figure E.3.3-1SgNB encryption/decryption and integrity protection activation
Figure E.3.4.2-1Addition to the Key Hierarchy for the SgNB
Figure G.1-1LWA architecture
Figure G.2.4.2-1S-KWT computation
Figure G.3-13GPP vendor specific EAP-LWA method
Figure H.1-1LTE-WLAN integration architecture using IPsec tunnelling
Figure H.1-2LTE-WLAN integration using IPsec tunnelling protocol stack
Figure H.4.1-1LWIP-PSK Derivation
Figure K.1-1IAB architecture when IAB-node is using EN-DC
Figure K.2-1Summary of authentication and authorization of IAB-nodes

Top