5G Security

5G Security

Secure Storage, Management & Processing of Subscription Credentials in 5G networks

Security is a driving factor in how 5G networks are built and operated - every element of a 5G network is required to have security controls in place for the purpose of delivering confidentiality, integrity and availability so that the network can provide users with a secure communications platform.

5G security architecture depends on keeping large amounts of information private, such as subscriber credentials and encryption keys. A majority of the security mechanisms are based on secure protocols and underlying cryptographic algorithms that all rest on the reliability to securely store secret keys. Operations that need to have access to these keys should always be executed within, and never outside of a secure hardware component*.

For user equipment, which could be any device used directly by an end-user to communicate; a solution for Authentication and Key Agreement (AKA) is required.

Utimaco’s HSM-protected 5G delivers a secure operational environment, supporting all relevant 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols.

*(ETSI TS 133 501 , Clause 5.2.4)

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.