Secure Storage, Management & Processing of Subscription Credentials in 5G networks
Security is a driving factor in how 5G networks are built and operated - every element of a 5G network is required to have security controls in place for the purpose of delivering confidentiality, integrity and availability so that the network can provide users with a secure communications platform.
5G security architecture depends on keeping large amounts of information private, such as subscriber credentials and encryption keys. A majority of the security mechanisms are based on secure protocols and underlying cryptographic algorithms that all rest on the reliability to securely store secret keys. Operations that need to have access to these keys should always be executed within, and never outside of a secure hardware component*.
For user equipment, which could be any device used directly by an end-user to communicate; a solution for Authentication and Key Agreement (AKA) is required.
Utimaco’s HSM-protected 5G delivers a secure operational environment, supporting all relevant 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols.
*(ETSI TS 133 501 , Clause 5.2.4)