5G - Secure Storage, Management & Processing of Subscription Credentials
Security is a driving factor in how 5G networks are built and operated - every element of a 5G network is required to have security controls in place for the purpose of delivering confidentiality, integrity and availability so that the network provides users with a secure communications platform.
The 5G security architecture depends on keeping many pieces of information private (e.g., subscriber credentials and encryption keys). Most of the security mechanisms are based on secure protocols and underlying cryptographic algorithms that all rest on the reliability to securely store secret keys. Operations that need to have access to these keys should always be executed within, and never outside of a secure hardware component*.
For user equipment, which could be any device used directly by an end-user to communicate; a solution for Authentication and Key Agreement (AKA) is a requirement.
Utimaco’s HSM-protected 5G creates a secure operational environment, supporting all relevant 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols.
*(ETSI TS 133 501 , Clause 5.2.4)