- AKA (security)
AKA stands for the Authentication and Key Agreement. It is a
security protocol used in 3G networks.AKA is also used for one-time password generation mechanism forHypertext Transfer Protocol (HTTP) Digest access authentication. The HTTP Authentication Framework includes two authentication schemes: Basic and Digest. Both schemes employ a shared secret based mechanism for access authentication. AKA is a challenge-response based mechanism that uses symmetric cryptography.__TOC__
AKA in
CDMA "'AKA – Authentication and Key Agreement"a.k.a. 3G Authentication, Enhanced Subscriber Auth. (ESA)
The basis for the 3G authentication mechanism defined as a successor to
CAVE-based Authentication . AKA provides procedures for mutual authentication of the MS and serving system. The successful execution of AKA results in the establishment of a security association (i.e., set of security data) between the MS and serving system that enables a set of security services to be provided.Major advantages of AKA over CAVE-based authentication include:*Larger authentication keys (128-bit ):*Stronger hash function (
SHA-1 ):*Support for mutual authentication:*Support for signaling message data integrity:*Support for signaling information encryption:*Support for user data encryption:*Protection from rogue MS when dealing with R-UIMAKA is not yet implemented in CDMA2000 networks, although it is expected to be used for IMS. To ensure interoperability with current devices and partner networks, support for AKA in CDMA networks and handsets will likely be in addition to CAVE-based authentication.
Air interface support for AKA is included in all releases following CDMA2000 Rev C.
TIA-41 MAP support for AKA was defined in TIA-945 (
3GPP2 X.S0006), which has been integrated into TIA-41 (3GPP2 X.S0004).For information on AKA in roaming, see
CDG Reference Document #138.AKA in
UMTS AKA is a mechanism which performs authentication and session key distribution in
Universal Mobile Telecommunications System (UMTS) networks. AKA is achallenge-response based mechanism that usessymmetric cryptography . AKA is typically run in a UMTS IP Multimedia Services Identity Module (ISIM ), which resides on asmart card like device that also provides tamper resistant storage of shared secrets. AKA is defined in RFC 3310.ee also
*
Digest access authentication
Wikimedia Foundation. 2010.