AKA (security)

AKA (security)

AKA stands for the Authentication and Key Agreement. It is a security protocol used in 3G networks.AKA is also used for one-time password generation mechanism for Hypertext Transfer Protocol (HTTP) Digest access authentication. The HTTP Authentication Framework includes two authentication schemes: Basic and Digest. Both schemes employ a shared secret based mechanism for access authentication. AKA is a challenge-response based mechanism that uses symmetric cryptography.

__TOC__

AKA in CDMA

"'AKA – Authentication and Key Agreement"a.k.a. 3G Authentication, Enhanced Subscriber Auth. (ESA)

The basis for the 3G authentication mechanism defined as a successor to CAVE-based Authentication. AKA provides procedures for mutual authentication of the MS and serving system. The successful execution of AKA results in the establishment of a security association (i.e., set of security data) between the MS and serving system that enables a set of security services to be provided.

Major advantages of AKA over CAVE-based authentication include:*Larger authentication keys (128-bit ):*Stronger hash function (SHA-1):*Support for mutual authentication:*Support for signaling message data integrity:*Support for signaling information encryption:*Support for user data encryption:*Protection from rogue MS when dealing with R-UIM

AKA is not yet implemented in CDMA2000 networks, although it is expected to be used for IMS. To ensure interoperability with current devices and partner networks, support for AKA in CDMA networks and handsets will likely be in addition to CAVE-based authentication.

Air interface support for AKA is included in all releases following CDMA2000 Rev C.

TIA-41 MAP support for AKA was defined in TIA-945 (3GPP2 X.S0006), which has been integrated into TIA-41 (3GPP2 X.S0004).

For information on AKA in roaming, see CDG Reference Document #138.

AKA in UMTS

AKA is a mechanism which performs authentication and session key distribution in Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge-response based mechanism that uses symmetric cryptography. AKA is typically run in a UMTS IP Multimedia Services Identity Module (ISIM), which resides on a smart card like device that also provides tamper resistant storage of shared secrets. AKA is defined in RFC 3310.

ee also

*Digest access authentication


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Security Support Provider Interface — SSPI is an API used by Microsoft Windows systems to perform a variety of security related operations such as authentication.SSPI functions as a common interface to several Security Support Providers (SSP) such as: * NTLM * Kerberos * Secure… …   Wikipedia

  • Domestic Security Section — The Domestic Security Section (DSS) was a component of the United States Department of Justice Criminal Division that was focused on the prosecution of significant alien smuggling organizations,[1] complex immigration frauds, certain violent… …   Wikipedia

  • Internal security — Internal security, or IS, is the act of keeping domestic peace within a country. It is often carried out by police, government personnel, specialized military (such as the Italian Carabinieri or the Iranian Basij) or paramilitary forces (such as… …   Wikipedia

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Mortgage-backed security — Securities Securities Bond Stock Investment fund Derivative Structured finance Agency security …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • List of private security agencies — This is a partial list of private Security solution providers Bahrain*Batsco Security Services [http://www.batsco.net] CIT, CCTV Cameras Guarding Services [http://www.batsco.net] *Group 4 Securicor *Secure Services *Securicor Gurading CIT *Soonar …   Wikipedia

  • USS Yancey (AKA-93) — USS Yancey (AKA 93/LKA 93) was an attack cargo ship named after Yancey County, North Carolina. She served as a commissioned ship for 22 years and 6 months. Yancey (AKA 93) was laid down under a Maritime Commission contract (MC hull 1193) on 22… …   Wikipedia

  • No Security (D-Block album) — No Security Compilation album by D Block Released June 9, 2009 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”