`
`Technical Specification
`
`3rd Generation Partnership Project;
`Technical Specification Group Services and System Aspects;
`Security architecture and procedures for 5G system
`(Release 15)
`
`The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP..
`The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.
`This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification.
`Specifications and Reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.
`
`APPLE 1006
`
`1
`
`
`
`
`Release 15
`
`2
`
`3GPP TS 33.501 V15.3.1 (2018-12)
`
`
`
`
`
`
`
`
`
`Keywords
`security,5G
`
`3GPP
`
`Postal address
`
`
`3GPP support office address
`650 Route des Lucioles – Sophia Antipolis
`Valbonne – France
`Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
`
`Internet
`http://www.3gpp.org
`
`Copyright Notification
`
`No part may be reproduced except as authorized by written permission.
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`© 2018, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).
`All rights reserved.
`
`
`UMTS™ is a Trade Mark of ETSI registered for the benefit of its members
`3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
`LTE™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
`GSM® and the GSM logo are registered and owned by the GSM Association
`
`3GPP
`
`2
`
`
`
`
`Release 15
`
`3
`
`3GPP TS 33.501 V15.3.1 (2018-12)
`
`Contents
`
`Foreword........................................................................................................................................................... 11
`1
`Scope ...................................................................................................................................................... 12
`2
`References .............................................................................................................................................. 12
`3
`Definitions and abbreviations ................................................................................................................. 14
`3.1
`Definitions ....................................................................................................................................................... 14
`3.2
`Abbreviations ................................................................................................................................................... 18
`4
`Overview of security architecture .......................................................................................................... 19
`4.1
`Security domains ............................................................................................................................................. 19
`4.2
`Security entity at the perimeter of the 5G Core network ................................................................................. 20
`4.3
`Security entities in the 5G Core network ......................................................................................................... 20
`5
`Security requirements and features ........................................................................................................ 20
`5.1
`General security requirements ......................................................................................................................... 20
`5.1.1
`Mitigation of bidding down attacks ............................................................................................................ 20
`5.1.2
`Authentication and Authorization .............................................................................................................. 20
`5.1.3
`Requirements on 5GC and NG-RAN related to keys ................................................................................. 21
`5.2
`Requirements on the UE .................................................................................................................................. 21
`5.2.1
`General ....................................................................................................................................................... 21
`5.2.2
`User data and signalling data confidentiality ............................................................................................. 21
`5.2.3
`User data and signalling data integrity ....................................................................................................... 22
`5.2.4
`Secure storage and processing of subscription credentials ......................................................................... 22
`5.2.5
`Subscriber privacy ...................................................................................................................................... 23
`5.3
`Requirements on the gNB ................................................................................................................................ 23
`5.3.1
`General ....................................................................................................................................................... 23
`5.3.2
`User data and signalling data confidentiality ............................................................................................. 23
`5.3.3
`User data and signalling data integrity ....................................................................................................... 24
`5.3.4
`Requirements for the gNB setup and configuration ................................................................................... 24
`5.3.5
`Requirements for key management inside the gNB ................................................................................... 24
`5.3.6
`Requirements for handling user plane data for the gNB ............................................................................ 25
`5.3.7
`Requirements for handling control plane data for the gNB ........................................................................ 25
`5.3.8
`Requirements for secure environment of the gNB ..................................................................................... 25
`5.3.9
`Requirements for the gNB F1 interfaces .................................................................................................... 25
`5.3.10
`Requirements for the gNB E1 interfaces .................................................................................................... 25
`5.4
`Requirements on the ng-eNB ........................................................................................................................... 26
`5.5
`Requirements on the AMF ............................................................................................................................... 26
`5.5.1
`Signalling data confidentiality.................................................................................................................... 26
`5.5.2
`Signalling data integrity ............................................................................................................................. 26
`5.5.3
`Subscriber privacy ...................................................................................................................................... 26
`5.6
`Requirements on the SEAF .............................................................................................................................. 26
`5.7
`Void ................................................................................................................................................................. 27
`5.8
`Requirements on the UDM .............................................................................................................................. 27
`5.8.1
`Generic requirements ................................................................................................................................. 27
`5.8.2
`Subscriber privacy related requirements to UDM and SIDF ...................................................................... 27
`5.8a
`Requirements on AUSF ................................................................................................................................... 27
`5.9
`Core network security ...................................................................................................................................... 27
`5.9.1
`Trust boundaries ......................................................................................................................................... 27
`5.9.2
`Requirements on service-based architecture .............................................................................................. 27
`5.9.2.1
`Security Requirements for service registration, discovery and authorization ....................................... 27
`5.9.2.2
`NRF security requirements ................................................................................................................... 28
`5.9.2.3
`NEF security requirements ................................................................................................................... 28
`5.9.3
`Requirements for e2e core network interconnection security .................................................................... 28
`5.9.3.1
`General ................................................................................................................................................. 28
`5.9.3.2
`Requirements for Security Edge Protection Proxy (SEPP) .................................................................. 29
`5.9.3.3
`Protection of attributes.......................................................................................................................... 29
`5.10
`Visibility and configurability ........................................................................................................................... 30
`
`3GPP
`
`3
`
`
`
`
`Release 15
`
`4
`
`3GPP TS 33.501 V15.3.1 (2018-12)
`
`5.10.1
`5.10.2
`5.11
`5.11.1
`5.11.1.1
`5.11.1.2
`5.11.2
`6
`6.1
`6.1.1
`6.1.1.1
`6.1.1.2
`6.1.1.3
`6.1.1.4
`6.1.1.4.1
`6.1.1.4.2
`6.1.1.4.3
`6.1.2
`6.1.3
`6.1.3.1
`6.1.3.2
`6.1.3.2.0
`6.1.3.2.1
`6.1.3.2.2
`6.1.3.3
`6.1.3.3.1
`6.1.3.3.2
`6.1.4
`6.1.4.1
`6.1.4.1a
`6.1.4.2
`
`Security visibility ....................................................................................................................................... 30
`Security configurability .............................................................................................................................. 30
`Requirements for algorithms, and algorithm selection .................................................................................... 30
`Algorithm identifier values ........................................................................................................................ 30
`Ciphering algorithm identifier values ................................................................................................... 30
`Integrity algorithm identifier values ..................................................................................................... 30
`Requirements for algorithm selection ........................................................................................................ 31
`Security procedures between UE and 5G network functions ................................................................. 32
`Primary authentication and key agreement ...................................................................................................... 32
`Authentication framework .......................................................................................................................... 32
`General ................................................................................................................................................. 32
`EAP framework .................................................................................................................................... 32
`Granularity of anchor key binding to serving network ......................................................................... 33
`Construction of the serving network name ........................................................................................... 33
`Serving network name .................................................................................................................... 33
`Construction of the serving network name by the UE .................................................................... 33
`Construction of the serving network name by the SEAF ................................................................ 33
`Initiation of authentication and selection of authentication method ........................................................... 34
`Authentication procedures .......................................................................................................................... 35
`Authentication procedure for EAP-AKA' ............................................................................................. 35
`Authentication procedure for 5G AKA ................................................................................................ 37
`5G AKA .......................................................................................................................................... 37
`Void ................................................................................................................................................ 39
`RES* verification failure in SEAF or AUSF or both ...................................................................... 39
`Synchronization failure or MAC failure ............................................................................................... 40
`Synchronization failure or MAC failure in USIM .......................................................................... 40
`Synchronization failure recovery in Home Network ...................................................................... 40
`Linking increased home control to subsequent procedures ........................................................................ 41
`Introduction .......................................................................................................................................... 41
`Linking authentication confirmation to Nudm_UECM_Registration procedure from AMF ............... 41
`Guidance on linking authentication confirmation to Nudm_UECM_Registration procedure from
`AMF ..................................................................................................................................................... 42
`Key hierarchy, key derivation, and distribution scheme .................................................................................. 43
`Key hierarchy ............................................................................................................................................. 43
`Key derivation and distribution scheme ..................................................................................................... 45
`Keys in network entities ....................................................................................................................... 45
`Keys in the UE...................................................................................................................................... 46
`Handling of user-related keys..................................................................................................................... 48
`Key setting ............................................................................................................................................ 48
`Key identification ................................................................................................................................. 48
`Key lifetimes ........................................................................................................................................ 49
`Security contexts .............................................................................................................................................. 50
`Distribution of security contexts ................................................................................................................ 50
`General ................................................................................................................................................. 50
`Distribution of subscriber identities and security data within one 5G serving network domain .......... 50
`Distribution of subscriber identities and security data between 5G serving network domains ............. 50
`Distribution of subscriber identities and security data between 5G and EPS serving network
`domains ................................................................................................................................................ 50
`Multiple registrations in same or different serving networks ..................................................................... 51
`General ................................................................................................................................................. 51
`Multiple registrations in different PLMNs ........................................................................................... 51
`Multiple registrations in the same PLMN ............................................................................................. 51
`NAS security mechanisms ............................................................................................................................... 51
`General ....................................................................................................................................................... 51
`Security for multiple NAS connections ...................................................................................................... 51
`Multiple active NAS connections with different PLMNs ..................................................................... 51
`Multiple active NAS connections in the same PLMN's serving network ............................................. 52
`NAS integrity mechanisms ......................................................................................................................... 52
`General ................................................................................................................................................. 52
`NAS input parameters to integrity algorithm ....................................................................................... 52
`NAS integrity activation ....................................................................................................................... 53
`
`6.2
`6.2.1
`6.2.2
`6.2.2.1
`6.2.2.2
`6.2.3
`6.2.3.1
`6.2.3.2
`6.2.3.3
`6.3
`6.3.1
`6.3.1.1
`6.3.1.2
`6.3.1.3
`6.3.1.4
`
`6.3.2
`6.3.2.0
`6.3.2.1
`6.3.2.2
`6.4
`6.4.1
`6.4.2
`6.4.2.1
`6.4.2.2
`6.4.3
`6.4.3.0
`6.4.3.1
`6.4.3.2
`
`3GPP
`
`4
`
`
`
`
`Release 15
`
`5
`
`3GPP TS 33.501 V15.3.1 (2018-12)
`
`6.4.3.3
`6.4.4
`6.4.4.0
`6.4.4.1
`6.4.4.2
`6.4.5
`6.4.6
`6.4.7
`6.5
`6.5.1
`6.5.2
`6.6
`6.6.1
`6.6.2
`6.6.3
`6.6.4
`6.7
`6.7.1
`6.7.1.1
`6.7.1.2
`6.7.2
`6.7.3
`6.7.3.0
`6.7.3.1
`6.7.3.2
`6.7.3.3
`6.7.3.4
`6.7.3.5
`6.7.3.6
`6.7.4
`6.8
`6.8.1
`6.8.1.1
`6.8.1.1.0
`6.8.1.1.1
`6.8.1.1.2
`6.8.1.1.2.1
`6.8.1.1.2.2
`6.8.1.1.2.3
`6.8.1.1.2.4
`6.8.1.2
`6.8.1.2.0
`6.8.1.2.1
`6.8.1.2.2
`6.8.1.2.3
`6.8.1.2.4
`6.8.1.3
`6.8.2
`6.8.2.1
`6.8.2.1.1
`6.8.2.1.3
`6.8.2.1.4
`6.8.2.2
`6.8.2.2.1
`6.8.2.2.2
`6.8.2.2.3
`6.9
`6.9.1
`6.9.2
`6.9.2.1
`6.9.2.1.1
`6.9.2.1.2
`
`NAS integrity failure handling ............................................................................................................. 53
`NAS confidentiality mechanisms ............................................................................................................... 53
`General ................................................................................................................................................. 53
`NAS input parameters to confidentiality algorithm .............................................................................. 53
`NAS confidentiality activation ............................................................................................................. 53
`Handling of NAS COUNTs ....................................................................................................................... 53
`Protection of initial NAS message ............................................................................................................. 54
`Security aspects of SMS over NAS ............................................................................................................ 55
`RRC security mechanisms ............................................................................................................................... 55
`RRC integrity mechanisms ......................................................................................................................... 55
`RRC confidentiality mechanisms ............................................................................................................... 55
`UP security mechanisms .................................................................................................................................. 56
`UP security policy ...................................................................................................................................... 56
`UP security activation mechanism ............................................................................................................. 57
`UP confidentiality mechanisms .................................................................................................................. 58
`UP integrity mechanisms ........................................................................................................................... 58
`Security algorithm selection, key establishment and security mode command procedure .............................. 58
`Procedures for NAS algorithm selection .................................................................................................... 58
`Initial NAS security context establishment .......................................................................................... 58
`AMF change ......................................................................................................................................... 58
`NAS security mode command procedure ................................................................................................... 59
`Procedures for AS algorithm selection ....................................................................................................... 60
`Initial AS security context establishment ............................................................................................. 60
`Xn-handover ......................................................................................................................................... 61
`N2-handover ......................................................................................................................................... 61
`Intra-gNB-CU handover ....................................................................................................................... 61
`Transitions from RRC-INACTIVE to RRC-CONNECTED states ...................................................... 61
`RNA Update procedure ........................................................................................................................ 62
`Algorithm negotiation for unauthenticated UEs in LSM ...................................................................... 62
`AS security mode command procedure ...................................................................................................... 62
`Security handling in state transitions ............................................................................................................... 63
`Key handling at connection and registration state transitions .................................................................... 63
`Key handling at transitions between RM-DEREGISTERED and RM-REGISTERED states.............. 63
`General ............................................................................................................................................ 63
`Transition from RM-REGISTERED to RM-DEREGISTERED .................................................... 64
`Transition from RM-DEREGISTERED to RM-REGISTERED .................................................... 65
`General ...................................................................................................................................... 65
`Full native 5G NAS security context available ......................................................................... 65
`Full native 5G NAS security context not available ................................................................... 66
`UE registration over a second access type to the same AMF .................................................... 66
`Key handling at transitions between CM-IDLE and CM-CONNECTED states .................................. 66
`General ............................................................................................................................................ 66
`Transition from CM-IDLE to CM-CONNECTED ......................................................................... 67
`Establishment of keys for cryptographically protected radio bearers in 3GPP access .................... 67
`Establishment of keys for cryptographically protected traffic in non-3GPP access ....................... 68
`Transition from CM-CONNECTED to CM-IDLE ......................................................................... 68
`Key handling for the Registration procedure when registered in NG-RAN ......................................... 68
`Security handling at RRC state transitions ................................................................................................. 69
`Security handling at transitions between RRC_INACTIVE and RRC-CONNECTED states .............. 69
`General ............................................................................................................................................ 69
`State transition from RRCINACTIVE to RRCCONNECTED to a new gNB ................................ 69
`State transition from RRCINACTIVE to RRCCONNECTED to the same gNB ........................... 71
`Key handling during mobility in RRC-INACTIVE state ..................................................................... 71
`General ............................................................................................................................................ 71
`RAN-based notification area update to a new gNB ........................................................................ 71
`RAN-based notification area update to the same gNB.................................................................... 71
`Security handling in mobility........................................................................................................................... 71
`General ....................................................................................................................................................... 71
`Key handling in handover .......................................................................................................................... 72
`General ................................................................................................................................................. 72
`Access stratum ................................................................................................................................ 72
`Non access stratum ......................................................................................................................... 73
`
`3GPP
`
`5
`
`
`
`
`Release 15
`
`6
`
`3GPP TS 33.501 V15.3.1 (2018-12)
`
`Key derivations for context modification procedure ............................................................................ 73
`6.9.2.2
`Key derivations during handover .......................................................................................................... 73
`6.9.2.3
`Intra-gNB-CU handover ................................................................................................................. 73
`6.9.2.3.1
`Xn-handover ................................................................................................................................... 74
`6.9.2.3.2
`N2-Handover .................................................................................................................................. 74
`6.9.2.3.3
`UE handling .................................................................................................................................... 76
`6.9.2.3.4
`Key handling in mobility registration update ............................................................................................. 77
`6.9.3
`Key-change-on-the-fly ............................................................................................................................... 78
`6.9.4
`General ................................................................................................................................................. 78
`6.9.4.1
`NAS key re-keying ............................................................................................................................... 79
`6.9.4.2
`NAS key refresh ................................................................................................................................... 79
`6.9.4.3
`AS key re-keying .................................................................................................................................. 79
`6.9.4.4
`AS key refresh ...................................................................................................................................... 80
`6.9.4.5
`Rules on concurrent running of security procedures .................................................................................. 80
`6.9.5
`Rules related to AS and NAS security context synchronization ........................................................... 80
`6.9.5.1
`Rules related to parallel NAS connections ........................................................................................... 81
`6.9.5.2
`Dual connectivity ............................................................................................................................................. 81
`6.10
`Introduction ................................................................................................................................................ 81
`6.10.1
`General ................................................................................................................................................. 81
`6.10.1.1
`Dual Connectivity protocol architecture for MR-DC with 5GC ........................................................... 81
`6.10.1.2
`Security mechanisms and procedures for DC ............................................................................................ 82
`6.10.2
`SN Addition or modification ................................................................................................................ 82
`6.10.2.1.
`Secondary Node key update ................................................................................................................. 83
`6.10.2.2
`General ............................................................................................................................................ 83
`6.10.2.2.1
`MN initiated .................................................................................................................................... 84
`6.10.2.2.2
`SN initiated ..................................................................................................................................... 84
`6.10.2.2.3
`SN release and change .......................................