Skip to Content
SensorsSensors
  • Article
  • Open Access

27 December 2023

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

,
,
,
,
and
1
Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea
2
Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan
3
Department of Cyber Security, Ewha Womans University, Seoul-si 03760, Republic of Korea
4
School of Computing and Information Technology, University of Wollongong, Northfields Avenue, Wollongong, NSW 2522, Australia

Abstract

5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authentication, the initial step in securing access to 5G network environments. For the 5G primary authentication, two protocols, namely 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′), were proposed and standardized, where the former is for 3GPP devices, and the latter is for non-3GPP devices. Recent scrutiny has unveiled vulnerabilities in the 5G-AKA protocol, exposing it to security breaches, including linkability attacks. Moreover, mobile communication technologies are dramatically evolving while 3GPP has standardized Authentication and Key Management for Applications (AKMA) to reuse the credentials, generated during primary authentication, for 5G network applications. That makes it so significant for 5G-AKA to be improved to support forward secrecy as well as address security attacks. In response, several protocols have been proposed to mitigate these security challenges. In particular, they tried to strengthen security by reusing secret keys negotiated through the Elliptic Curve Integrated Encryption Scheme (ECIES) and countering linkability attacks. However, they still have encountered limitations in completing forward secrecy. Motivated by this, we propose an augmentation to 5G-AKA to achieve forward security and thwart linkability attacks (called 5G-AKA-FS). In 5G-AKA-FS, the home network (HN), instead of using its static ECIES key pair, generates a new ephemeral key pair to facilitate robust session key negotiation, truly realizing forward security. In order to thoroughly and precisely prove that 5G-AKA-FS is secure, formal security verification is performed by applying both BAN Logic and ProVerif. As a result, it is demonstrated that 5G-AKA-FS is valid. Besides, our performance comparison highlights that the communication and computation overheads are intrinsic to 5G-AKA-FS. This comprehensive analysis showcases how the protocol effectively balances between security and efficiency.

1. Introduction

Since the first deployment of the fifth generation (5G) mobile networks in 2019, 5G has rapidly become a mainstream mobile network worldwide. According to the Global System for Mobile Communications Association (GSMA), the 5G adoption rate reached 43.1% in the United States in Q4 2022 [1]. 5G mobile networks and telecommunication standards have been developed to meet the various demands of modern telecommunication. In particular, it is designed to support enhanced features such as Enhanced Mobile BroadBand (EMBB), Massive Machine-Type Communications (MMTC), and Ultra-Reliable and Low-Latency Communications (URLLC) [2].
In order to ensure the seamless delivery of high-quality services to users through these three features, 5G demands heightened security compared to its predecessors in mobile networks. Therefore, the 3rd Generation Partnership Project (3GPP) consortium, which is in charge of the standardization of 5G mobile networks, has standardized an essential 5G security architecture and procedures as well as several security features [3,4]. Figure 1 depicts the 3GPP 5G security architecture.
Figure 1. 3GPP 5G security architecture.
Notably, in 5G, primary authentication emerges as a cornerstone, representing the initial security checkpoint for accessing 5G network environments. For the 5G primary authentication, two protocols have been adopted as standards: 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA ) [3,5]. The former caters to 3GPP devices, while the latter is tailored for non-3GPP devices.
The 5G primary authentication protocols, i.e., 5G-AKA and EAP-AKA , allow a user equipment (UE) (e.g., a mobile phone) and a home network (HN) (e.g., the network of a service provider) to authenticate each other and exchange key materials (e.g., anchor keys) to protect entire subsequent 5G communications. Note that they have been enhanced and markedly differentiated from their previous version (i.e., Evolved Packet System Authentication and Key Agreement (EPS-AKA) [4] and Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) [6]). The most distinctive feature of those security protocols in the 5G network is using a Subscriber Concealed Identifier (SUCI) that can be explained as a Subscriber Permanent Identifier (SUPI) in the encrypted format. In the previous generation, authentication was performed by transmitting the user identification information, International Mobile Subscriber Identity (IMSI), without encryption. On the other hand, in 5G, SUPI, which is a UE’s identifier, is encrypted into SUCI using a key derived through the Elliptic Curve Integrated Encryption Scheme (ECIES) before transmission to address identifier exposure [7,8,9,10]. Despite these efforts, 5G-AKA still remains vulnerable to various types of attacks [7,9,10,11,12,13,14]. Ref. [15] described vulnerabilities for 5G-AKA through formal verification and analysis. The authors showed that there still exist attack scenarios against 5G-AKA. In addition, refs. [10,16] pointed out that privacy problems of users may occur since 5G-AKA is susceptible to linkability attacks. Furthermore, ref. [17] presented shortcomings of 5G-AKA, including the lack of support for forward secrecy, also known as perfect forward secrecy.
Meanwhile, the 5G network environments face the following new challenges:
  • As the advancement of 5G technology and the proliferation of 5G network applications continue at a rapid pace, the emergence of new security threats and attacks becomes more pronounced, thereby necessitating the establishment of elevated security prerequisites.
  • Thanks to the Authentication and Key Management for Applications (AKMA) [18], the credentials generated through 5G primary authentication can be reused for application authentication in the 5G network environments; that is, the master session key negotiated during the 5G primary authentication is applied to derive an application key that allows a UE to authenticate itself to AKMA-based applications smoothly and efficiently.
Evidently, the security robustness of the existing 5G primary authentications falls short of addressing the aforementioned concerns. As a result, it becomes imperative to bolster the security framework with robust public key-based measures and ensure the implementation of forward secrecy.
Regarding EAP-AKA , there has been a standardization effort aimed at enhancing the protocol to incorporate support for forward secrecy (known as EAP-AKA -FS) [19]. On the 5G-AKA side, there are existing works proposed to support unlinkability and forward secrecy, such as [3,16,17,20,21]. In particular, those 5G-AKA enhancements attempted to reuse the ECIES shared key, which is used to protect the UE’s identifier in the initiation phase. However, in such an approach, if an adversarial security event happens in HN, forward secrecy is not guaranteed for the session key.
In this paper, we propose a 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol that supports forward secrecy and unlinkability together to solve the limitations of the existing studies and maximize the efficiency of authentication in 5G networks. The proposed protocol accomplishes forward secrecy and unlinkability by introducing an additional ECIES-based ephemeral key pair generation within HN. The main contributions of this paper are summarized as follows:
  • The 5G-AKA-FS protocol is designed to concurrently support forward secrecy and unlinkability.
  • We analyze the latest studies proposed to improve the vulnerabilities of 5G-AKA and provide a solid comparison of security attributes between our 5G-AKA-FS and the latest studies.
  • We conduct a rigorous security verification of the proposed protocol using formal verification (BAN Logic [22] and ProVerif [23]).
  • Performance evaluation is thoroughly carried out by measuring overhead in terms of computation and communication.
The rest of the paper is organized as follows. Section 2 explores the existing enhancements of 5G-AKA, while Section 3 describes the preliminaries used in this paper. Moving on to Section 4, we present a detailed description of the proposed protocol, followed by the formal security analysis using BAN Logic and ProVerif in Section 5. Assessing performance, Section 6 carries out a comparative evaluation of security properties between the proposed and existing protocols, along with measured overhead. Finally, Section 7 provides the conclusion.

3. Preliminaries

3.1. Notations

Table 1 shows abbreviations and notations to be used throughout this paper.
Table 1. Abbreviations and notations.

3.2. Elliptic Curve Integrated Encryption Scheme

The Elliptic Curve Integrated Encryption Scheme (ECIES) [24,25] is a well-known hybrid encryption scheme consisting of a Key Encapsulation Mechanism (KEM) and a Data Encapsulation Mechanism (DEM) where messages of arbitrary length can be encrypted. This scheme is a key component of 5G-AKA.
The ECIES-KEM has the following three algorithms:
  • KeyGen ( p p ) : On input of a public parameter p p , the algorithm outputs a public-private key pair ( P K , s k ) such that P K = s k · G , where p p is an elliptic curve parameter standardized in secp256r1 [26], and G p p is a base point.
  • Encap ( P K ) : On input of a public key P K , the algorithm generates an ephemeral public-private key pair ( R , r ) such that R = r · G , and then outputs a ciphertext C 0 = R and a shared key k s = KDF ( r · P K ) , where KDF is a key derivation function.
  • Decap ( s k , C 0 ) : On input of a ciphertext C 0 and a private key s k , the algorithm outputs the shared key k s = KDF ( s k · C 0 ) .
The ECIES-DEM has the following two algorithms:
  • SEnc ( k s , M ) : On input of a key k s and a message M, the algorithm first parses k s as k 1 | | k 2 , computes C 1 = ENC ( k 1 , M ) and C 2 = MAC ( k 2 , C 1 ) , and then outputs ( C 1 , C 2 ) , where ENC is an encryption part of a symmetric encryption scheme and MAC is a message authentication code.
  • SDec ( k s , ( C 1 , C 2 ) ) : On input of a ciphertext ( C 1 , C 2 ) and a key k s , the algorithm first parses k s as k 1 | | k 2 . If C 2 MAC ( k 2 , C 1 ) , it outputs ⊥. Otherwise, the algorithm outputs M = DEC ( k 1 , C 1 ) , where DEC is a decryption part of a symmetric encryption scheme.

4. A 5G-AKA Protocol for Forward Secrecy

In this section, we propose a 5G-AKA protocol for forward secrecy (for short, 5G-AKA-FS) that is compatible with the current 3GPP standards [3], and the proposed protocol is shown in Figure 2. Before executing the 5G-AKA-FS protocol, UE holds ( k ,   P K H N ,   S U P I , S Q N U E ) secretly and HN stores ( k ,   s k H N ,   I D H N ,   S Q N H N ) secretly. Also, SN stores I D S N . We denote by H SHA - 256 the SHA-256 cryptographic hash function.
Figure 2. The 5G-AKA-FS protocol.

4.1. The Initiation Phase: Step 1

In this phase, UE sends its SUPI as an encrypted form using ECIES [24,25] with HN’s public key P K H N . Correspondingly, HN decrypts SUCI with its private key s k H N . Upon successful completion of Step 1, we proceed to Step 2 by selecting the 5G-AKA-FS among various methods. Before choosing the authentication method, the Step 1 process unfolds as follows:

4.1.1. Step 1.1 (UE)

Step 1.1 (UE)
Inputs. With HN’s public key P K H N , UE executes the followings:
The Protocol:
  • Generate an ephemeral private-public key pair ( r , R ) such that R = r · G
  • With P K H N , compute a ciphertext C 0 = R and a key k U E = KDF ( r · P K H N )
  • Parse the shared key k U E as k 1 | | k 2
  • Compute C 1 = ENC ( k 1 , S U P I ) and C 2 = MAC ( k 2 , C 1 )
  • Set S U C I ( C 0 , C 1 , C 2 )
Outputs. UE sends ( S U C I ) to SN.

4.1.2. Step 1.2 (SN)

Step 1.2 (SN)
Inputs. SN receives ( S U C I ) from UE.
Outputs. SN sends ( S U C I , I D S N ) to HN.

4.1.3. Step 1.3 (HN)

Step 1.3 (HN)
Inputs. Upon receiving ( S U C I , I D S N ) from SN, HN executes the followings:
The Protocol:
  • Compute a shared key k H N = KDF ( s k H N · C 0 )
  • Parse the shared key k H N as k 1 | | k 2
  • Retrieve the corresponding k and S Q N H N from its database
Outputs. HN outputs ⊥ if C 2 MAC ( k 2 , C 1 ) . Otherwise, it outputs S U P I = DEC ( k 1 , C 1 ) .

4.2. The Challenge-Response Phase: Step 2

In this phase, UE and HN authenticate each other via a challenge-response method and establish anchor keys (i.e., K S E A F ) together with SN. A key idea is that we set a Diffie–Hellman public key Y as a random challenge RAND, and a Diffie–Hellman key D H K is used as a key material for forward secrecy. This phase uses a series of HMAC-SHA-256 cryptographic key derivation functions f 1 , f 2 , f 3 , f 4 , f 5 , f 1 , and f 5 , as specified by TS 33.501 [3] (see also Figure 3).
Figure 3. Computations of M A C , X R E S , C K , I K , A K , and K A U S F in 5G-AKA-FS.

4.2.1. Step 2.1 (HN)

Step 2.1 (HN)
Inputs. Using S Q N H N , k, and D H K , HN generates an Authentication Vector S E - A V = ( R A N D , A U T N , H X R E S ) as follows:
The Protocol:
  • Generate an ephemeral private-public key pair ( y , Y ) such that Y = y · G
  • Compute a Diffie–Hellman key D H K = y · C 0
  • Set RAND Y as a challenge (The 128-bit randomness of R A N D is guaranteed since y is randomly chosen from the 128-bit key space. )
  • Compute M A C f 1 ( k , S Q N H N , A M F , R A N D D H K ) and
    an anonymous key A K f 5 ( k , R A N D D H K )
  • Set A U T N ( A K S Q N H N , A M F , M A C )
  • Compute C K f 3 ( k , R A N D D H K ) and I K f 4 ( k , R A N D D H K )
  • Compute expected responses X R E S f 2 ( k , R A N D D H K ) ,
    X R E S KDF ( C K | | I K , I D S N | | R A N D | | X R E S ) , and
    H X R E S LEFT ( 128 , H SHA - 256 ( R A N D | | X R E S ) )
  • Derive K A U S F KDF ( C K | | I K , I D S N | | A K S Q N H N | | D H K ) and
    K S E A F KDF ( K A U S F , I D S N )
  • Increase S Q N H N by 1 (i.e., S Q N H N S Q N H N + 1 )
  • Set H E - A V ( R A N D , A U T N , X R E S , K A U S F ) and S E - A V ( R A N D , A U T N , H X R E S )
Outputs. HN sends ( S E - A V ) to SN.

4.2.2. Step 2.2 (SN)

Step 2.2 (SN)
Inputs. SN receives ( S E - A V ) from HN and stores ( R A N D ,   H X R E S ) .
Outputs. SN sends ( R A N D , A U T N ) to UE.

4.2.3. Step 2.3 (UE)

Step 2.3 (UE)
Inputs. Upon receiving ( R A N D , A U T N ) from SN, UE executes the following steps:
  • In the UE, the ME forwards the received R A N D and A U T N to the SIM
  • The SIM computes a Diffie–Hellman key D H K = r · R A N D
  • Run the SIM card command AUTHENTICATE ( R A N D , D H K , A U T N )
  • Compute A K f 5 ( k , R A N D D H K )
  • Parse A U T N as ( C O N C , A M F , M A C )
  • De-conceal S Q N H N A K C O N C
  • Check f 1 ( k , S Q N H N , A M F , R A N D D H K ) = M A C
    • If this check does not pass, the SIM card returns ⊥ and then UE sends a failure message Mac_Failure to SN (see Case i)
    • Otherwise, proceed to the next step
  • Check S Q N U E < S Q N H N < S Q N U E + Δ  (The first condition S Q N U E < S Q N H N ensures the freshness of ( R A N D , A U T N ) . Also, the second condition S Q N H N < S Q N U E + Δ , which is optional in the non-normative Annex C of TS 33.102 [27], prevents a wrap-around of S Q N U E . For example, if Δ is too small (i.e., Δ = 2 ), an attacker can make a synchronization failure by sending S U C I computed by the attacker with a fake SUPI. After this attack, the honest UE and HN can no longer authenticate each other. In TS 33.102 [27], a recommended value of Δ is 2 28 so as to decrease the synchronization failure rate.)
    • If this check does not pass, the SIM card computes
      M A C f 1 ( k , S Q N U E , A M F , R A N D D H K ) and returns
      A U T S ( A K S Q N U E , A M F , M A C ) where A K f 5 ( k , R A N D D H K ) . Then, UE re-synchronizes with HN by sending a failure message Sync_Failure and A U T S to SN (see Case ii)
    • Otherwise, proceed to the next step
  • Set S Q N U E S Q N H N
  • Compute C K f 3 ( k , R A N D D H K ) and I K f 4 ( k , R A N D D H K )
  • Compute R E S f 2 ( k , R A N D D H K ) and SIM returns R E S , C K , and I K to ME
  • The ME calculates R E S KDF ( C K | | I K , I D S N | | R A N D | | R E S ) and derives K A U S F KDF ( C K | | I K , I D S N | | C O N C | | D H K ) and K S E A F KDF ( K A U S F , I D S N )
  • The UE returns ( K S E A F , R E S )
Outputs. The UE stores K S E A F and sends R E S to SN (see Case iii)
Case i 
(The SIM card returns): The UE sends a failure message Mac_Failure to SN.
Case ii 
(The SIM card returns  A U T S ): The UE re-synchronizes with HN by sending a failure message Sync_Failure and A U T S to SN. Upon receiving ( Sync _ Failure , A U T S ) , SN sends ( Sync _ Failure , A U T S , R A N D , S U C I ) to HN. Then, HN parses A U T S as ( A K S Q N U E , A M F , M A C ) , and de-conceals S Q N U E A K S Q N U E f 5 ( k , R A N D D H K ) . Next, HN checks its authenticity by comparing M A C = f 1 ( k , S Q N U E , A M F , R A N D D H K ) . If the check holds, HN re-sets S Q N H N by S Q N U E + 1 (i.e., S Q N H N S Q N U E + 1 ).
Case iii 
(The SIM card returns  ( K S E A F , R E S ) ): The UE stores K S E A F and sends ( R E S ) to SN. Upon receiving ( R E S ) , SN computes a hashed value H R E S LEFT ( 128 , H SHA - 256 ( R A N D | | R E S ) ) and checks its validity by comparing H R E S = H X R E S . If H R E S = H X R E S , SN forwards ( R E S ) to HN. Next, HN authenticates UE by comparing R E S = X R E S . If R E S = X R E S , HN sends its result and ( S U P I , K S E A F ) to SN. The SN continues the protocol only if both checks hold, and aborts the protocol otherwise. When all checks pass, UE and SN communicate with session keys derived from anchor keys (i.e., K S E A F ) in the subsequent 5G procedures. According to TS 33.501 [3], UE and SN should confirm the keys agreed and the identities of each other implicitly through the successful use of keys in subsequent procedures, which can be expressed by a key-confirmation round trip with K S E A F .

5. Formal Verification

To verify the security of the protocol, various formal verification methods are used as shown in Figure 4. Among several formal verification methods, the proposed protocol is verified through two methods: BAN Logic and ProVerif. BAN Logic is a representative method of Modal Logic and one of the widely used formal verification methods. With its decisiveness on the result, it can be fully trusted once the verification process is correct. However, each verification method has its pros and cons. BAN Logic does not consider dishonest reasoning. In other words, it cannot detect the attack of malicious participants. Thus, for precise verification results, we have included ProVerif as the second verification tool. ISO29129-1, a document for protocol verification framework, guides to formally verify the protocol using the automated prover [28]. ProVerif is one of the state-of-the-art verification tools that meets the guidelines. It can formally verify the protocol in an unbounded session environment and detect malicious attacks on the protocol. By using two complementary verification methods, BAN Logic and ProVerif, we have come up with reliable verification results.
Figure 4. Types of formal verification.

5.1. Formal Verification via BAN Logic

The results of BAN Logic are driven by the idealization, assumption, goals, and derivation phase. The notations and rules of BAN Logic used in the above process are shown in Table 2 and Table 3. Excluding messages that are not encrypted, only messages protected by secret keys or secret information between communication participants, such as encryption, digital signature, and message authentication code are expressed. Second, in the Assumption step, preconditions for communication, such as network environment and home, are defined in a form that can be applied in BAN Logic. Third, in the goal step, the security goal to be required in the proposed protocol is defined. Finally, in the derivation step, it shows a series of processes to derive the security attributes defined in the goals through the BAN Logic rule. The results verified through BAN Logic in this paper are as follows.
Table 2. Notations of BAN Logic.
Table 3. Rules of BAN Logic.

5.1.1. The Initiation Phase: Step 1

The idealization form of the Initiation Phase of the protocol is shown below:
UE HN : SUPI , UE k 2 HN k 1
We added Assumptions (2) to (5) to verify through BAN Logic.
HN UE k 1 HN
HN # ( UE k 1 HN )
HN UE k 2 HN
HN # ( UE k 2 HN )
Technically, all the aforementioned assumptions could be invalidated as the HN inherently lacks trust in the UE’s public key PK U E . However, in the case of 5G AKA, since it was designed to tolerate a replay attack or Man-in-the-Middle (MITM) attack on the public key, we followed the standard and added the above assumption to continue this analysis.
Therefore, we set a security goal that HN believes that UE believes in SUPI, and derived this goal through the derivation step.
HN UE SUPI
from (1), and we derive
HN SUPI , UE k 2 HN k 2 , UE k 1 HN k 1 by ( 1 )
HN UE SUPI , UE k 2 HN k 2 , UE k 1 HN by ( 7 ) , ( 2 ) , MM
HN UE SUPI , UE k 2 HN by ( 8 ) , ( 3 ) , FR , NV , BC
HN UE SUPI by ( 9 ) , ( 4 ) , MM , ( 5 ) , FR , NV , BC
According to the derivation above, the proposed security protocol can achieve the security goal (6) stated in the goal. This means that the HN believes that UE believes about SUPI, in the initiation phase of the proposed protocol.

5.1.2. The Challenge-Response Phase: Step 2

The idealization form of the Challenge-Response Phase of the protocol is shown below:
HN UE : Y HN , S Q N H N A K , S Q N H N , AMF , Y HN , UE x · y · G HN , UE K S E A F HN k
UE SN : RES
UE HN : I D S N , Y HN , UE x · y · G HN , UE K S E A F SEAF k
HN SN : SUPI , UE K S E A F SEAF , UE UE K S E A F SEAF K N 12
Unlike HN in (14), in (13), due to no knowledge on k , SN treats RES as an unrecognized simple value. We added assumptions from (15)–(26) to derive the security goal.
UE UE K HN
UE X UE
UE # ( S Q N H N )
UE # ( K S E A F )
SN Y HN
SN H R E S , Y H N
HN UE K HN
HN # ( Y HN )
SN SN K N 12 HN
HN # ( SN K N 12 HN )
SN HN UE K S E A F SEAF
SN HN UE UE K S E A F SEAF
K S E A F is derived based on the ECIES ephemeral key pair performed once again in HN, and the UE can also derive K S E A F through the ECIES process. Therefore, since the UE can trust that K S E A F is fresh, (18) is added. Also, (19) and (20) are added because SN receives RAND = Y HN and HXRES from HN via secure channel and counts on HN.
UE HN Y HN
UE UE x · y · G HN
UE HN UE x · y · G HN
UE UE K S E A F HN
UE HN UE K S E A F SEAF
HN UE UE x · y · G HN
HN UE UE K S E A F HN
SN HN UE K S E A F SEAF
SN UE UE K S E A F SEAF
from (11), we derive
UE Y HN by ( 11 )
Here, given the ephemeral ECIES public key of HN, UE derives DHK = x · Y = x · y · G and then computes A K = f 5 k , Y x · y · G . At this point, despite no trust in Y , UE can be sure that AK is a good key shared between HN and itself. This is because AK is derived by inputting k and x where k is only known to both UE and HN and x is its own fresh ephemeral ECIES private key. As a result, UE gains the belief (37) as follows.
UE UE A K HN by ( 36 ) , ( 15 ) , ( 16 )
UE S Q N H N A K by ( 11 )
UE HN S Q N H N by ( 38 ) , ( 37 ) , MM , ( 20 ) , NV
Note that after recovery, SQN H N is checked for its freshness. For this procedure, we add the assumption (17). Now, UE possesses the valid SQN H N .
UE S Q N H N , A M F , Y HN , UE K S E A F SEAF k by ( 11 )
UE HN S Q N H N , A M F , Y HN , UE K S E A F SEAF by ( 40 ) , ( 15 ) , MM
UE HN S Q N H N , A M F , Y HN , UE K S E A F SEAF by ( 41 ) , ( 18 ) , FR , NV
UE HN Y HN by ( 11 )
Even if RAND and AUTN are replayed, a linkability attack does not occur in the UE. Because freshness is verified based on the key derived through ECIES rather than SQN H N during MAC check, when a replay attack occurs, the Sync_Failure step is not performed, and MAC_Failure is executed to stop authentication, so unlinkability is supported.
In addition, UE obtains the indirect belief on  Y HN , which helps this protocol to defend against the Man-in-The-Middle attacks. Based on (43), UE proceeds to gain the direct belief on UE x · y · G HN as follows.
UE UE x · y · G HN by ( 43 ) , ( 16 ) , DH
UE HN UE x · y · G HN by ( 42 ) , BC
UE derives K S E A F with the values k , SQN H N , Y , x · y · G , ID S N . In particular, based on (15), (17), (43), and (44), UE can arrive at the following belief.
UE UE K S E A F HN by ( 25 ) , ( 18 ) , ( 43 ) , ( 44 )
UE HN UE K S E A F SEAF by ( 42 ) , BC
At this point, it is confirmed from (44) to (47) that HN is authenticated to UE.
from (12), and we derive
SN RES by ( 12 )
SN RES by ( 48 ) , ( 18 ) , ( 19 ) , HR
Based on (49), SN proceeds this protocol by forwarding RES to HN .
from (13), and we derive
HN ID S N , Y HN , UE x · y · G HN , UE K S E A F HN k by ( 13 )
HN UE ID S N , Y HN , UE x · y · G HN , UE K S E A F HN by ( 50 ) , ( 21 ) , MM , ( 22 ) , FR , NV
HN UE UE x · y · G HN by ( 51 ) , BC
HN UE UE K S E A F HN by ( 51 ) , BC
Based on (51), UE and HN mutually authenticate
from (14), and we derive
SN SUPI , UE K S E A F HN , UE K S E A F SEAF K N 12 by ( 14 )
SN HN SUPI , UE K S E A F HN , UE UE K S E A F SEAF by ( 54 ) , ( 23 ) , MM , ( 24 ) , FR , NV
SN HN UE K S E A F SEAF by ( 55 ) , BC
SN UE K S E A F SEAF by ( 56 ) , ( 25 ) , JR
SN HN UE UE K S E A F SEAF by ( 55 ) , BC
SN UE UE K S E A F SEAF by ( 58 ) , ( 26 ) , JR

5.2. Formal Verification via ProVerif

5.2.1. Implementations and designs

In this section, we formally verify the 5G-AKA-FS protocol using a well-known formal verification tool, ProVerif [23]. We designed the processes of User Equipment (UE), Serving Network (SN), and Home Network (HN) respectively at UE, SN and HN in ProVerif to verify its security properties. Our implementation also contains the process protocol that concludes the proof.
We implemented the processes under Dolev–Yao’s attacker model, where the attacker can access the encrypted data only if it has the correct key to decrypt them. We largely adopt the settings that the implementation of Damir et al. [29] is based on. The differences between ours and Damir et al. are as follows:
  • First, we newly define the symbolic process DHkey for the perfect forward secrecy, that is the Diffie–Hellman Key exchange protocol, in the implementation.
  • Although our settings are similar to Damir et al. [29], the actual internal processes are different as the internal processes of UE, SN, and HN are fairly different from those of Damir et al.’s protocol. We implement those differences in our implementation.
Under Dolev–Yao’s attacker model, we simplify some cryptographic primitives as symbolic functions. Particularly, the Diffie–Hellman key exchange protocol can be implemented as a symbolic function as follows:
DH Key Exchange protocol
  • type pubKey.
  • type secKey.
  • fun pk(secKey):pubKey.
  • fun DHkey(secKey,pubKey):bitstring.
  • equation forall sk1:secKey, sk2:secKey;
  • DHKey(sk2,pk(sk1))=DHKey(sk1,pk(sk2)).
For the symmetric key encryption/decryption, we utilized a symbolic function defined in [29] to implement the protocols in our 5G-AKA-FS. Symmetric key encryption/decryption means that a message m is encrypted by senc using a secret key n. Then, the encrypted message senc(m,n) only can be decrypted using sdec with the same key. It is defined as follows:
Encryption/Decryption
  • fun senc(bitstring,bitstring):bitstring.
  • reduc forall m:bitstring,n:bitstring;
  • sdec(senc(m,n),n)=m.

5.2.2. Protocol Process

We processed our protocol for the verification. We define the public key of HN using its corresponding private key, skHN, and the public key is broadcasted to all public channels as it is a public parameter. We composited infinite replication of UE, SN and HN processes in parallel for protocol processes.
Protocol Process
  • process
  • new skHN :secKey;
  • new uk :bitstring;
  • new idHN :bitstring;
  • new SNname :bitstring;
  • new SQNUE :bitstring;
  • new delta :bitstring;
  • new SUPI :bitstring;
  • let pkHN = pk(skHN) in out(usch1, (pkHN));
  • out(usch2, (pkHN));
  • out(usch3, (pkHN));
  • (!UE(SUPI,idHN,pkHN,uk,SNname,SQNUE,delta)|
  • !SN(SNname)|!HN(skHN,idHN))

5.2.3. Assertions

Using ProVerif, we can verify if the adversary can access the security parameters by reaching the state where those parameters are available. In our protocol, the private key of HN (skHN), a Long-term key at UE/HN (uk), and the Long-term identity (SUPI) were queried to verify their secrecy.
Secrecy of Parameters
  • query attacker(skHN).
  • query attacker(uk).
  • query attacker(SUPI).
The sequence of the protocol can also be verified by modeling how the messages are processed and exchanged among UE, SN and HN. Those can be verified using assertions consisting of events that represent message processing and delivery. We utilize the same naming rules for events with [29]. Therefore, for a query x, we formally define events as follows:
  • event UESendReqSN(·): UE sends a connection request with the required parameters to SN in Step 1.1.
  • event SNRecReqUE(·): SN receives a connection request with the required parameters from UE in Step 1.2.
  • event SNSendReqHN(·): SN sends a connection request with the required parameters to HN in Step 1.2.
  • event HNRecReqSN(·): HN receives the result of a connection request with the other relevant parameters from SN in Step 1.3.
  • event HNSendResSN(·): HN sends the result of a connection request with the other relevant parameters to SN in Step 2.1.
  • event SNRecResHN(·): SN receives the result of a connection request with the other relevant parameters from HN in Step 2.2.
  • event SNSendResUE(·): SN sends the result of a connection request with the other relevant parameters to HN in Step 2.2.
  • event UERecResSN(·): UE receives the result of a connection request with the other relevant parameters from SN in Step 2.3.
  • event UESendConSN(·): UE sends authentication parameters to SN in Case iii in Step 2.3.
  • event SNSendConHN(·): SN forwards ( R E S ) to HN in Case iii in Step 2.3.
  • event SNRecConUE(·): SN receives ( R E S ) from UE Case iii in Step 2.3.
  • event HNRecConSN(·): HN receives ( R E S ) from SN Case iii in Step 2.3.
  • event HNSendSUPISN(·): HN sends ( S U P I , K S E A F ) to SN in Case iii in Step 2.3.
  • event SNRecSUPIHN(·): SN receives ( S U P I , K S E A F ) from HN in Case iii in Step 2.3.
Using the events described above, we can formally verify the hypothesis “event A ==> event B”, which means that, without the execution of event B, event A cannot be executed. For example, the first two lines of the following ProVerif code of Process Verification imply that SN sends a connection request with the required parameters to HN only if HN receives the result of a connection request with the other relevant parameters from SN.
The following are the all events we verified in the implementation.
Process Verification
  • query a:bitstring,b:bitstring;
  • event(HNRecReqSN(a))  ==>   event(SNSendReqHN(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecResHN(a))  ==>   event(HNSendResSN(b)).
  • query a:bitstring,b:bitstring;
  • event(UERecResSN(a))   ==>   event(SNSendResUE(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecConUE(a))   ==>  event(UESendConSN(b)).
  • query a:bitstring,b:bitstring;
  • event(HNRecConSN(a))   ==>   event(SNSendConHN(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecSUPIHN(a))   ==>   event(HNSendSUPISN(b)).

5.2.4. Verification Results

We execute our ProVerif code on the ProVerif online demo website. As a result of the verification, we can conclude that the attacker cannot access the security keys in any state of the process. Moreover, all the sequences of executions of UE, SN, and HN are verified as defined in the protocol.
The summary of the verification results is as follows:
Verification Summary
  • Query not attacker(skHN[]) is true.
  • Query not attacker(uk[]) is true.
  • Query not attacker(SUPI[]) is true.
  • Query event(HNRecReqSN(a))  ==>   event(SNSendReqHN(b)) is true.
  • Query event(SNRecResHN(a))  ==>   event(HNSendResSN(b)) is true.
  • Query event(UERecResSN(a))  ==>   event(SNSendResUE(b)) is true.
  • Query event(SNRecConUE(a))  ==>   event(UESendConSN(b)) is true.
  • Query event(HNRecConSN(a))  ==>   event(SNSendConHN(b)) is true.
  • Query event(SNRecSUPIHN(a))  ==>   event(HNSendSUPISN(b)) is true.

6. Comparative Analysis

In this section, we conduct a comparative assessment aimed at evaluating the effectiveness of the proposed protocol by considering security requirements as well as the computational and communication overheads. For a starter, six protocols are compared against six security requirements to assess the degree of security they each offer. This analysis showcases that the proposed protocol delivers robust security measures in comparison to the others.
Next, we proceed to determine the computational overhead linked to each protocol. This involves scrutinizing the amount of cryptographic operations required within each security protocol and quantifying the computational overhead through Python. We also evaluate the communication overhead by closely examining the message dimensions described in the 3GPP standard document [3]. For that, the transmitted messages are not only inspected, but also their bit sizes are calculated to measure the communication overhead caused by each protocol.

6.1. Security Analysis

The proposed security protocol is compared to the existing protocols based on six security requirements: 5G Network and UE’s Mutual Authentication (AUTH), Secure Key Exchange (SKE), Legacy USIM Compatibility Support (LUCS), LinkaBility Attack (LBA), Active attack by Malicious SN (AMS), and Forward Secrecy for K S E A F (FS). The security requirements that each protocol satisfies are shown in Table 4.
Table 4. Comparison in terms of security requirements with existing protocols.
According to the table, all protocols satisfy the requirements for AUTH as well as SKE. However, LUCS is not supported by 5G-IPAKA and 5GAKA-LCCO. 5G-IPAKA introduces a different structure, which may result in compatibility issues. Similarly, 5GAKA-LCCO deviates from the standard by utilizing T S N and follows an unconventional protocol flow, potentially leading to compatibility problems with previous versions, i.e., reverse compatibility problems.
LBA is an attack related to compromising a UE’s location privacy. 5GAKA-LCCO eliminates the process of synchronization failure by reducing round-trip, thus preventing LBA. In the case of 5G-AKA , k H N is reused instead of SQN , which enables it to confirm the freshness of MAC and address LBA. On the other hand, 5G-AKA-FS can defend against LBA because it computes DHK in HN and reflects this key when generating values required for authentication.
In 5G-IPAKA and 5G-AKA , active attacks by malicious SN are possible because the HN delivers K S E A F to the SN without authentication of the UE. 5G-AKA, SUCI-AKA, and 5G-AKA derive the anchor key K S E A F through the long-term key k , so FS is not supported when k is leaked. 5G-IPAKA and 5GAKA-LCCO used not only k but also HN’s private key sk H N to support FS. However, if sk H N is compromised, FS for K S E A F in the past is not achieved.

6.2. Overhead Analysis

To compare the trade-off between security and resource consumption, we have compared the proposed protocol computation and communication overhead. SUCI-AKA, 5G-IPAKA, 5GAKA-LCCO, and 5G-AKA′ are other protocols improvised based on 5G-AKA. However, they do not provide complete FS. EAP-TLS1.3 and EAP-AKA′-FS are both representative protocols on the mobile network field and provide complete FS. The test results provide respectful data for a trade-off between security and resource consumption.

6.2.1. Computation Overhead

Table 5 summarizes the environment used in the experiment. The computation overhead for each protocol was measured by conducting 5000 test runs using the cryptography library in Python 3.10.11.
Table 5. Experimental environments.
As can be seen in a test result shown in Figure 5, 5G-AKA-related protocols have minor differences with 5G-AKA computation overhead. However, these protocols do not completely provide FS. The proposed protocol, with a computation overhead of 6.75 ms, provides FS and has resistance against LBA and AMS. Moreover, as can be seen in comparison with EAP-TLS1.3 and EAP-AKA′-FS, the increase in computation overhead for providing FS in the proposed protocol is low.
Figure 5. Total Computation Overhead.
The majority of the computation overhead is incurred by ECDH (Elliptic Curve Diffie–Hellman) and digital signature. To provide FS, the protocol must generate a fresh key every session, which 5G-AKA does not do on the HN side, so an increase in overhead to provide FS on protocols is mostly caused by adding fresh ECDH in the key generation phase. In EAP-AKA′-FS, HN and UE generate fresh ECDH keys in the challenge-response phase. However, the proposed protocol, with the reuse of the fresh ECDH key generated in the initiation phase. In Step 1.1, the proposed protocol computation overhead is optimized. Moreover, unlike EAP-TLS1.3, by a succession of 5G-AKA architecture, the proposed protocol does not require a digital signature. These are the reasons the proposed protocol has lower computation overhead than EAP-TLS1.3 and EAP-AKA′-FS. Considering that our proposed protocol provides strong security, this level of computational overhead is deemed acceptable. It represents a trade-off that we are willing to accept to prioritize robust security.

6.2.2. Communication Overhead

Communication overhead refers to the total message size that needs to be transferred in the network for a specific purpose. Based on the 3GPP 33.501 specification, we have analyzed the total size of the messages that are exchanged through the primary authentication phase. Table 6 refers to the size of the messages that consist of the 5G primary authentication phase.
Table 6. 5G-AKA message size.
The combination of upper messages concludes the total communication overhead of the 5G-AKA. Table 7 gives the total communication overhead of 5G-AKA, improved protocols, and for practical comparison EAP-TLS1.3 and EAP-AKA′-FS.
Table 7. Communication Overhead.
For one protocol to offer additional security properties and inherit the structure of 5G-AKA, it is most likely to use additional messages to fulfill that purpose. As a result, 5G-AKA-FS leads to a higher communication overhead than 5G-AKA. However, as compensation for this sacrifice, i.e., additional overhead, the proposed protocol offers forward secrecy by newly generating the HN’s ephemeral ECDH public key and using it as RAND in the initialization phase. Note that in 5G-AKA RAND is a 128-bit random challenge, but in 5G-AKA-FS the RAND challenge is replaced with the HN’s ephemeral ECDH public key, which is 256-bit. This results in 5G-AKA-FS having 384-bit higher communication overhead than 5G-AKA. With only 384-bit extra messages traveling through the network, 5G-AKA-FS achieves resistance against LBA and AMS and provides FS. Among 5G-AKA-related protocols, 5G-AKA-FS is the only improvised protocol that offers all three security properties. Furthermore, despite its increase, the overhead of 5G-AKA-FS remains lower than that of the EAP-TLS-1.3 protocol and EAP-AKA′-FS. The analysis results indicate that the addition of 384 extra bits for three crucial security properties are reasonably justifiable trade-offs.

7. Further Discussions

The proposed protocol has both advantages on security properties and overheads. However, implementing 5G-AKA-FS presents another challenge. While it is USIM compatible and does not require hardware exchange, software updates are required on both the UE and the 5G Core. Given that the 5G network serves as the infrastructure for connecting a massive number of devices, testing, and simulation are essential before the updates.
As for security properties, the proposed 5G-AKA-FS protocol has several limitations. For example, our protocol does not provide resistance to key compromise impersonation attacks since an attacker who obtains a permanent key k from HN can easily impersonate UE. Also, the proposed protocol does not guarantee security against ephemeral key leakage (e.g., due to side-channel attacks) because the exposure of r breaks UE anonymity. Additionally, the security of the proposed protocol relies on the safety of the cryptographic key exchange function ECDH. However, the emergence of quantum computing poses a threat to the security of legacy cryptographic algorithms including ECDH. Therefore, future research on quantum-resistant AKA using Post-Quantum Cryptography is required.

8. Conclusions

In this paper, we proposed an improved 5G-AKA (5G-AKA-FS) protocol that provides UE unlinkability and forward secrecy, and is compatible with the 3GPP standard. Implementing the proposed protocol will require the update on UE and 5G Core. However, since it is compatible with the original 5G-AKA it only needs minor software updates. Also, we proved that the 5G-AKA-FS protocol is valid by using formal verification tools BAN Logic and ProVerif. Moreover, we compared the security properties and computation/communication overheads of our 5G-AKA-FS to those of the other existing protocols, including 5G-AKA, SUCI-AKA, 5G-AKA′, 5G-IPAKA, 5GAKA-LCCO, EAP-TLS 1.3, and EAP-AKA′-FS. This comparative analysis demonstrates that the proposed protocol effectively maintains a balance between security and efficiency.

Author Contributions

Conceptualization, I.Y. and S.S.; methodology, I.Y., S.S., J.K. and J.B.; software, G.K., H.K. and J.K.; validation, I.Y., G.K. and J.K.; formal analysis, I.Y., G.K., J.K. and J.B.; investigation, I.Y. and S.S.; writing—original draft preparation, I.Y., G.K., S.S., H.K. and J.K.; writing—review and editing, I.Y., G.K., S.S., H.K., J.K. and J.B.; visualization, G.K. and H.K.; supervision, I.Y.; funding acquisition, I.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2022-00207416, A study on PQC optimization and security protocol migration to neutralize advanced quantum attacks in Beyond 5G-based next-generation IoT computing environments, 100%).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. European 5G Performance Trails its International Peers. Available online: https://www.gsma.com/membership/resources/european-5g-performance-trails-its-international-peers/ (accessed on 10 December 2023).
  2. Henry, S.; Alsohaily, A.; Sousa, E.S. 5G is real: Evaluating the compliance of the 3GPP 5G new radio system with the ITU IMT-2020 requirements. IEEE Access 2020, 8, 42828–42840. [Google Scholar] [CrossRef]
  3. 3GPP. Security Architecture and Procedures for 5G System TS33.501 v18.2.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169 (accessed on 10 December 2023).
  4. 3GPP. 3GPP System Architecture Evolution (SAE)—Security Architecture (Release 17) TS33.401 V17.4.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296 (accessed on 10 December 2023).
  5. Arkko, J.; Lehtovirta, V.; Eronen, P. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′). Technical Report. 2009. Available online: https://www.rfc-editor.org/info/rfc5448 (accessed on 10 December 2023). [CrossRef]
  6. Arkko, J.; Haverinen, H. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). Technical Report. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4187 (accessed on 10 December 2023).
  7. Jover, R.P.; Marojevic, V. Security and protocol exploit analysis of the 5G specifications. IEEE Access 2019, 7, 24956–24963. [Google Scholar] [CrossRef]
  8. Kunz, A.; Zhang, X. New 3GPP security features in 5G phase 1. In Proceedings of the 4st IEEE Conference on Standards for Communications and Networkin (CSCN ’18), Paris, France, 29–31 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar] [CrossRef]
  9. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 2019, 22, 196–248. [Google Scholar] [CrossRef]
  10. Liu, F.; Peng, J.; Zuo, M. Toward a secure access to 5G network. In Proceedings of the 17st IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ’18)/12th IEEE Conference On Big Data Science And Engineering (TrustCom/BigDataSE ’18), New York, NY, USA, 1–3 August 2018; pp. 1121–1128. [Google Scholar] [CrossRef]
  11. Hussain, S.R.; Echeverria, M.; Karim, I.; Chowdhury, O.; Bertino, E. 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. In Proceedings of the 26st ACM SIGSAC Conference on Computer and Communications Security (CCS’19), London, UK, 11–15 November 2019; ACM Press: New York, NY, USA, 2019; pp. 669–684. [Google Scholar] [CrossRef]
  12. Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef]
  13. Basin, D.; Dreier, J.; Hirschi, L.; Radomirovic, S.; Sasse, R.; Stettler, V. A formal analysis of 5G authentication. In Proceedings of the 25st ACM SIGSAC Conference on Computer and Communications Security (CCS’18), Toronto, ON, Canada, 15–19 October 2018; ACM Press: New York, NY, USA, 2018; pp. 1383–1396. [Google Scholar] [CrossRef]
  14. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  15. Xiao, Y.; Gao, S. Formal verification and analysis of 5G AKA protocol using mixed strand space model. Electronics 2022, 11, 1333. [Google Scholar] [CrossRef]
  16. Wang, Y.; Zhang, Z.; Xie, Y. Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. In Proceedings of the 30th USENIX Security Symposium (USENIX Security ’21), Online, 11–13 August 2021; USENIX Association: Vancouver, BC, Canada, 2021; pp. 3595–3612. Available online: https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen (accessed on 10 December 2023).
  17. Xiao, Y.; Wu, Y. 5G-IPAKA: An improved primary authentication and key agreement protocol for 5g networks. Information 2022, 13, 125. [Google Scholar] [CrossRef]
  18. 3GPP. Authentication and Key Management for Applications (AKMA) Based on 3GPP Credentials in the 5G System (5GS) TS 33.535 (Release 18). Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3690 (accessed on 10 December 2023).
  19. Arkko, J.; Norrman, K.; Mattsson, J.P. Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA′ FS). Internet-Draft draft-ietf-emu-aka-pfs-11, Internet Engineering Task Force. 2023. Available online: https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/11/ (accessed on 10 December 2023).
  20. Køien, G.M. The SUCI-AKA Authentication Protocol for 5G Systems. In Proceedings of the 13rd NISK Conference on Norwegian Information Security (NISK’20), Online, 23–25 November 2020; Available online: https://ojs.bibsys.no/index.php/NIK/article/view/885 (accessed on 10 December 2023).
  21. Xiao, Y.; Gao, S. 5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead. Information 2022, 13, 257. [Google Scholar] [CrossRef]
  22. Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 1990, 8, 18–36. [Google Scholar] [CrossRef]
  23. Blanchet, B.; Smyth, B.; Cheval, V.; Sylvestre, M. ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. Proverif User Manual. 2021. Available online: https://bblanche.gitlabpages.inria.fr/proverif/manual.pdf (accessed on 10 December 2023).
  24. Shoup, V. A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Paper 2001/112. 2001. Available online: https://eprint.iacr.org/2001/112 (accessed on 10 December 2023).
  25. Research, C. SEC 1: Elliptic Curve Cryptography. Standards for Efficient Cryptography. 2009. Available online: https://www.secg.org/sec1-v2.pdf (accessed on 10 December 2023).
  26. Research, C. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography. 2010. Available online: https://www.secg.org/sec2-v2.pdf (accessed on 10 December 2023).
  27. 3GPP. 3G Security Architecture TS 33.102 (Release 16). Technical Report, The 3rd Generation Partnership Project. 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2262 (accessed on 10 December 2023).
  28. ISO. ISO/IEC 29128-1:2023 Information Security, Cybersecurity and Privacy Protection—Verification of Cryptographic Protocols—Part 1: Framework. Technical Report, the International Organization for Standardization. 2023. Available online: https://standards.iteh.ai/catalog/standards/iso/5a8c7c4d-434f-4816-a4e0-b33660dd311c/iso-iec-29128-1-2023 (accessed on 10 December 2023).
  29. Damir, M.T.; Meskanen, T.; Ramezanian, S.; Niemi, V. A Beyond-5G Authentication and Key Agreement Protocol. In Proceedings of the Network and System Security—16th International Conference, NSS 2022, Denarau Island, Fiji, 9–12 December 2022; Springer: Berlin/Heidelberg, Germany, 2022; Volume 13787, pp. 249–264. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.