telecom • networking • design

an EventHelix.com blog

LTE security: encryption and integrity protection call flow

1 Comment

LTE key hierarchy

LTE security is based on a shared secret key K between the USIM and the HSS. The UE, the eNodeB and the MME derive keys for encryption and integrity protection from K.

The derived keys are used for:

  • NAS encryption and integrity protection
  • RRC encryption and integrity protection
  • User plane encryption

The key derivation and the key exchange call flow is described in the following link:

LTE security procedure: authentication, encryption and integrity protection

About these ads

One thought on “LTE security: encryption and integrity protection call flow

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 42 other followers