telecom • networking • design

an EventHelix.com blog


1 Comment

LTE security: encryption and integrity protection call flow

LTE key hierarchy

LTE security is based on a shared secret key K between the USIM and the HSS. The UE, the eNodeB and the MME derive keys for encryption and integrity protection from K.

The derived keys are used for:

  • NAS encryption and integrity protection
  • RRC encryption and integrity protection
  • User plane encryption

The key derivation and the key exchange call flow is described in the following link:

LTE security procedure: authentication, encryption and integrity protection

Advertisements