Skip to Main content Skip to Navigation
Conference papers

The 5G-AKA Authentication Protocol Privacy

Abstract : We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the use of asymmetric randomized encryption. Nonetheless, we show that except for the IMSI-catcher attack, all known attacks against 5G-AKA privacy still apply. Next, we modify the 5G-AKA protocol to prevent these attacks, while satisfying 5G-AKA efficiency constraints as much as possible. We then formally prove that our protocol is σunlinkable. This is a new security notion, which allows for a fine-grained quantification of a protocol privacy. Our security proof is carried out in the Bana-Comon indistinguishability logic. We also prove mutual authentication as a secondary result.
Document type :
Conference papers
Complete list of metadata

https://hal.inria.fr/hal-03155483
Contributor : Adrien Koutsos <>
Submitted on : Monday, March 1, 2021 - 8:31:54 PM
Last modification on : Thursday, March 4, 2021 - 3:29:10 AM

File

aka-privacy(1).pdf
Files produced by the author(s)

Identifiers

Citation

Adrien Koutsos. The 5G-AKA Authentication Protocol Privacy. EuroS&P 2019 - IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.464-479, ⟨10.1109/EuroSP.2019.00041⟩. ⟨hal-03155483⟩

Share

Metrics

Record views

11

Files downloads

91