AK

Anonymity Key

Security
Introduced in Rel-4
A cryptographic key used in 3GPP networks to protect user identity during authentication procedures. It prevents tracking of subscribers by ensuring temporary identities cannot be linked to permanent identifiers. This is fundamental for subscriber privacy in mobile communications.

Description

The Anonymity Key (AK) is a fundamental cryptographic element within 3GPP's Authentication and Key Agreement (AKA) framework, specifically designed to protect user identity privacy. It is generated by the Authentication Centre (AuC) or Home Subscriber Server (HSS) as part of the quintet or authentication vector generation process for 3G UMTS or as part of the authentication vector for EPS AKA in 4G/LTE and 5G AKA in 5G systems. The AK is derived using a key derivation function (KDF) that takes the subscriber's permanent secret key (K) and a random challenge (RAND) generated by the network as inputs. This derivation ensures the AK is unique for each authentication instance.

In operation, the AK is used to conceal the subscriber's permanent identity, the International Mobile Subscriber Identity (IMSI), when temporary identities like the Temporary Mobile Subscriber Identity (TMSI) in 3G/4G or the 5G-GUTI in 5G are used. During initial network attachment or when a temporary identity cannot be validated, the network may request the permanent identity. To prevent eavesdroppers from capturing the IMSI in plaintext, the AK is used to encrypt it. Specifically, the IMSI is XORed with a keystream generated from the AK (and often other parameters like the sequence number SQN) before transmission over the air interface. Only the legitimate network, possessing the same AK, can decrypt this to retrieve the true IMSI.

The AK's role is distinct from other keys in the AKA hierarchy, such as the Cipher Key (CK) and Integrity Key (IK), which protect user data and signaling messages. The AK is solely focused on identity protection. Its strength relies on the randomness of the RAND and the secrecy of the root key K. The separation of the anonymity function from confidentiality and integrity functions is a key architectural principle, allowing for independent evaluation and potential algorithmic updates. In 5G, the principles remain, though the key hierarchy is enhanced with the anchor key K_AUSF, and privacy mechanisms are strengthened within the 5G AKA and EAP-AKA' protocols.

The effectiveness of the AK mechanism is critical for mitigating subscriber location tracking and identity capture attacks. By ensuring the permanent identity is never transmitted in the clear, it addresses a significant privacy vulnerability present in early cellular systems. The AK is a core component in fulfilling 3GPP's regulatory and design requirements for subscriber privacy, making it an indispensable element across UMTS, EPS, and 5G System security architectures.

Purpose & Motivation

The Anonymity Key was introduced to solve the critical privacy vulnerability of subscriber identity capture in mobile networks. In early 2G GSM systems, the IMSI could be transmitted in plaintext during initial network registration or under certain failure conditions, allowing passive eavesdroppers to identify and track subscribers. This represented a significant privacy threat, enabling user profiling, location tracking, and targeted attacks. The creation of the AK as part of the 3G UMTS security architecture was a direct response to this limitation, embedding strong cryptographic identity protection into the core network authentication protocol from the outset.

The primary problem the AK addresses is the linkability of user sessions and actions. Without it, an adversary could correlate temporary identities with permanent ones by capturing an initial plaintext IMSI transmission. The AK breaks this link by ensuring the permanent identity is always encrypted when necessary for recovery procedures. This design protects subscriber confidentiality, a fundamental requirement in modern telecommunications standards and data protection regulations like the GDPR. It ensures that even if signaling messages are intercepted, the user's long-term identity remains hidden from unauthorized parties.

Furthermore, the AK supports network operational efficiency. It allows networks to freely use and reallocate temporary identities (TMSI, 5G-GUTI) for routing and paging without compromising privacy. The system can recover from temporary identity synchronization failures (e.g., when a mobile device presents a TMSI the network no longer recognizes) by securely requesting the permanent identity, all while maintaining over-the-air protection. Thus, the AK enables a practical balance between robust privacy and reliable network access, a motivation central to its inclusion and persistence from 3G UMTS (Release 4) through all subsequent 5G releases.

Key Features

  • Cryptographically conceals the International Mobile Subscriber Identity (IMSI) during transmission
  • Derived from the subscriber's permanent secret key (K) and a random challenge (RAND) using a Key Derivation Function
  • Integral part of the Authentication Vector generated by the HSS/AuC for 3G, 4G, and 5G AKA procedures
  • Enables secure recovery of permanent identity when temporary identity (TMSI/5G-GUTI) resolution fails
  • Provides separation of identity protection from user data confidentiality and signaling integrity functions
  • Fundamental for preventing subscriber tracking and meeting regulatory privacy requirements

Evolution Across Releases

Rel-4 Initial

Introduced as part of the UMTS Authentication and Key Agreement (AKA) protocol. The initial architecture defined the AK's generation in the Authentication Centre (AuC) within the authentication quintet (RAND, XRES, CK, IK, AK). Its primary capability was to encrypt the IMSI using XOR with a keystream derived from AK and SQN, providing the first cryptographic subscriber identity protection in 3GPP standards.

Defining Specifications

SpecificationTitle
TS 21.905 3GPP TS 21.905
TS 29.109 3GPP TS 29.109
TS 31.102 3GPP TR 31.102
TS 31.103 3GPP TR 31.103
TS 33.102 3GPP TR 33.102
TS 33.105 3GPP TR 33.105
TS 33.220 3GPP TR 33.220
TS 33.221 3GPP TR 33.221
TS 33.401 3GPP TR 33.401
TS 35.205 3GPP TR 35.205
TS 35.909 3GPP TR 35.909
TS 35.934 3GPP TR 35.934