CA

Certification Authority

Security
Introduced in R99
A trusted entity that issues and manages digital certificates in 3GPP networks, enabling secure authentication and communication. It establishes a Public Key Infrastructure (PKI) to verify the identity of network elements, users, and services, forming the foundation for trust in security protocols.

Description

A Certification Authority (CA) is a fundamental component of the Public Key Infrastructure (PKI) within 3GPP security architectures. It is a trusted third-party entity responsible for issuing, revoking, and managing digital certificates. These certificates bind a public key to the identity of a subscriber, a network function (like a gNB or AMF), or a service, enabling cryptographic verification. The CA's core operation involves verifying the identity of an entity requesting a certificate (the subject), signing the certificate with its own private key to create a trusted credential, and publishing the corresponding Certificate Revocation List (CRL) or supporting Online Certificate Status Protocol (OCSP) to declare invalidated certificates. The trust in the entire system hinges on the CA's private key being securely safeguarded and its operational policies being rigorously audited.

In a 3GPP ecosystem, multiple CAs can exist, forming a hierarchy. A root CA, which is self-signed and inherently trusted, issues certificates to subordinate intermediate CAs. These intermediate CAs then issue end-entity certificates to network elements and User Equipment (UE). This hierarchical model allows for scalable trust management and limits the exposure of the root CA's critical private key. The validation of a certificate involves verifying the digital signature chain back to a trusted root CA certificate pre-provisioned in the verifying entity's trust store. This process is central to protocols like TLS/DTLS for securing N1, N2, and N3 interfaces in 5G, and for authentication in scenarios like 5G Network Function service-based architecture.

The CA's role extends beyond mere issuance. It enforces a Certificate Policy (CP) and Certification Practice Statement (CPS) that define the security controls, lifecycle management procedures, and liability frameworks. Key management ceremonies for CA key generation and storage are performed in highly secure, often offline, Hardware Security Modules (HSMs). In 3GPP, CAs support various certificate profiles as defined in specifications, including those for UICC, SUCI/SUPI protection, and network function authentication. The integrity of the PKI, and thus the security of authentication and confidentiality mechanisms in 3GPP networks, is directly dependent on the correct and secure operation of the Certification Authority.

Purpose & Motivation

The Certification Authority exists to solve the fundamental problem of establishing trust in a large-scale, distributed digital environment like a mobile network. Prior to PKI, secure key distribution for symmetric cryptography was cumbersome and did not scale for millions of subscribers and thousands of network nodes. The CA enables asymmetric cryptography by providing a verifiable and trusted association between a public key and an identity. This allows any entity to verify the authenticity of another entity without pre-sharing a secret, which is essential for scenarios like initial network attachment, roaming, and secure service discovery.

Historically, as 3GPP networks evolved from 2G (which used a shared secret in the SIM) to 3G and beyond, the need for more flexible, service-oriented security grew. The introduction of IP-based services, IMS, and later cloud-native 5G core networks demanded a standardized, interoperable method for authentication and secure communication between previously unknown parties. The CA and PKI provide this by decoupling the trust establishment (managed by the CA) from the secure communication (executed by the end entities using certificates). It addresses limitations of proprietary or centralized key management systems by providing a standardized, scalable, and auditable framework for digital trust that underpins modern 3GPP security features like AKA, EAP-TLS, and SEAL.

Key Features

  • Issues and signs X.509 digital certificates binding identities to public keys
  • Maintains a Certificate Revocation List (CRL) or supports OCSP for status validation
  • Operates within a hierarchical PKI structure with root and subordinate CAs
  • Enforces a defined Certificate Policy and Certification Practice Statement
  • Utilizes Hardware Security Modules for secure key generation and storage
  • Supports 3GPP-specific certificate profiles for UEs and Network Functions

Evolution Across Releases

Defining Specifications

SpecificationTitle
TS 21.905 3GPP TS 21.905
TS 22.980 3GPP TS 22.980
TS 23.057 3GPP TS 23.057
TS 24.109 3GPP TS 24.109
TS 24.587 3GPP TS 24.587
TS 25.211 3GPP TS 25.211
TS 25.214 3GPP TS 25.214
TS 25.222 3GPP TS 25.222
TS 26.917 3GPP TS 26.917
TS 28.314 3GPP TS 28.314
TS 29.109 3GPP TS 29.109
TS 31.113 3GPP TR 31.113
TS 32.373 3GPP TR 32.373
TS 32.376 3GPP TR 32.376
TS 32.501 3GPP TR 32.501
TS 32.808 3GPP TR 32.808
TS 33.220 3GPP TR 33.220
TS 33.221 3GPP TR 33.221
TS 33.222 3GPP TR 33.222
TS 33.303 3GPP TR 33.303
TS 33.310 3GPP TR 33.310
TS 33.320 3GPP TR 33.320
TS 33.776 3GPP TR 33.776
TS 33.790 3GPP TR 33.790
TS 33.805 3GPP TR 33.805
TS 33.820 3GPP TR 33.820
TS 33.823 3GPP TR 33.823
TS 33.876 3GPP TR 33.876
TS 33.880 3GPP TR 33.880
TS 33.885 3GPP TR 33.885
TS 33.969 3GPP TR 33.969
TS 36.101 3GPP TR 36.101
TS 36.104 3GPP TR 36.104
TS 36.108 3GPP TR 36.108
TS 36.141 3GPP TR 36.141
TS 36.181 3GPP TR 36.181
TS 36.300 3GPP TR 36.300
TS 36.307 3GPP TR 36.307
TS 36.331 3GPP TR 36.331
TS 36.714 3GPP TR 36.714
TS 36.715 3GPP TR 36.715
TS 36.716 3GPP TR 36.716
TS 36.761 3GPP TR 36.761
TS 36.770 3GPP TR 36.770
TS 36.790 3GPP TR 36.790
TS 36.807 3GPP TR 36.807
TS 36.808 3GPP TR 36.808
TS 36.825 3GPP TR 36.825
TS 36.852 3GPP TR 36.852
TS 36.853 3GPP TR 36.853
TS 36.855 3GPP TR 36.855
TS 36.858 3GPP TR 36.858
TS 36.860 3GPP TR 36.860
TS 36.867 3GPP TR 36.867
TS 36.894 3GPP TR 36.894
TS 36.895 3GPP TR 36.895
TS 36.899 3GPP TR 36.899
TS 37.104 3GPP TR 37.104
TS 37.141 3GPP TR 37.141
TS 37.145 3GPP TR 37.145
TS 37.320 3GPP TR 37.320
TS 37.716 3GPP TR 37.716
TS 37.717 3GPP TR 37.717
TS 37.718 3GPP TR 37.718
TS 37.808 3GPP TR 37.808
TS 37.812 3GPP TR 37.812
TS 37.814 3GPP TR 37.814
TS 37.842 3GPP TR 37.842
TS 37.843 3GPP TR 37.843
TS 37.863 3GPP TR 37.863
TS 37.864 3GPP TR 37.864
TS 37.865 3GPP TR 37.865
TS 37.866 3GPP TR 37.866
TS 37.872 3GPP TR 37.872
TS 37.878 3GPP TR 37.878
TS 37.898 3GPP TR 37.898
TS 37.901 3GPP TR 37.901
TS 37.985 3GPP TR 37.985
TS 38.101 3GPP TR 38.101
TS 38.104 3GPP TR 38.104
TS 38.108 3GPP TR 38.108
TS 38.113 3GPP TR 38.113
TS 38.124 3GPP TR 38.124
TS 38.133 3GPP TR 38.133
TS 38.141 3GPP TR 38.141
TS 38.161 3GPP TR 38.161
TS 38.174 3GPP TR 38.174
TS 38.175 3GPP TR 38.175
TS 38.176 3GPP TR 38.176
TS 38.181 3GPP TR 38.181
TS 38.202 3GPP TR 38.202
TS 38.307 3GPP TR 38.307
TS 38.331 3GPP TR 38.331
TS 38.521 3GPP TR 38.521
TS 38.522 3GPP TR 38.522
TS 38.523 3GPP TR 38.523
TS 38.561 3GPP TR 38.561
TS 38.716 3GPP TR 38.716
TS 38.717 3GPP TR 38.717
TS 38.718 3GPP TR 38.718
TS 38.719 3GPP TR 38.719
TS 38.746 3GPP TR 38.746
TS 38.750 3GPP TR 38.750
TS 38.755 3GPP TR 38.755
TS 38.792 3GPP TR 38.792
TS 38.793 3GPP TR 38.793
TS 38.803 3GPP TR 38.803
TS 38.804 3GPP TR 38.804
TS 38.810 3GPP TR 38.810
TS 38.817 3GPP TR 38.817
TS 38.820 3GPP TR 38.820
TS 38.825 3GPP TR 38.825
TS 38.831 3GPP TR 38.831
TS 38.839 3GPP TR 38.839
TS 38.841 3GPP TR 38.841
TS 38.842 3GPP TR 38.842
TS 38.846 3GPP TR 38.846
TS 38.870 3GPP TR 38.870
TS 38.873 3GPP TR 38.873
TS 38.880 3GPP TR 38.880
TS 38.881 3GPP TR 38.881
TS 38.884 3GPP TR 38.884
TS 38.889 3GPP TR 38.889
TS 38.894 3GPP TR 38.894
TS 38.899 3GPP TR 38.899
TS 38.903 3GPP TR 38.903