E2EE

End-to-End Encryption

Security
Introduced in Rel-14
E2EE is a security method where data is encrypted on the sender's device and only decrypted on the recipient's device, preventing intermediaries like network operators or service providers from accessing the plaintext. In 3GPP, it secures user communication services like messaging and calling. It ensures privacy even against infrastructure providers.

Description

End-to-End Encryption (E2EE) in 3GPP standards is a security paradigm applied primarily to communication services where cryptographic protection is applied at the originating user equipment (UE) and is only removed at the terminating UE or intended application. The encryption and decryption keys are solely under the control of the communicating endpoints; they are not accessible to network nodes, including radio access network (RAN) elements, core network functions, or application servers operated by the service provider. This ensures that the content of the communication (e.g., text, voice, video, files) remains confidential to all parties except the intended sender and receiver, providing a strong privacy guarantee.

Architecturally, 3GPP E2EE is implemented at the application layer, separate from the underlying access security provided by the network (like NAS and AS security in 5G). The standards, such as those for the IP Multimedia Subsystem (IMS) and conversational services, define protocols and procedures for key management and secure media exchange. A typical E2EE system involves several key components: an identity and key management system (often based on public key infrastructure), a key agreement protocol (like Diffie-Hellman or Elliptic Curve variants), and a media encryption protocol (such as SRTP for voice/video). The 3GPP specifications define how these components integrate with existing IMS procedures for registration, session initiation (via SIP), and media negotiation.

The process works as follows: First, users must authenticate to a service and potentially exchange long-term public keys or identity keys. When initiating a secure session (e.g., a call or chat), the endpoints engage in a key agreement protocol, often integrated into the session signaling (e.g., within SIP/SDP messages). This results in a shared secret session key known only to the two UEs. All media packets are then encrypted with this key using a symmetric cipher (like AES) before being sent over the network. The IMS core (CSCF, etc.) and media gateways forward the encrypted signaling and media packets but cannot decrypt them. Some systems also provide forward secrecy by generating new session keys periodically.

E2EE's role in the network is to provide a supplemental, user-centric layer of security on top of the network-provided security. While network access security protects the radio link and core network signaling from eavesdropping, E2EE protects the content from the service provider itself and any compromised network elements. This is crucial for building user trust, especially for sensitive communications. It also enables compliance with stringent data protection regulations. The management of E2EE, including key distribution and verification (e.g., through key fingerprint comparison), is designed to be user-friendly, often integrated into the service client application.

Purpose & Motivation

End-to-End Encryption (E2EE) was introduced into 3GPP standards, starting in Release 14, primarily to address growing demands for user privacy and to provide a stronger security model for conversational services. Traditional mobile network security, while robust for access and signaling, terminates at the network edge—data is decrypted within the operator's core network for processing, routing, or lawful interception. This model inherently trusts the network operator and service provider with the plaintext content, which became a concern with the rise of pervasive digital communication and high-profile data breaches.

The motivation for standardizing E2EE was multi-faceted. Firstly, consumer messaging apps like WhatsApp and Signal popularized E2EE, raising user expectations for privacy in all communication services, including those provided by telecom operators. Secondly, regulatory environments like the GDPR in Europe emphasized data minimization and privacy-by-design, pushing for technical measures that limit service providers' access to personal data. E2EE directly addresses this by making content inaccessible to the provider. Thirdly, it mitigates risks associated with centralized data storage; a breach of an operator's servers would not compromise the content of E2EE-protected communications.

Prior to standardized E2EE, operator-provided rich communication services (RCS) and IMS-based services lacked this level of content privacy. The limitation was that security ended at the network gateway. Standardization aimed to provide an interoperable, carrier-grade E2EE solution that could be integrated into IMS and other 3GPP service frameworks, allowing operators to offer competitive and secure services. It solved the problem of maintaining user trust in an era where the network operator is no longer the only—or most trusted—party in the communication chain.

Key Features

  • Encryption and decryption occur solely on the end-user devices, not on network nodes
  • Uses asymmetric cryptography for key agreement (e.g., Elliptic Curve Diffie-Hellman)
  • Provides forward secrecy, where compromise of long-term keys does not expose past sessions
  • Integrates with IMS signaling (SIP/SDP) for in-band key negotiation
  • Supports media encryption for voice, video, and messaging content
  • Includes mechanisms for key verification (e.g., fingerprint comparison) to prevent man-in-the-middle attacks

Evolution Across Releases

Rel-14 Initial

Introduced standardized End-to-End Encryption for IMS-based services, specifying the framework and requirements in TS 23.782. It defined the initial architecture for key management and media security, focusing on securing one-to-one conversational messaging within the RCS ecosystem.

Defining Specifications

SpecificationTitle
TS 23.282 3GPP TS 23.282
TS 23.283 3GPP TS 23.283
TS 23.379 3GPP TS 23.379
TS 23.782 3GPP TS 23.782
TS 23.783 3GPP TS 23.783
TS 24.883 3GPP TS 24.883