NAA

Network Access Application

Security
Introduced in Rel-8
A secure application residing on the Universal Integrated Circuit Card (UICC) or SIM card that manages the authentication and key agreement procedures between a User Equipment (UE) and the mobile network. It is the software entity that executes the 3GPP authentication algorithms.

Description

The Network Access Application (NAA) is a critical security application that resides in the secure execution environment of the Universal Integrated Circuit Card (UICC), which includes SIM, USIM, and ISIM cards. Its primary function is to perform the authentication and key agreement (AKA) procedures defined by 3GPP standards. The NAA acts as the endpoint in the UE for the challenge-response protocol that verifies the subscriber's identity to the network and establishes ciphering and integrity protection keys for secure communications. Each type of network access (GSM, UMTS, LTE, 5G) has a corresponding NAA: the SIM application for GSM, the USIM application for UMTS/LTE, and the ISIM application for IMS access.

Architecturally, the NAA is a Java Card applet or a native application running on the UICC's microprocessor. It contains the subscriber's unique secret key (Ki for GSM, K for UMTS/5G) and the implemented authentication algorithms (e.g., COMP128 for GSM, Milenage or TUAK for UMTS/5G). When the UE attempts to attach to the network, the serving network (e.g., MME, SGSN) forwards an authentication vector received from the home network's Authentication Centre (AuC) or Unified Data Management (UDM). This vector contains a random challenge (RAND) and an expected response (XRES), among other parameters. The RAND is sent to the UE and passed to the NAA on the UICC.

The NAA then uses the secret key (K) and the received RAND to compute a response (RES) and ciphering/integrity keys (CK, IK). The computed RES is sent back to the network for verification against the XRES. If they match, authentication is successful, and the network instructs the UE to use the derived CK and IK for securing the radio interface. The NAA ensures the secret key never leaves the secure boundary of the UICC. For 5G, the NAA (within the USIM) also computes the anchor key KAUSF, which is used to derive further keys in the UE's tamper-resistant storage, enabling enhanced key hierarchy separation. The NAA's role is purely computational and responsive; it does not initiate procedures but securely executes the algorithms defined by the network's challenge.

Purpose & Motivation

The Network Access Application exists to provide a standardized, secure, and portable method for subscriber authentication and key generation in mobile networks. Its creation was motivated by the need to move sensitive cryptographic operations and subscriber credentials out of the potentially less secure handset and into a dedicated, tamper-resistant hardware module—the UICC. Before the UICC/NAA model, early analog systems had minimal authentication, and proprietary solutions were insecure. The GSM SIM introduced this concept, and it evolved into the USIM/NAA for 3G and beyond.

The NAA solves several key problems: it ensures subscriber identity confidentiality and network security by safeguarding the long-term secret key. It enables interoperability, as a single UICC with the appropriate NAA can be used in any compliant handset worldwide. It also provides a clear separation between the subscriber's subscription (on the UICC) and the device itself, facilitating easy device swapping. The evolution from SIM to USIM to ISIM NAA addressed the limitations of earlier algorithms, such as the vulnerabilities in GSM's COMP128, by introducing stronger mutual authentication (in UMTS and beyond), longer key lengths, and more robust cryptographic algorithms to protect against emerging threats like false base station attacks.

Key Features

  • Resides on the secure UICC (SIM/USIM/ISIM) hardware
  • Stores the subscriber's long-term secret authentication key (K)
  • Executes the 3GPP Authentication and Key Agreement (AKA) protocol
  • Computes the authentication response (RES) and ciphering keys (CK, IK)
  • Provides a tamper-resistant environment for cryptographic operations
  • Enables subscriber mobility and device independence

Evolution Across Releases

Rel-8 Initial

Formally introduced the term 'Network Access Application' (NAA) within the context of UICC security specifications. This release solidified the architectural model where the USIM application acts as the primary NAA for EPS (LTE) access, supporting the EPS AKA protocol derived from UMTS AKA.

Defining Specifications

SpecificationTitle
TS 22.937 3GPP TS 22.937
TS 31.131 3GPP TR 31.131