Description
RSA (Rivest-Shamir-Adleman) is an asymmetric cryptographic algorithm that forms a fundamental part of security architectures in 3GPP standards. It operates on the principle of a public key and a private key pair, where the public key is used for encryption or signature verification, and the private key is kept secret for decryption or signature generation. In 3GPP systems, RSA is employed in various security mechanisms, including authentication, key agreement, and digital signatures for network elements and user equipment (UE). The algorithm's security relies on the computational difficulty of factoring large integers, which are derived from two large prime numbers.
Within 3GPP networks, RSA works by integrating into higher-layer protocols and interfaces. For example, in the authentication and key agreement (AKA) procedures, RSA may be used for securing the exchange of keys between the UE and network, particularly in early 3G releases. The architecture involves components such as the Home Subscriber Server (HSS), Authentication Centre (AuC), and UE's universal integrated circuit card (UICC) or SIM. RSA keys are generated and managed by certification authorities (CAs) and distributed via public key infrastructure (PKI) systems, ensuring that only authorized entities can participate in secure communications. Specifications like 3GPP TS 33.303 (for PKI) and TS 31.113 (for UICC security) detail the implementation and usage of RSA.
The algorithm's role extends to securing signaling and user plane data. In protocols like IPsec and TLS used for core network interfaces (e.g., N1, N2 in 5G), RSA can be utilized for key exchange during tunnel establishment. Additionally, RSA digital signatures verify the authenticity of software updates, certificates, and network messages, preventing tampering and spoofing. Its integration into 3GPP systems ensures end-to-end security across radio access and core network domains, protecting against eavesdropping, man-in-the-middle attacks, and unauthorized access.
Purpose & Motivation
RSA was adopted in 3GPP standards starting from Release 6 to address the growing need for robust security in cellular networks, especially with the transition to packet-switched services and internet connectivity. Prior asymmetric cryptosystems were less standardized or efficient, and symmetric-key algorithms alone could not provide scalable authentication and key distribution. RSA's introduction enabled secure key exchange without pre-shared secrets, facilitating large-scale deployments and interoperability across different vendors and operators.
The motivation for including RSA stemmed from the limitations of earlier security mechanisms in 2G and early 3G systems, which relied heavily on symmetric cryptography and had vulnerabilities to certain attacks. RSA provided a way to implement digital signatures for network authentication and non-repudiation, enhancing trust in roaming scenarios and service access. It also supported the evolution towards IP-based networks, where public-key infrastructure became essential for securing interfaces like those between network functions.
Furthermore, RSA's role in 3GPP evolved to support advanced features such as secure service provisioning, lawful interception, and device integrity verification. As networks progressed to 4G and 5G, RSA continued to be relevant for certificate-based authentication and backward compatibility, even as newer algorithms like elliptic curve cryptography (ECC) gained prominence for efficiency. Its enduring presence underscores its importance in maintaining a layered security approach within 3GPP architectures.
Key Features
- Asymmetric encryption using public and private key pairs
- Supports digital signatures for authentication and integrity
- Enables secure key exchange without pre-shared secrets
- Based on the mathematical difficulty of integer factorization
- Integrates with PKI for certificate management
- Used in AKA procedures and network interface security
Evolution Across Releases
Introduced RSA into 3GPP specifications for enhanced security, primarily for digital signatures and key management in packet-switched domains. It was integrated into authentication protocols and PKI frameworks to support secure service access and roaming across UMTS and early HSPA networks.
Defining Specifications
| Specification | Title |
|---|---|
| TS 21.905 | 3GPP TS 21.905 |
| TS 31.113 | 3GPP TR 31.113 |
| TS 32.808 | 3GPP TR 32.808 |