TLS

Transport Layer Security

Security
Introduced in Rel-4
A cryptographic protocol designed to provide secure, authenticated communication and data privacy over a network. In 3GPP systems, TLS is widely used to protect signaling and user plane traffic between network functions, and between user equipment and network servers (e.g., for IMS, HTTP-based services). It ensures integrity, confidentiality, and often mutual authentication.

Description

Transport Layer Security (TLS) is a fundamental security protocol adopted by 3GPP to protect data in transit across various network interfaces. It operates above the transport layer (typically TCP), creating a secure tunnel between two endpoints before the application layer protocol (e.g., HTTP, SIP, Diameter) exchanges any sensitive data. The protocol establishes this secure channel through a handshake procedure, where the endpoints negotiate cryptographic algorithms, authenticate each other (often using X.509 digital certificates), and derive shared session keys used for encryption and integrity protection.

The TLS architecture within a 3GPP network is pervasive. It secures web-based interfaces like the T8 reference point used by the Service Capability Exposure Function (SCEF) for IoT services, protecting northbound APIs. It secures Diameter connections between core network elements, such as between the Policy and Charging Rules Function (PCRF) and the Packet Data Network Gateway (PGW). In the IP Multimedia Subsystem (IMS), TLS protects the Mw, Mg, and Mx interfaces carrying SIP signaling. For user equipment, TLS is crucial for securing HTTPS connections to application servers, including those used for device management, authentication (e.g., for EAP-TLS), and accessing IMS services via the Ut reference point.

How TLS works involves distinct phases. The Handshake Protocol manages authentication and key establishment. The client and server exchange 'ClientHello' and 'ServerHello' messages to agree on a TLS version and cipher suite. The server then typically sends its certificate for authentication. For mutual TLS (mTLS), as required in many 3GPP service-based interfaces (SBI) in the 5G Core, the client also presents a certificate. Following authentication, a 'Premaster Secret' is exchanged and used, along with random values, to generate the 'Master Secret' from which symmetric encryption and Message Authentication Code (MAC) keys are derived. Once the handshake completes, the Record Protocol takes over, using the agreed keys to encrypt application data, provide message integrity via MACs (or authenticated encryption like AES-GCM), and optionally compress data.

TLS's role is to mitigate threats like eavesdropping, tampering, and message forgery. By ensuring confidentiality, it prevents attackers from reading sensitive information like user identities, location data, or charging records. Integrity protection ensures that commands or data cannot be altered in transit without detection. Authentication, especially mutual authentication with certificates, is critical in 5G's cloud-native, service-based architecture to prevent unauthorized network functions from interacting with each other. TLS is often combined with underlying IPsec, providing a defense-in-depth strategy, or used independently where IPsec is not feasible, such as for traffic traversing the public internet between an operator's network and a third-party application server.

Purpose & Motivation

TLS was integrated into 3GPP standards to address the critical need for securing packet-based signaling and data traffic as networks evolved from circuit-switched to all-IP architectures. Early mobile networks relied on network-level security within the radio access and core network perimeter. However, with the introduction of IMS in Release 5 and the increasing use of IP-based services, traffic began traversing less-trusted paths, including connections to external application servers and between data centers. This exposed sensitive control plane signaling (e.g., SIP, Diameter) and user data to interception and manipulation.

The protocol solves the problem of providing robust, standards-based security for application-layer protocols that lack native protection. Before its widespread adoption, proprietary or weaker security mechanisms were sometimes used, creating vulnerabilities and interoperability challenges. TLS provides a well-vetted, industry-standard solution for authentication, confidentiality, and integrity. Its creation and evolution (from its predecessor, SSL) were motivated by the broader Internet's security needs, which 3GPP leveraged to secure its own ecosystem.

In later releases, especially with 5G, the purpose of TLS expanded further. The shift to a Service-Based Architecture (SBA) with HTTP/2 APIs (e.g., Nnrf, Nausf) required a transport-agnostic security mechanism that could work efficiently in cloud environments. Mutual TLS (mTLS) became mandatory for many service-based interfaces, solving the problem of machine-to-machine authentication in a dynamic, microservices-based core network where network functions are ephemeral. TLS 1.3, mandated in later 5G releases, addresses limitations of older versions by providing stronger cryptographic algorithms, faster handshakes through 1-RTT and 0-RTT modes, and improved resistance to downgrade attacks, aligning with modern security best practices and performance requirements.

Key Features

  • Provides confidentiality through symmetric encryption (e.g., AES, ChaCha20)
  • Ensures message integrity and authenticity via Message Authentication Codes (MACs) or authenticated encryption
  • Supports endpoint authentication using X.509 digital certificates, including mutual authentication (mTLS)
  • Negotiates cryptographic parameters via an extensible handshake protocol
  • Offers forward secrecy through ephemeral key exchange methods (e.g., DHE, ECDHE)
  • Widely deployed across 3GPP interfaces for signaling (Diameter, SIP, HTTP/2) and user plane protection

Evolution Across Releases

Defining Specifications

SpecificationTitle
TS 21.905 3GPP TS 21.905
TS 23.057 3GPP TS 23.057
TS 23.179 3GPP TS 23.179
TS 23.280 3GPP TS 23.280
TS 23.333 3GPP TS 23.333
TS 23.334 3GPP TS 23.334
TS 23.379 3GPP TS 23.379
TS 23.701 3GPP TS 23.701
TS 23.722 3GPP TS 23.722
TS 24.109 3GPP TS 24.109
TS 24.141 3GPP TS 24.141
TS 24.147 3GPP TS 24.147
TS 24.229 3GPP TS 24.229
TS 24.259 3GPP TS 24.259
TS 24.322 3GPP TS 24.322
TS 24.423 3GPP TS 24.423
TS 24.482 3GPP TS 24.482
TS 24.572 3GPP TS 24.572
TS 24.623 3GPP TS 24.623
TS 26.247 3GPP TS 26.247
TS 26.348 3GPP TS 26.348
TS 26.512 3GPP TS 26.512
TS 26.804 3GPP TS 26.804
TS 26.998 3GPP TS 26.998
TS 29.116 3GPP TS 29.116
TS 29.162 3GPP TS 29.162
TS 29.333 3GPP TS 29.333
TS 29.334 3GPP TS 29.334
TS 29.368 3GPP TS 29.368
TS 29.573 3GPP TS 29.573
TS 29.819 3GPP TS 29.819
TS 29.890 3GPP TS 29.890
TS 29.893 3GPP TS 29.893
TS 32.501 3GPP TR 32.501
TS 32.583 3GPP TR 32.583
TS 32.593 3GPP TR 32.593
TS 33.107 3GPP TR 33.107
TS 33.108 3GPP TR 33.108
TS 33.122 3GPP TR 33.122
TS 33.127 3GPP TR 33.127
TS 33.141 3GPP TR 33.141
TS 33.203 3GPP TR 33.203
TS 33.222 3GPP TR 33.222
TS 33.320 3GPP TR 33.320
TS 33.328 3GPP TR 33.328
TS 33.501 3GPP TR 33.501
TS 33.739 3GPP TR 33.739
TS 33.823 3GPP TR 33.823
TS 33.841 3GPP TR 33.841
TS 33.848 3GPP TR 33.848
TS 33.863 3GPP TR 33.863
TS 33.876 3GPP TR 33.876
TS 33.938 3GPP TR 33.938
TS 33.969 3GPP TR 33.969