Description
The Universal Subscriber Identity Module (USIM) is the cornerstone of subscriber security and identity management in 3GPP networks from UMTS (3G) onwards. It is not the physical card itself (that is the UICC) but a dedicated application that runs on the UICC's secure microprocessor. The USIM's primary functions are to securely store the subscriber's unique identity (IMSI), authenticate the subscriber to the network, generate session keys for encryption and integrity protection, and manage subscriber-related data like the phonebook and SMS.
Architecturally, the USIM interacts with the Mobile Equipment (ME) via a standardized interface (ETSI/3GPP TS 31.101). When a device powers on or enters a new network area, the ME requests the International Mobile Subscriber Identity (IMSI) from the USIM. This IMSI is sent to the network to initiate an authentication procedure. The network's Authentication Centre (AuC) generates an authentication vector containing a random challenge (RAND), an expected response (XRES), a ciphering key (CK), and an integrity key (IK). The RAND is sent to the USIM.
The USIM, using a secret key (K) stored securely within it and a cryptographic algorithm (MILENAGE for 3G/4G/5G), computes a response (RES) and the same CK and IK. The ME sends the RES back to the network for verification. If RES matches XRES, authentication is successful. The CK and IK are then used by the device and network to encrypt and integrity-protect all subsequent communications. This process, known as Authentication and Key Agreement (AKA), ensures that only a legitimate subscriber with the correct USIM can access the network and that the communication is secure.
Beyond core authentication, the USIM provides a secure storage area for subscriber data, network selection preferences, and service provider applications (like OTA provisioning). In 5G, the USIM's role evolves to support the 5G AKA protocol and store new identifiers like the Subscription Concealed Identifier (SUCI) for enhanced privacy. It acts as a root of trust, enabling secure bootstrapping for other services and acting as a secure element for mobile commerce and digital identity applications.
Purpose & Motivation
The USIM was introduced with 3G UMTS to address security weaknesses in the 2G SIM (Subscriber Identity Module). The 2G SIM used the COMP128 algorithm, which had known vulnerabilities, and the GSM authentication was one-way (network authenticates the subscriber) with weaker encryption algorithms. The move to 3G required a stronger, mutual authentication mechanism and enhanced cryptographic capabilities to protect new data and multimedia services.
The creation of the USIM provided a standardized, future-proof platform for subscriber identity. It separated the secure application (USIM) from the physical card (UICC), allowing multiple applications (like ISIM for IMS) to coexist. This modularity was crucial for the convergence of services. The USIM's secure execution environment and storage protect the long-term secret key (K) from extraction, forming an immutable root of trust for the entire mobile ecosystem.
Its ongoing evolution is driven by the need for stronger privacy (e.g., SUCI in 5G to protect the IMSI), support for new authentication frameworks (EAP-AKA', 5G AKA), and enabling new use cases like network slicing identification and secure services for IoT. The USIM solves the fundamental problem of securely and portably binding a subscriber identity to a subscription, enabling global roaming, secure service access, and trusted transaction capabilities.
Key Features
- Secure storage of long-term subscriber key (K) and IMSI
- Execution of Authentication and Key Agreement (AKA) algorithms
- Generation of session ciphering (CK) and integrity keys (IK)
- Secure storage for phonebook, SMS, and service settings
- Support for Over-The-Air (OTA) provisioning and management
- Platform for hosting other secure applications (e.g., ISIM)
Evolution Across Releases
Introduced as the successor to the 2G SIM for UMTS. Provided mutual authentication between UE and network using the UMTS AKA protocol, stronger encryption (UEA), and integrity protection. Stored the IMSI, authentication key K, and algorithms on a UICC, establishing the foundational security architecture for 3G.
Defining Specifications
| Specification | Title |
|---|---|
| TS 21.111 | 3GPP TS 21.111 |
| TS 21.133 | 3GPP TS 21.133 |
| TS 21.905 | 3GPP TS 21.905 |
| TS 22.022 | 3GPP TS 22.022 |
| TS 22.038 | 3GPP TS 22.038 |
| TS 22.057 | 3GPP TS 22.057 |
| TS 22.066 | 3GPP TS 22.066 |
| TS 22.100 | 3GPP TS 22.100 |
| TS 22.101 | 3GPP TS 22.101 |
| TS 22.105 | 3GPP TS 22.105 |
| TS 22.112 | 3GPP TS 22.112 |
| TS 22.121 | 3GPP TS 22.121 |
| TS 22.234 | 3GPP TS 22.234 |
| TS 22.907 | 3GPP TS 22.907 |
| TS 22.944 | 3GPP TS 22.944 |
| TS 22.967 | 3GPP TS 22.967 |
| TS 22.975 | 3GPP TS 22.975 |
| TS 22.980 | 3GPP TS 22.980 |
| TS 23.009 | 3GPP TS 23.009 |
| TS 23.048 | 3GPP TS 23.048 |
| TS 23.050 | 3GPP TS 23.050 |
| TS 23.057 | 3GPP TS 23.057 |
| TS 23.060 | 3GPP TS 23.060 |
| TS 23.101 | 3GPP TS 23.101 |
| TS 23.110 | 3GPP TS 23.110 |
| TS 23.127 | 3GPP TS 23.127 |
| TS 23.171 | 3GPP TS 23.171 |
| TS 23.228 | 3GPP TS 23.228 |
| TS 23.234 | 3GPP TS 23.234 |
| TS 23.271 | 3GPP TS 23.271 |
| TS 23.700 | 3GPP TS 23.700 |
| TS 23.804 | 3GPP TS 23.804 |
| TS 23.851 | 3GPP TS 23.851 |
| TS 23.923 | 3GPP TS 23.923 |
| TS 24.109 | 3GPP TS 24.109 |
| TS 24.167 | 3GPP TS 24.167 |
| TS 24.186 | 3GPP TS 24.186 |
| TS 24.228 | 3GPP TS 24.228 |
| TS 24.229 | 3GPP TS 24.229 |
| TS 24.234 | 3GPP TS 24.234 |
| TS 24.526 | 3GPP TS 24.526 |
| TS 25.133 | 3GPP TS 25.133 |
| TS 25.305 | 3GPP TS 25.305 |
| TS 25.401 | 3GPP TS 25.401 |
| TS 26.804 | 3GPP TS 26.804 |
| TS 26.967 | 3GPP TS 26.967 |
| TS 27.007 | 3GPP TS 27.007 |
| TS 29.198 | 3GPP TS 29.198 |
| TS 31.102 | 3GPP TR 31.102 |
| TS 31.111 | 3GPP TR 31.111 |
| TS 31.112 | 3GPP TR 31.112 |
| TS 31.113 | 3GPP TR 31.113 |
| TS 31.114 | 3GPP TR 31.114 |
| TS 31.115 | 3GPP TR 31.115 |
| TS 31.121 | 3GPP TR 31.121 |
| TS 31.122 | 3GPP TR 31.122 |
| TS 31.131 | 3GPP TR 31.131 |
| TS 31.900 | 3GPP TR 31.900 |
| TS 31.901 | 3GPP TR 31.901 |
| TS 32.101 | 3GPP TR 32.101 |
| TS 32.102 | 3GPP TR 32.102 |
| TS 32.140 | 3GPP TR 32.140 |
| TS 32.141 | 3GPP TR 32.141 |
| TS 32.181 | 3GPP TR 32.181 |
| TS 32.240 | 3GPP TR 32.240 |
| TS 32.251 | 3GPP TR 32.251 |
| TS 32.270 | 3GPP TR 32.270 |
| TS 32.271 | 3GPP TR 32.271 |
| TS 32.272 | 3GPP TR 32.272 |
| TS 32.277 | 3GPP TR 32.277 |
| TS 32.808 | 3GPP TR 32.808 |
| TS 33.102 | 3GPP TR 33.102 |
| TS 33.105 | 3GPP TR 33.105 |
| TS 33.320 | 3GPP TR 33.320 |
| TS 33.401 | 3GPP TR 33.401 |
| TS 33.402 | 3GPP TR 33.402 |
| TS 33.501 | 3GPP TR 33.501 |
| TS 33.749 | 3GPP TR 33.749 |
| TS 33.812 | 3GPP TR 33.812 |
| TS 33.820 | 3GPP TR 33.820 |
| TS 33.822 | 3GPP TR 33.822 |
| TS 33.835 | 3GPP TR 33.835 |
| TS 33.863 | 3GPP TR 33.863 |
| TS 34.131 | 3GPP TR 34.131 |
| TS 35.205 | 3GPP TR 35.205 |
| TS 35.234 | 3GPP TR 35.234 |
| TS 35.235 | 3GPP TR 35.235 |
| TS 35.909 | 3GPP TR 35.909 |
| TS 35.934 | 3GPP TR 35.934 |
| TS 35.937 | 3GPP TR 35.937 |
| TS 36.304 | 3GPP TR 36.304 |