USIM

Universal Subscriber Identity Module

Security
Introduced in R99
The Universal Subscriber Identity Module (USIM) is a secure, tamper-resistant smart card application residing on a UICC (Universal Integrated Circuit Card) in 3GPP devices. It stores critical subscriber data, performs authentication and key agreement with the network, and provides a secure environment for applications. It is fundamental to subscriber identity management, network access security, and service provisioning in 3G, 4G, and 5G systems.

Description

The Universal Subscriber Identity Module (USIM) is the cornerstone of subscriber security and identity management in 3GPP networks from UMTS (3G) onwards. It is not the physical card itself (that is the UICC) but a dedicated application that runs on the UICC's secure microprocessor. The USIM's primary functions are to securely store the subscriber's unique identity (IMSI), authenticate the subscriber to the network, generate session keys for encryption and integrity protection, and manage subscriber-related data like the phonebook and SMS.

Architecturally, the USIM interacts with the Mobile Equipment (ME) via a standardized interface (ETSI/3GPP TS 31.101). When a device powers on or enters a new network area, the ME requests the International Mobile Subscriber Identity (IMSI) from the USIM. This IMSI is sent to the network to initiate an authentication procedure. The network's Authentication Centre (AuC) generates an authentication vector containing a random challenge (RAND), an expected response (XRES), a ciphering key (CK), and an integrity key (IK). The RAND is sent to the USIM.

The USIM, using a secret key (K) stored securely within it and a cryptographic algorithm (MILENAGE for 3G/4G/5G), computes a response (RES) and the same CK and IK. The ME sends the RES back to the network for verification. If RES matches XRES, authentication is successful. The CK and IK are then used by the device and network to encrypt and integrity-protect all subsequent communications. This process, known as Authentication and Key Agreement (AKA), ensures that only a legitimate subscriber with the correct USIM can access the network and that the communication is secure.

Beyond core authentication, the USIM provides a secure storage area for subscriber data, network selection preferences, and service provider applications (like OTA provisioning). In 5G, the USIM's role evolves to support the 5G AKA protocol and store new identifiers like the Subscription Concealed Identifier (SUCI) for enhanced privacy. It acts as a root of trust, enabling secure bootstrapping for other services and acting as a secure element for mobile commerce and digital identity applications.

Purpose & Motivation

The USIM was introduced with 3G UMTS to address security weaknesses in the 2G SIM (Subscriber Identity Module). The 2G SIM used the COMP128 algorithm, which had known vulnerabilities, and the GSM authentication was one-way (network authenticates the subscriber) with weaker encryption algorithms. The move to 3G required a stronger, mutual authentication mechanism and enhanced cryptographic capabilities to protect new data and multimedia services.

The creation of the USIM provided a standardized, future-proof platform for subscriber identity. It separated the secure application (USIM) from the physical card (UICC), allowing multiple applications (like ISIM for IMS) to coexist. This modularity was crucial for the convergence of services. The USIM's secure execution environment and storage protect the long-term secret key (K) from extraction, forming an immutable root of trust for the entire mobile ecosystem.

Its ongoing evolution is driven by the need for stronger privacy (e.g., SUCI in 5G to protect the IMSI), support for new authentication frameworks (EAP-AKA', 5G AKA), and enabling new use cases like network slicing identification and secure services for IoT. The USIM solves the fundamental problem of securely and portably binding a subscriber identity to a subscription, enabling global roaming, secure service access, and trusted transaction capabilities.

Key Features

  • Secure storage of long-term subscriber key (K) and IMSI
  • Execution of Authentication and Key Agreement (AKA) algorithms
  • Generation of session ciphering (CK) and integrity keys (IK)
  • Secure storage for phonebook, SMS, and service settings
  • Support for Over-The-Air (OTA) provisioning and management
  • Platform for hosting other secure applications (e.g., ISIM)

Evolution Across Releases

Defining Specifications

SpecificationTitle
TS 21.111 3GPP TS 21.111
TS 21.133 3GPP TS 21.133
TS 21.905 3GPP TS 21.905
TS 22.022 3GPP TS 22.022
TS 22.038 3GPP TS 22.038
TS 22.057 3GPP TS 22.057
TS 22.066 3GPP TS 22.066
TS 22.100 3GPP TS 22.100
TS 22.101 3GPP TS 22.101
TS 22.105 3GPP TS 22.105
TS 22.112 3GPP TS 22.112
TS 22.121 3GPP TS 22.121
TS 22.234 3GPP TS 22.234
TS 22.907 3GPP TS 22.907
TS 22.944 3GPP TS 22.944
TS 22.967 3GPP TS 22.967
TS 22.975 3GPP TS 22.975
TS 22.980 3GPP TS 22.980
TS 23.009 3GPP TS 23.009
TS 23.048 3GPP TS 23.048
TS 23.050 3GPP TS 23.050
TS 23.057 3GPP TS 23.057
TS 23.060 3GPP TS 23.060
TS 23.101 3GPP TS 23.101
TS 23.110 3GPP TS 23.110
TS 23.127 3GPP TS 23.127
TS 23.171 3GPP TS 23.171
TS 23.228 3GPP TS 23.228
TS 23.234 3GPP TS 23.234
TS 23.271 3GPP TS 23.271
TS 23.700 3GPP TS 23.700
TS 23.804 3GPP TS 23.804
TS 23.851 3GPP TS 23.851
TS 23.923 3GPP TS 23.923
TS 24.109 3GPP TS 24.109
TS 24.167 3GPP TS 24.167
TS 24.186 3GPP TS 24.186
TS 24.228 3GPP TS 24.228
TS 24.229 3GPP TS 24.229
TS 24.234 3GPP TS 24.234
TS 24.526 3GPP TS 24.526
TS 25.133 3GPP TS 25.133
TS 25.305 3GPP TS 25.305
TS 25.401 3GPP TS 25.401
TS 26.804 3GPP TS 26.804
TS 26.967 3GPP TS 26.967
TS 27.007 3GPP TS 27.007
TS 29.198 3GPP TS 29.198
TS 31.102 3GPP TR 31.102
TS 31.111 3GPP TR 31.111
TS 31.112 3GPP TR 31.112
TS 31.113 3GPP TR 31.113
TS 31.114 3GPP TR 31.114
TS 31.115 3GPP TR 31.115
TS 31.121 3GPP TR 31.121
TS 31.122 3GPP TR 31.122
TS 31.131 3GPP TR 31.131
TS 31.900 3GPP TR 31.900
TS 31.901 3GPP TR 31.901
TS 32.101 3GPP TR 32.101
TS 32.102 3GPP TR 32.102
TS 32.140 3GPP TR 32.140
TS 32.141 3GPP TR 32.141
TS 32.181 3GPP TR 32.181
TS 32.240 3GPP TR 32.240
TS 32.251 3GPP TR 32.251
TS 32.270 3GPP TR 32.270
TS 32.271 3GPP TR 32.271
TS 32.272 3GPP TR 32.272
TS 32.277 3GPP TR 32.277
TS 32.808 3GPP TR 32.808
TS 33.102 3GPP TR 33.102
TS 33.105 3GPP TR 33.105
TS 33.320 3GPP TR 33.320
TS 33.401 3GPP TR 33.401
TS 33.402 3GPP TR 33.402
TS 33.501 3GPP TR 33.501
TS 33.749 3GPP TR 33.749
TS 33.812 3GPP TR 33.812
TS 33.820 3GPP TR 33.820
TS 33.822 3GPP TR 33.822
TS 33.835 3GPP TR 33.835
TS 33.863 3GPP TR 33.863
TS 34.131 3GPP TR 34.131
TS 35.205 3GPP TR 35.205
TS 35.234 3GPP TR 35.234
TS 35.235 3GPP TR 35.235
TS 35.909 3GPP TR 35.909
TS 35.934 3GPP TR 35.934
TS 35.937 3GPP TR 35.937
TS 36.304 3GPP TR 36.304