AKA, a mechanism that performs authentication and distribution of session keys on Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge response-based mechanism that uses symmetric cryptography. AKA is typically run in a UMTS IP Multimedia Services (ISIM) identification module that is an application on a universal circuit board. AKA is defined in RFC 3310. AKA is not yet implemented on CDMA2000 networks, although it is expected to be used for IMS. In order to ensure interoperability with current devices and partner networks, AKA on CDMA networks and mobile phones will likely be in addition to authentication from the CAVE. Authentication and Key Agreement (AKA) is a security protocol used on 3G networks. AKA is also used for the one-time personalization mechanism for digest access authentication. AKA is a challenge response-based mechanism that uses symmetric cryptography. As the basis of the 3G authentication mechanism, defined as the successor to CAVE-based authentication, AKA provides mutual authentication procedures for the mobile station (MS) and serving system. The successful execution of AKA leads to the establishment of a security match (i.e.
a set of security data) between the SS and the service system, allowing the provision of a number of security services. Some of the main advantages of AKA over CAVE-based authentication are: AKA – Authentication and Key Agreement, also known as 3G authentication, Enhanced Subscriber Authorization (ESA). Air Interface Support for AKA is included in all versions of CDMA2000 Rev C. TIA-41 MAP support for AKA was defined in TIA-945 (3GPP2 X.S0006), which was integrated into TIA-41 (3GPP2 X.S0004). An attack on all variants of AKA has been reported, including 5G. Information about AKA roaming is available in the CDG #138 reference document. . . .