An attack on all variants of AKA has been reported, including 5G. Information about AKA roaming can be found in the CDG #138 reference document. AKA a mechanism that performs authentication and distribution of session keys over Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge response-based mechanism that uses symmetric cryptography. AKA is typically run in a UMTS IP Multimedia Services (ISIM) identification module that is an application on a universal circuit board. AKA is defined in RFC 3310. Authentication and Key Agreement (AKA) is a security protocol used on 3G networks. AKA is also used for the one-time personalization mechanism for digest access authentication. AKA is a challenge response-based mechanism that uses symmetric cryptography. Some of the main advantages of AKA over CAVE-based authentication are: AKA – Authentication and Key Agreement, also known as 3G authentication, Enhanced Subscriber Authorization (ESA). TIA-41 MAP support for AKA was defined in TIA-945 (3GPP2 X.S0006), which was integrated into TIA-41 (3GPP2 X.S0004). As the basis of the 3G authentication mechanism, defined as the successor to CAVE-based authentication, AKA provides mutual authentication procedures for the mobile station (MS) and serving system.
The successful execution of AKA leads to the establishment of a security match (i.e. a set of security data) between the SS and the service system, allowing the provision of a number of security services. AKA is not yet implemented on CDMA2000 networks, although it is expected to be used for IMS. In order to ensure interoperability with current devices and partner networks, AKA on CDMA networks and mobile phones will likely be in addition to authentication from the CAVE. Air Interface Support for AKA is included in all versions of CDMA2000 Rev C. .