AKA a mechanism for authenticating and distributing session keys on THE Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge-based mechanism that uses symmetrical cryptography. The AKA is typically run in an UMTS IP (ISIM) multimedia services identification module, an example of an application on a universal integrated circuit map (UICC). AKA is set in RFC 3310. Authentication and Key Agreement (AKA) is a security protocol used on 3G networks. AKA is also used for the unique password compilation mechanism for Digest access authentication. AKA is a challenge-based mechanism that uses symmetrical cryptography. AKA is the basis of the 3G authentication mechanism, which is defined as the successor to CAVE-based authentication, and provides mutual authentication procedures for the Mobile Station (MS) and service system. The successful execution of the AKA leads to the establishment of a security system (i.e.
a security data set) between the SS and the service system, allowing the provision of a number of security services. AKA is not yet implanted in CDMA2000 networks, although it is probably used for IMS. In order to ensure interoperability with current devices and partner networks, it is likely that AKA support in CDMA networks and hands will be added to CAVE-based authentication. Among the main advantages of AKA over CAVE-based authentication: an attack against all AKA variants has been reported, including 5G. AKA – Authentication and key agreement a.k.a. 3G Authentication, Enhanced Subscriber Authorization (ESA). Air interface support for AKA is included in all versions after the CDMA2000 Rev C. TIA-41 MAP support for AKA in TIA-945 (3GPP2 X.S0006) built into TIA-41 (3GPP2 X.S0004). For more information on roaming AKA, please see CDG #138.