Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
One of the forerunners and main candidates for the Fourth Generation (4G) generation mobile communication system is commonly known under the name Long-Term Evolution (LTE) and its standard is produced and maintained by the international 3rd Generation Partnership Program (3GPP) consortium. The LTE Authentication and Key Agreement (AKA) protocol design is based on the Universal Mobile Telecommunications System (UMTS) AKA protocol, which is widely used today for third generation (3G) wireless networks. The authentication protocols for these mobile network systems will arguably become the most widely used security protocols in the near future. The authors present a computational security analysis of both the LTE AKA and the UMTS AKA.