5G/6G Academy
5G/6G AcademyTelecom certifications · since 2009
5G Security

5G Security · Pro

5G key hierarchy: K → CK/IK → KAUSF → KAMF → KgNB

Hierarchical Key Derivation

5G derives all security keys from a single permanent master key called K, stored in the USIM and the UDM/ARPF. Rather than using K directly for encryption, each layer of the network receives a derived key specific to its role. Key Derivation Functions take a parent key and additional inputs like the serving network name or algorithm identifiers, producing a child key that cannot be reversed to reveal its parent. This hierarchy means that compromising a key at a lower level, such as at the gNB, does not reveal keys at higher levels. Cryptographic isolation is built into the architecture by…

Continue reading with Pro

Your free trial has ended. Subscribe to unlock the full lesson plus all 26 advanced levels, 732 lessons, labs, and 17 TELCOMA certification exams.

From $99/year·7-day money-back guarantee·Cancel anytime