5G Security · Pro
Lab: Trace authentication vectors through the key hierarchy
Key Derivation Trace Exercise
In this lab you will trace the complete 5G authentication and key derivation process from start to finish. Beginning with the permanent key K stored in the USIM and the subscriber identity SUPI, you follow every derivation step through the hierarchy. At each stage the lab shows you the inputs fed into the Key Derivation Function, the cryptographic operation performed, and the resulting key produced. This hands-on walkthrough builds deep intuition for how a single root secret bootstraps all security across the entire 5G system from radio to core.