5G Protocol Testing & Log Analysis · Pro
Authentication trace: 5G-AKA message flow with AUTN, RES*, SUCI decoding
The 5G AKA Procedure
5G Authentication uses 5G-AKA or EAP-AKA'. The network sends Authentication Request with RAND and AUTN. The UE validates AUTN (verifies the network), computes RES*, and responds with Authentication Response. This mutual authentication ensures both sides are legitimate.