User equipment must use the NEA0, 128-NEA1, and 128-NEA2 cipher algorithms. For context, NEA0 is a lack of encryption while 128-NEA2 is identical to AES-128. The cipher algorithm 128-NEA3 is a stronger algorithm, though it is optional to use.10 Haz 2020
Read moreDoes 5G use IMSI?
That said, the new 5G security protocols do give the MNO the flexibility to support law enforcement when needed. Since the MNO controls the security and privacy of the IMSI from the SIM to the network , it can still work with agents to monitor approved criminal targets.
Read moreAre 5G calls encrypted?
With 5G, for the first time, your connection will rely completely on an encrypted identity . Your permanent ID won’t be exposed. Stronger encryption over the air. When your voice and data travels from your device to a cell tower, it stays confidential because it’s scrambled by an algorithm.
Read more