In 5G, a subscriber long-term identity is always transmitted over the radio interfaces in an encrypted form. More specifically, a public key-based encryption is used to protect the SUPI . Therefore, only the SIDF has access to the private key associated with a public key distributed to UEs for encrypting their SUPIs.
Read moreWhich protocol provides integrity and ciphering protection?
In a network security protocol such as IPsec, a MAC may be used to provide integrity protection and origin authentication of messages sent between two peers that have previously established a shared private key.
Read more