How is user identity protected 5G?

In 5G, a subscriber long-term identity is always transmitted over the radio interfaces in an encrypted form. More specifically, a public key-based encryption is used to protect the SUPI . Therefore, only the SIDF has access to the private key associated with a public key distributed to UEs for encrypting their SUPIs.

Read more

What encryption does 5G use?

Data traffic within the 5G infrastructure is protected by state-of-the-art encryption . The devices and the network authenticate each other using integrity-protected signaling. This ensures that if a single component is compromised, the other components remain protected.

Read more