Ciphering is needed when you want that only authorized people can ACCESS TO SEE the data. Integrity is when authorized people can ACCESS TO MODIFY the data . As you can see, both ciphering and integrity need an authentication and authorization phase before.
Read moreHow is user identity protected 5G?
In 5G, a subscriber long-term identity is always transmitted over the radio interfaces in an encrypted form. More specifically, a public key-based encryption is used to protect the SUPI . Therefore, only the SIDF has access to the private key associated with a public key distributed to UEs for encrypting their SUPIs.
Read moreWhich protocol provides integrity and ciphering protection?
In a network security protocol such as IPsec, a MAC may be used to provide integrity protection and origin authentication of messages sent between two peers that have previously established a shared private key.
Read more