fbpx
Friday, February 28, 2025
Home5G knowledgeDelving into SUPI, SUCI, and 5G-GUTI in 5G SA Networks

Delving into SUPI, SUCI, and 5G-GUTI in 5G SA Networks

🔍 Exploring 5G: Delving into SUPI, SUCI, and 5G-GUTI in 5G SA Networks between me and Tech Explorer 📶

💬 You: In 5G Standalone (SA) networks, subscriber identity protection is a crucial aspect of security. I often hear about SUPI, SUCI, and 5G-GUTI. Could you explain how they differ?

💬 TechExplorer: Absolutely! Let’s break it down:

📶 SUPI (Subscription Permanent Identifier): This is the 5G equivalent of the IMSI in 4G. It’s a permanent subscriber identifier stored in the SIM card. However, if transmitted in clear text over the air, it poses privacy risks, such as tracking and eavesdropping.

📶 SUCI (Subscription Concealed Identifier): To prevent exposure of the SUPI, 5G networks encrypt it using the home operator’s public key, generating a temporary, ciphered version called SUCI. Only the UDM (Unified Data Management) of the home network can decrypt the SUCI and retrieve the actual SUPI. This ensures subscriber privacy.

📶 5G-GUTI (5G Globally Unique Temporary UE Identity): Once a device registers with the network, it receives a temporary identifier called 5G-GUTI. This replaces the SUPI in subsequent communications to minimize security risks and avoid exposing the subscriber’s identity repeatedly.

💬 You: That makes sense! So, in practical terms, when does each identifier come into play?

💬 TechExplorer: Great question! Here’s how they are used in sequence:

1️⃣ Initial Connection: When a mobile device first connects, it uses the SUPI (permanent ID) to authenticate with the network.
2️⃣ Identity Protection: Before transmission, the device encrypts the SUPI using the home operator’s public key, generating the SUCI, which is sent over the air instead.
3️⃣ Registration & Communication: Once authenticated, the network assigns a 5G-GUTI, ensuring that further signaling exchanges avoid using the SUPI or SUCI directly.

💬 You: I see! So the 5G-GUTI essentially acts as a temporary alias for the device after registration?

💬 TechExplorer: Exactly! The 5G-GUTI reduces the risk of tracking and replay attacks by dynamically updating. The network periodically assigns a new 5G-GUTI to further enhance privacy and security.

💬 You: Thanks for the breakdown! One last thing—how does elliptic curve cryptography fit into all of this?

💬 TechExplorer: Excellent question! The SUCI is generated using elliptic curve cryptography (ECC), a highly secure encryption method. This ensures that even if an attacker intercepts the SUCI, they cannot reverse-engineer the original SUPI without access to the private key stored in the home network’s UDM. This is a major security improvement over older generations of mobile networks!

💬 You: That’s a game-changer for mobile privacy! Thanks for the insightful explanation.


Benefit from Massive discount on our 5G Training with 5WorldPro.com

The most complete and comprehensive 5G course, follow this link for more information

Start your 5G journey and obtain 5G certification

contact us:  [email protected]

Stay Aware of the last 5G news

Register to our newsletter to receive last 5G news and 5G training details

Follow Us On Linkedin

Most Popular

Receive the latest events

Do you want to participate to this event ?

Get notified about new events

× Which Training you are interested in ?