Overview of security keys and encryption in LTE. Recommended reading for understanding the following flows.
The call flow covers the setup of the NAS, RRC and User Plane security
A collaboration diagram summarizing the LTE security flow.
Authentication followed by NAS, RRC and User plane security setup
RRC and User Plane security setup
This site runs no analytics and sets no tracking or advertising cookies. A small number of strictly-necessary cookies are used by our hosting platform to keep your session working. See our Privacy & Cookies page for the full list.