AKA is the basis of the 3G authentication mechanism, which is defined as the successor to CAVE-based authentication, and provides mutual authentication procedures for the Mobile Station (MS) and service system. The successful execution of the AKA leads to the establishment of a security system (i.e. a security data set) between the SS and the service system, allowing the provision of a number of security services. AKA is not yet implanted in CDMA2000 networks, although it is probably used for IMS. In order to ensure interoperability with current devices and partner networks, it is likely that AKA support in CDMA networks and hands will be added to CAVE-based authentication. One of aka`s main advantages over CAVE-based authentication is: AKA, a mechanism that authenticates and distributes session keys on UMTS (Universal Mobile Telecommunications System) networks. AKA is a challenge-based mechanism that uses symmetrical cryptography. The AKA is typically run in an UMTS IP (ISIM) multimedia services identification module, an example of an application on a universal integrated circuit map (UICC). AKA is set in RFC 3310. Authentication and Key Agreement (AKA) is a security protocol used on 3G networks.
AKA is also used for the unique password compilation mechanism for Digest access authentication. AKA is a challenge-based mechanism that uses symmetrical cryptography. The TIA-41 support for AKA was defined in TIA-945 (3GPP2 X.S0006), which was integrated into TIA-41 (3GPP2 X.S0004). For more information on roaming AKA, see CDG #138. An attack on all AKA variants has been reported, including 5G. Air interface support for AKA is included in all versions of CDMA2000 Rev C. AKA – authentication and key agreement a.k.a. 3G Authentication, Enhanced Subscriber Authorization (ESA).