RFC 3310 (rfc3310) - Page 3 of 18


Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA)



Alternative Format: Original Text Document



RFC 3310          HTTP Digest Authentication Using AKA    September 2002


   This document specifies a mapping of AKA parameters onto HTTP Digest
   authentication.  In essence, this mapping enables the usage of AKA as
   a one-time password generation mechanism for Digest authentication.

   As the Session Initiation Protocol (SIP) [3] Authentication Framework
   closely follows the HTTP Authentication Framework, Digest AKA is
   directly applicable to SIP as well as any other embodiment of HTTP
   Digest.

1.1 Terminology

   This chapter explains the terminology used in this document.

   AKA
      Authentication and Key Agreement.

   AuC
      Authentication Center.  The network element in mobile networks
      that can authorize users either in GSM or in UMTS networks.

   AUTN
      Authentication Token.  A 128 bit value generated by the AuC, which
      together with the RAND parameter authenticates the server to the
      client.

   AUTS
      Authentication Token.  A 112 bit value generated by the client
      upon experiencing an SQN synchronization failure.

   CK
      Cipher Key.  An AKA session key for encryption.

   IK
      Integrity Key.  An AKA session key for integrity check.

   ISIM
      IP Multimedia Services Identity Module.

   PIN
      Personal Identification Number.  Commonly assigned passcodes for
      use with automatic cash machines, smart cards, etc.

   RAND
      Random Challenge.  Generated by the AuC using the SQN.

   RES
      Authentication Response.  Generated by the ISIM.




Niemi, et. al.               Informational