The present invention provides a method of key material generation in
which the key material is used to authenticate communication for user
equipment and at least one network application function. The method
includes providing a bootstrapping identifier associated with first key
material and a first random number, receiving information indicative of a
second random number, and forming second key material based upon the
first key material, the first random number, and the second random
number.