<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ar-emu-pqc-eapaka-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="PQC in EAP-AKA prime">Post-Quantum Cryptography enhancement in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-00"/>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 52?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="I-D.ietf-emu-aka-pfs"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS making it quantum-safe.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ar-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="I-D.ietf-emu-aka-pfs"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="I-D.ietf-emu-aka-pfs"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>The migration to PQC is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs. During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types.</t>
      <t>This specification defines Hybrid public-key encryption (HPKE) <xref target="RFC9180"/> for use with EAP-AKA' FS. HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation mechanism (KEM), key derivation function (KDF), and authenticated encryption with additional data (AEAD) function. HPKE can be extended to support hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.ietf-westerbaan-cfrg-hpke-xyber768d00"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two key exchange algorithms based on different cryptographic assumptions, e.g., one traditional algorithm and one Post-Quantum algorithm, with the purpose of the final shared secret key being secure as long as at least one of the component key exchange algorithms remains unbroken. It is referred to as PQ/T Hybrid Scheme in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>PQ/T Hybrid Key Encapsulation Mechanism: A Key Encapsulation mechanism (KEM) made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored of USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
    </section>
    <section anchor="hybrid-enhancements-by-design">
      <name>Hybrid Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_HYBRID, is defined to carry the public key, which is the concatenation of traditional and PQC KEM public keys from the EAP server. The AT_PUB_HYBRID attribute will carry the encapsulated key, which is formed by concatenating the encapsulated key (enc) from the traditional KEM algorithm and the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the HPKE KEM and HKDF for generating the Hybrid Master Key MK_HYBRID.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting HPKE Hybrid KEM.</t>
        </li>
        <li>
          <t>The Hybrid key derivation function will be included first in the EAP-Request to indicate a higher priority than the traditional key derivation function.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for hybrid key exchange in EAP-AKA' FS. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an ephemeral ECDHE key pair, a PQC KEM key   |
  |      | pair, sends the hybrid (PQC + ECDHE) public key of that|
  |      | key pair and the first EAP method message to the peer  |
  |      | In the message the AT_PUB_HYBRID attribute             |
  |      | carries the concatenation of ECDHE and PQC KEM public  |
  |      | keys and the AT_KDF_FS attribute carries other         |
  |      | FS-related parameters. Both of these are               |
  |      | skippable attributes that can be ignored if the peer   |
  |      | does not support this extension.                       |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |       AT_PUB_HYBRID, AT_MAC|                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_PUB_HYBRID and |     |
| AT_MAC. If not, it will ignore AT_PUB_HYBRID and       |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will then generate |     |
| its ECDHE key pair, calculate a hybrid shared secret   |     |
| key based on the server's PQC KEM public key, its ECDHE|     |
| key pair and the server's ECDHE public key. Finally,   |     |
| it proceeds to derive all EAP-AKA' key values and      |     |
| constructs a full response.                            |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_PUB_HYBRID,     |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the Hybrid shared secret and checks the RES  |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and the ECDHE and PQC KEM values. Even if there was an |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM Public key(pk2), private key (sk2) pair and the ECDH public key (pk1), private key (sk1) pair. The server will generate the AKA challenge and sends the EAP AKA' Authentication Vector (AV). As defined in section 3.3 of <xref target="I-D.ietf-westerbaan-cfrg-hpke-xyber768d00"/> the server PQC KEM and ECDH key pairs are derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk1, pk1 = DeriveKeyPair(DHKEM)
   sk2, pk2 = DeriveKeyPair(Kyber768Draft00)
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the ECDH private key sk1 and the PQC KEM private key sk2. The server will forward the EAP AKA' AV to peer along with pk1 and pk2.</t>
          </li>
          <li>
            <t>The USIM will validate the AKA challenge received, also verifies the MAC-I. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using concact(pk1,pk2) as defined in section 3.3 of <xref target="I-D.ietf-westerbaan-cfrg-hpke-xyber768d00"/>:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   Encap (concat(pk1,pk2)) = (enc, ss)
]]></artwork>
        <t>"enc" is the concatenation of the encapsulated key from ECDH and ciphertext from PQC KEM whereas "ss" is hybrid shared secret key. Hybrid shared key ss is generated by the peer using the Encap (<xref target="I-D.ietf-westerbaan-cfrg-hpke-xyber768d00"/>). The KEM combiner is a "hash and concatenation" based approach to generate a “hybrid” shared secret (ss).</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication response RES and enc to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the enc, PQC KEM private key sk2 and ECDH private key sk1 to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   Decap(enc, concat(sk1,sk2)) = ss
]]></artwork>
        <t>The generated ss from Decap is the hybrid shared secret key derived from PQC KEM and traditional ECDH. The peer and the server first generate the MK_HYBRID and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   HYBRID_SHARED_SECRET, enc = Encap(pKR)
   MK_HYBRID = PRF'(IK'|CK'| HYBRID_SHARED_SECRET,"EAP-AKA' FS"| Identity) 
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_HYBRID [0..255] 
   MSK = MK_HYBRID [256..767] 
   EMSK = MK_HYBRID [768..1279]
]]></artwork>
        <t>where, pkR is concatenation of traditional and PQC KEM public keys of the receiver, enc is concatenation of the encapsulated key from ECDH and the ciphertext from the PQC KEM and the Encap function is perfomed by the peer only.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="hybrid">
        <name>AT_PUB_HYBRID</name>
        <t>The format of the AT_PUB_HYBRID attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_HYBRID | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_HYBID:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the concatenation of 
     traditional and PQC KEM public keys from the EAP server.
  *  EAP-Response: It contains the encapsulated key, which is formed by 
     concatenating the encapsulated key (enc) from the traditional KEM algorithm 
     and the ciphertext (ct) from the PQC KEM Encapsulation function from the 
     EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>One new value (TBA1) in the skippable range need to be assigned by IANA 
   for AT_PUB_HYBRID (<xref target="hybrid"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the Hybrid key derivation 
   function entry:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA2    | X25519Kyber768Draft00         | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-westerbaan-cfrg-hpke-xyber768d00">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="2" month="February" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
      </references>
    </references>
    <?line 322?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/></t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
