<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ar-emu-pqc-eapaka-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="PQC Hybrid in EAP-AKA prime">Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
    <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-02"/>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="23"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 52?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="I-D.ietf-emu-aka-pfs"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS making it quantum-safe.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ar-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="I-D.ietf-emu-aka-pfs"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="I-D.ietf-emu-aka-pfs"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>The migration to PQC is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs. During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types.</t>
      <t>This specification defines Hybrid public-key encryption (HPKE) <xref target="RFC9180"/> for use with EAP-AKA' FS. HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation mechanism (KEM), key derivation function (KDF), and authenticated encryption with additional data (AEAD) function. HPKE can be extended to support hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.connolly-cfrg-xwing-kem"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two key exchange algorithms based on different cryptographic assumptions, e.g., one traditional algorithm and one Post-Quantum algorithm, with the purpose of the final shared secret key being secure as long as at least one of the component key exchange algorithms remains unbroken. It is referred to as PQ/T Hybrid Scheme in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>PQ/T Hybrid Key Encapsulation Mechanism: A Key Encapsulation mechanism (KEM) made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored of USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
    </section>
    <section anchor="hybrid-enhancements-by-design">
      <name>Hybrid Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_HYBRID, is defined to carry the public key, which is the concatenation of traditional and PQC KEM public keys from the EAP server. The AT_PUB_HYBRID attribute will carry the encapsulated key, which is formed by concatenating the encapsulated key (enc) from the traditional KEM algorithm and the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the HPKE KEM and HKDF for generating the Hybrid Master Key MK_HYBRID.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting HPKE Hybrid KEM.</t>
        </li>
        <li>
          <t>The Hybrid key derivation function will be included first in the EAP-Request to indicate a higher priority than the traditional key derivation function.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for hybrid key exchange in EAP-AKA' FS. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates a PQC KEM key pair, an ephemeral ECDHE key   |
  |      | pair, sends the hybrid (PQC + ECDHE) public key of that|
  |      | key pair and the first EAP method message to the peer  |
  |      | In the message the AT_PUB_HYBRID attribute             |
  |      | carries the concatenation of PQC KEM and ECDHE public  |
  |      | keys and the AT_KDF_FS attribute carries other         |
  |      | FS-related parameters. Both of these are               |
  |      | skippable attributes that can be ignored if the peer   |
  |      | does not support this extension.                       |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |       AT_PUB_HYBRID, AT_MAC|                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_PUB_HYBRID and |     |
| AT_MAC. If not, it will ignore AT_PUB_HYBRID and       |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will then generate |     |
| its ECDHE key pair, calculate a hybrid shared secret   |     |
| key based on the server's PQC KEM public key, its ECDHE|     |
| key pair and the server's ECDHE public key. Finally,   |     |
| it proceeds to derive all EAP-AKA' key values and      |     |
| constructs a full response.                            |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_PUB_HYBRID,     |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the Hybrid shared secret and checks the RES  |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and the ECDHE and PQC KEM values. Even if there was an |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM Public key(pk_M), private key (sk_M) pair and the ECDH public key (pk_X), private key (sk_X) pair. The server will generate and send the EAP AKA' Authentication Vector (AV). As defined in section 5.2 of <xref target="I-D.connolly-cfrg-xwing-kem"/> the server PQC KEM and ECDH key pairs are derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   def GenerateKeyPair():
     (pk_M, sk_M) = ML-KEM-768.KeyGen()
     sk_X = random(32)
     pk_X = X25519(sk_X, X25519_BASE)
     return concat(sk_M, sk_X, pk_X), concat(pk_M, pk_X)
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the ECDH private key sk_X and the PQC KEM private key sk_M. The server will forward the EAP AKA' AV to peer along with pk_X and pk_M.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTH received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke Encapsulate using concat(pk_M,pk_X) as defined in section 5.4 of <xref target="I-D.connolly-cfrg-xwing-kem"/>:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   def Encapsulate(pk):
     pk_M = pk[0:1184]
     pk_X = pk[1184:1216]
     ek_X = random(32)
     ct_X = X25519(ek_X, X25519_BASE)
     ss_X = X25519(ek_X, pk_X)
     (ss_M, ct_M) = ML-KEM-768.Encaps(pk_M)
     ss = Combiner(ss_M, ss_X, ct_X, pk_X)
     ct = concat(ct_M, ct_X)
     return (ss, ct)
]]></artwork>
        <t>"ct" is the concatenation of the ciphertext from PQC KEM and encapsulated key from ECDH whereas "ss" is hybrid shared secret key. Hybrid shared key ss is generated by the peer using the Encapsulate() (<xref target="I-D.connolly-cfrg-xwing-kem"/>). The Combiner() is a "hash and concatenation" based approach using SHA3-256 (See section 5.3 of <xref target="I-D.connolly-cfrg-xwing-kem"/>) to generate a “hybrid” shared secret (ss).</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication response RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct, PQC KEM private key sk_M and ECDH private key sk_X to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   def Decapsulate(ct, sk):
     ct_M = ct[0:1088]
     ct_X = ct[1088:1120]
     sk_M = sk[0:2400]
     sk_X = sk[2400:2432]
     pk_X = sk[2432:2464]
     ss_M = ML-KEM-768.Decapsulate(ct_M, sk_M)
     ss_X = X25519(sk_X, ct_X)
     return Combiner(ss_M, ss_X, ct_X, pk_X)
]]></artwork>
        <t>The generated ss from Decapsulate is the hybrid shared secret key derived from PQC KEM and traditional ECDH. The peer and the server first generate the MK_HYBRID and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   HYBRID_SHARED_SECRET, ct = Encapsulate(pKR)
   MK_HYBRID = PRF'(IK'|CK'| HYBRID_SHARED_SECRET,"EAP-AKA' FS"| Identity) 
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_HYBRID [0..255] 
   MSK = MK_HYBRID [256..767] 
   EMSK = MK_HYBRID [768..1279]
]]></artwork>
        <t>where, pkR is concatenation of PQC KEM and traditional public keys of the receiver, ct is concatenation of the ciphertext from the PQC KEM and encapsulated key from ECDH; the Encapsulate() function is perfomed by the peer only.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="hybrid">
        <name>AT_PUB_HYBRID</name>
        <t>The format of the AT_PUB_HYBRID attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_HYBRID | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_HYBID:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the concatenation of 
     traditional and PQC KEM public keys from the EAP server.
  *  EAP-Response: It contains the encapsulated key, which is formed by 
     concatenating the ciphertext (ct) from the PQC KEM Encapsulation function
     and the encapsulated key (enc) from the traditional KEM algorithm and from the 
     EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-KEM is IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The security of the ML-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given ML-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromising one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <t>For security properties of traditional ECDHE for EAP-AKA FS, see section 7 of <xref target="I-D.ietf-emu-aka-pfs"/>. The overall Hybrid scheme needs to be IND-CCA2 robust; i.e., atleast one of the schemes should be IND-CCA2 secure.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>One new value (TBA1) in the skippable range need to be assigned by IANA 
   for AT_PUB_HYBRID (<xref target="hybrid"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the Hybrid key derivation 
   function entry:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA2    | X25519Kyber768Draft00         | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="March" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-04"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 352?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/></t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
