<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-lake-edhoc-aka-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EDHOC PSK AKA">EDHOC Authenticated with AKA</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-lake-edhoc-aka-01"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 40?>

<t>This document defines the EDHOC-AKA authentication method based on the Authentication and Key Agreement(AKA) protocol and the Ephemeral Diffie-Hellman Over COSE(EDHOC) key exchange protocol. This method is designed to provide efficient mobile communication network access authentication for scenarios with limited computing and network resources (such as Non-Terrestrial Network, NTN). EDHOC-AKA utilizes the pre-shared long-term key and employs symmetric cryptography techniques to achieve mutual authentication and key derivation. It ensures security while significantly enhancing the authentication efficiency.</t>
    </abstract>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a AKA authentication method for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange protocol <xref target="RFC9528"/>. AKA is a symmetric ciper, it achieves key agreement through mutual authentication between the mobile users and networks, and subsequently generates data encryption keys and integrity protection keys. In this document, Initiator stands for the mobile user and Responder stands for the network. AKA relies on long-term keys which is provided out-of-band and realize dynamic symmetric key derivation. Symmetric key authentication offers greater computational efficiency compared to the methods outlined in <xref target="RFC9528"/>.</t>
      <t>The Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile
   networks. <xref target="RFC4187"/> (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. <xref target="RFC5448"/> (EAP-AKA') was an improved version of EAP-AKA. <xref target="RFC9048"/>is the most recent specification of EAP-AKA'related to 5G networks.</t>
      <t>The parameters in the authentication vectors of EDHOC-AKA and EAP-AKA' are remain consistent and defined in the new field CRED_AKA_X. This document only considers two parties and the interaction between networks is out of scope.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The following terms are used:</t>
      <ul spacing="normal">
        <li>
          <t>AKA: Authentication and Key Agreement.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>This document specifies a new EDHOC authentication method (see Section 3.2 of <xref target="RFC9528"/>) referred to as the Authentication and Key Agreement method for the Ephemeral Diffie-Hellman Over COSE key exchange protocol (EDHOC-AKA). Authentication is based on a long-term key shared between the Initiator and the Responder. As in the methods defined in <xref target="RFC9528"/>, CRED_I and CRED_R are authentication credentials containing identifying information for the Initiator and Responder, respectively. We defined CRED_AKA_I and CRED_AKA_R to hold the authentication vector of AKA for the Initiator and Responder, respectively. We have added a new method to indicate that the Initiator and Responder support AKA authentication.</t>
      <section anchor="credentials">
        <name>Credentials</name>
        <t>According to RFC 9528 and the existing specifications of AKA, designing a new authentication method ( Method = 5)and defining new credential parameter CRED_AKA_X, it is necessary to ensure that the Initiator (I) and the Responder (R) meet the following core requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The Initiator and Responder are assumed to share a long-term key, or it is possible to obtain the derived parameters indirectly.</t>
          </li>
          <li>
            <t>The explicit indication of the authentication method is AKA, and it also carries the necessary identity credential information.</t>
          </li>
        </ul>
        <t>The requirements for Initiator</t>
        <ul spacing="normal">
          <li>
            <t>The long-term key K and user identifier must be pre-set and stored in a secure environment.</t>
          </li>
          <li>
            <t>Support the capability of generating the 5-tuple of AKA (RAND/AUTN/XRES/CK/IK).</t>
          </li>
        </ul>
        <t>The requirements for Responder</t>
        <ul spacing="normal">
          <li>
            <t>Based on the SUPI/SUCI in EAD_1, route to the network, the division between the visiting network and the home network is out of scope.</t>
          </li>
          <li>
            <t>Obtain the AKA five-tuple (or generate dynamic vector) from network</t>
          </li>
        </ul>
        <section anchor="credakax">
          <name>CRED_AKA_X</name>
          <t>CRED_AKA is a COSE header map containing header parameters that indicate the AKA authentication parameters. CRED_AKA_X is uesed to refer to CRED_AKA_I or CRED_AKA_R, CRED_AKA_I and CRED_AKA_R are authentication credentials associated with the AKA.</t>
          <t>CRED_AKA_R: Contains the AKA parameters sent by the responder, typically including:
* AT_RAND: Random Number Challenge
* AT_AUTN: Authentication Token</t>
          <t>CRED_AKA_I: Contains parameters for the responder's response to the challenge, typically including:
* AT_RES: Authentication Response</t>
          <t>An example of CRED_AKA_I and CRED_AKA_R is shown below: TBD</t>
        </section>
        <section anchor="encoding-and-processing">
          <name>Encoding and processing</name>
          <t>The AKA parameters should be encoded in the CWT format and the encryption and signature methods for them should be standardized in COSE.</t>
          <t>NOTE: Encode AKA in CWT format. Need to standardize the encryption and signature of CWT-AKA in COSE.  RFC Editor: Remove this note.</t>
        </section>
      </section>
      <section anchor="message-flow-of-edhoc-aka">
        <name>Message Flow of EDHOC-AKA</name>
        <t>The message flow of EDHOC-AKA follows the structure defined in
   <xref target="RFC9528"/>, with authentication based on symmetric keys rather than
   public keys.</t>
        <t>The Responder authenticates the Initiator first.  Figure 1
   illustrates the message flow of the EDHOC-AKA authentication method.</t>
        <artwork><![CDATA[
Initiator                                 Responder
    |                                         |    
    |                                         |    
    | Method,SUITES_I,G_X,C_I,EAD_1           |    
    +----------------------------------------->    
    | Message_1                               |    
    |                                         |    
    |           G_Y,Enc(C_R,CRED_AKA_R,EAD_2) |    
    <-----------------------------------------+    
    |                  Message_2              |    
    |                                         |    
    |                                         |    
    |                                         |    
    | AEAD(CRED_AKA_I, EAD_3)                 |    
    +----------------------------------------->    
    | Message_3                               |    
    |                                         |    
    |                                         |    
    |                   AEAD(EAD_4)           |    
    <-----------------------------------------+    
    |                   Message_4             |    
    |                                         |    

 Figure 1: Overview of Message Flow of EDHOC-AKA
]]></artwork>
        <t>EDHOC message_4 is required to indicate EDHOC-AKA authentication success.</t>
        <t>EAD_1 = Initiator identity, it usually represents a pseudo identity rather than the user's genuine and long-term identity. Based on this pseudo identity, the real identity can be retrieved on the Responder side.</t>
        <t>Both endpoints are authenticated with AKA (TBD1：METHOD = 5)</t>
        <t>NOTE: Assuming TBD1 = 5, to be confirmed by IANA.  RFC Editor: Remove this note.</t>
      </section>
    </section>
    <section anchor="key-derivation">
      <name>Key Derivation</name>
      <t>The key derivation of EDHOC-AKA is similar to that of EDHOC-PSK, but the source of the key PRK_4e3m is different. 
The derivation methods of PRK_2e and PRK_3e2m are exactly the same as those of the standard EDHOC (based on G_XY).
The key difference lies in PRK_4e3m:
In EDHOC-PSK: PRK_4e3m = EDHOC_Extract(SALT_4e3m, PSK)
In EDHOC-AKA: PRK_4e3m = EDHOC_Extract(SALT_4e3m, K_AKA)
Here, K_AKA is the key material generated from the AKA process. In 3GPP AKA, this is usually derived by the key derivation function using CK (encryption key) and IK (integrity key) as inputs to generate a new key for the specific service (EDHOC).
The subsequent derived keys PRK_out and so on are securely derived from PRK_4e3m, ensuring the independence and forward security of the final session key.</t>
    </section>
    <section anchor="message-formating-and-processing">
      <name>Message Formating and Processing</name>
      <section anchor="message1">
        <name>Message1</name>
        <t>Message 1 (Initiator -&gt; Responder)
METHOD = 5: Clearly declare that this conversation uses AKA authentication.
EAD_1: include the permanent identity (such as SUPI) or temporary identity (such as GUTI) of the initiating party, to assist the responder (service network) in requesting an authentication vector from its network.</t>
      </section>
      <section anchor="message2">
        <name>Message2</name>
        <t>Message 2 (Responder -&gt; Initiator)
The responder obtains the AKA authentication vectors (RAND, AUTN, XRES, CK, IK) from the network.
The responder sends the challenge RAND and AUTN to the initiator through CRED_AKA_R.
The remaining part of Message 2 (G_Y, C_R) is consistent with the standard EDHOC.
The encryption structure Enc(C_R, CRED_AKA_R, EAD_2) is encrypted using the key stream derived from PRK_2e, similar to EDHOC-PSK.</t>
      </section>
      <section anchor="message3">
        <name>Message3</name>
        <t>Message 3 (Initiator -&gt; Responder)
The initiating party (UE) uses its built-in USIM card and long-term key K to verify the AUTN. If the verification is successful, the response RES and session keys CK, IK are calculated.
The initiating party sends RES through CRED_AKA_I to the responding party.
The responding party verifies whether the received RES matches the expected XRES, thereby completing the authentication of the initiating party.</t>
      </section>
      <section anchor="message4">
        <name>Message4</name>
        <t>Message 4 (Responder -&gt; Initiator)
This message should be sent as it provides clear key confirmation to the initiator and authenticates the responder.
It is also an AEAD encryption structure, proving that the responder has successfully derived the session key.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following entry in the "EDHOC
   Method Type" registry under the group name "Ephemeral Diffie-Hellman
   Over COSE (EDHOC)".</t>
      <artwork><![CDATA[
+-------+----------------------------+----------------------------+
| Value |Initiator Authentication Key|Responder Authentication Key|
+-------+----------------------------+----------------------------+
| TBD2  | EDHOC-AKA                  |  EDHOC-AKA                 |
+-------+---------------------- -----+----------------------------+
    Table 1: Addition to the EDHOC Method Type Registry.
]]></artwork>
      <t>NOTE: Suggested value: TBD1 = 5.  RFC Editor: Remove this note.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Mutual authentication: Strong mutual authentication is achieved through the AKA challenge-response mechanism.
Identity protection: The permanent identity of the initiator (such as SUPI) is only transmitted in the possible EAD_1 and can be replaced by a temporary identity. The identity of the responder is protected in the message flow.
Forward security: Based on the temporary Diffie-Hellman exchange, even if the long-term subscription key K or the CK/IK derived from AKA is leaked, the past session will not be decrypted.
Key binding: The final session key PRK_out is simultaneously bound to the temporary DH shared secret G_XY and the key K_AKA derived from AKA, providing stronger security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9528">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9528"/>
        <seriesInfo name="DOI" value="10.17487/RFC9528"/>
      </reference>
      <reference anchor="RFC4187">
        <front>
          <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
            <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4187"/>
        <seriesInfo name="DOI" value="10.17487/RFC4187"/>
      </reference>
      <reference anchor="RFC5448">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="May" year="2009"/>
          <abstract>
            <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
            <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5448"/>
        <seriesInfo name="DOI" value="10.17487/RFC5448"/>
      </reference>
      <reference anchor="RFC9048">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="October" year="2021"/>
          <abstract>
            <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
            <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
            <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
            <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9048"/>
        <seriesInfo name="DOI" value="10.17487/RFC9048"/>
      </reference>
    </references>
    <?line 215?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
