<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ra-emu-pqc-eapaka-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ra-emu-pqc-eapaka-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="23"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 70?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="I-D.ietf-emu-aka-pfs"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="I-D.ietf-emu-aka-pfs"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="I-D.ietf-emu-aka-pfs"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>As the National Institute of Standards and Technology (NIST) is still in the process of selecting the new post-quantum cryptographic algorithms that are secure against both quantum and classical computers, the purpose of this document is to propose a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although this mechanism could thus be used with any PQ-KEM, this document focuses on Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203-ipd"/>. In order of increasing security strength (and decreasing performance), these parameter sets are ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
      </ul>
    </section>
    <section anchor="kem-pqc-algorithms">
      <name>KEM PQC Algorithms</name>
      <t>The National Institute of Standards and Technology (NIST) started a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms, as seen <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">here</eref>. Said process has reached its <eref target="https://csrc.nist.gov/publications/detail/nistir/8413/final">first announcement</eref> in July 5, 2022, which stated which candidates to be standardized for KEM:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encapsulation Mechanisms (KEMs): <eref target="https://pq-crystals.org/kyber/">CRYSTALS-Kyber</eref>: ML-KEM, previously known 
 as Kyber, is a module learning with errors (MLWE)-based KEM. Three security levels have been defined in the NIST PQC Project, namely Level 1, 3, and 5. These levels correspond to the hardness of breaking AES-128, AES-192 and AES-256, respectively.</t>
        </li>
      </ul>
      <t>NIST announced as well that they will be <eref target="https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/guidelines-for-submitting-tweaks-fourth-round.pdf">opening a fourth round</eref> to standardize an alternative KEM, and a <eref target="https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf">call</eref> for new candidates for a post-quantum signature algorithm.</t>
      <section anchor="ml-kem">
        <name>ML-KEM</name>
        <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for PQC KEM in EAP-AKA' FS.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pKR)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pkR is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT. The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203-ipd"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The security of the ML-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given ML-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA1, TBA1) in the skippable range need to be assigned by IANA 
   for AT_PUB_KEM (<xref target="pqkem"/>) and AT_KEM_CT (<xref target="pqct"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA2    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203-ipd" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="5" month="April" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Post-Quantum Cryptography enhancement in EAP-AKA prime</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [I-D.ietf-emu-aka-pfs], providing updates to [RFC9048] with an
   optional extension that offers ephemeral key exchange using the
   traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key
   agreement algorithm for achieving perfect forward secrecy (PFS).
   However, it is susceptible to future threats from Cryptographically
   Relevant Quantum Computers, which could potentially compromise a
   traditional ephemeral public key.  If the adversary has also obtained
   knowledge of the long-term key and ephemeral public key, it could
   compromise session keys generated as part of the authentication run
   in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS making it
   quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-01"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-04"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 409?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
