<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ra-emu-pqc-eapaka-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ra-emu-pqc-eapaka-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="23"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 70?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="I-D.ietf-emu-aka-pfs"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="I-D.ietf-emu-aka-pfs"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="I-D.ietf-emu-aka-pfs"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>As the National Institute of Standards and Technology (NIST) is still in the process of selecting the new post-quantum cryptographic algorithms that are secure against both quantum and classical computers, the purpose of this document is to propose a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although this mechanism could thus be used with any PQ-KEM, this document focuses on Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203-ipd"/>. In order of increasing security strength (and decreasing performance), these parameter sets are ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
      </ul>
    </section>
    <section anchor="kem-pqc-algorithms">
      <name>KEM PQC Algorithms</name>
      <t>The National Institute of Standards and Technology (NIST) started a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms, as seen <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">here</eref>. Said process has reached its <eref target="https://csrc.nist.gov/publications/detail/nistir/8413/final">first announcement</eref> in July 5, 2022, which stated which candidates to be standardized for KEM:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encapsulation Mechanisms (KEMs): <eref target="https://pq-crystals.org/kyber/">CRYSTALS-Kyber</eref>: ML-KEM, previously known 
 as Kyber, is a module learning with errors (MLWE)-based KEM. Three security levels have been defined in the NIST PQC Project, namely Level 1, 3, and 5. These levels correspond to the hardness of breaking AES-128, AES-192 and AES-256, respectively.</t>
        </li>
      </ul>
      <t>NIST announced as well that they will be <eref target="https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/guidelines-for-submitting-tweaks-fourth-round.pdf">opening a fourth round</eref> to standardize an alternative KEM, and a <eref target="https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf">call</eref> for new candidates for a post-quantum signature algorithm.</t>
      <section anchor="ml-kem">
        <name>ML-KEM</name>
        <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for PQC KEM in EAP-AKA' FS.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pKR)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pkR is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT. The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203-ipd"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The security of the ML-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given ML-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA1, TBA1) in the skippable range need to be assigned by IANA 
   for AT_PUB_KEM (<xref target="pqkem"/>) and AT_KEM_CT (<xref target="pqct"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA2    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203-ipd" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [I-D.ietf-emu-aka-pfs], providing updates to [RFC9048] with an
   optional extension that offers ephemeral key exchange using the
   traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key
   agreement algorithm for achieving perfect forward secrecy (PFS).
   However, it is susceptible to future threats from Cryptographically
   Relevant Quantum Computers, which could potentially compromise a
   traditional ephemeral public key.  If the adversary has also obtained
   knowledge of the long-term key and ephemeral public key, it could
   compromise session keys generated as part of the authentication run
   in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   leveraging PQ/T Hybrid [I-D.ietf-pquip-pqt-hybrid-terminology]
   algorithms to make it quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The advent of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both classical and quantum attacks.  This document
   explains why engineers need to be aware of and understand post-
   quantum cryptography, detailing the impact of CRQCs on existing
   systems and the challenges involved in transitioning.  Unlike
   previous cryptographic updates, this shift may require significant
   protocol redesign due to the unique properties of post-quantum
   algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-06"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 409?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
