<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ra-emu-pqc-eapaka-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ra-emu-pqc-eapaka-04"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="06"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 74?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="RFC9678"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="RFC9678"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="RFC9678"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="RFC9678"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>At the time of writing, NIST has standardized three PQC algorithms, with more expected to be standardized in the future (<xref target="NISTFINAL"/>). As these algorithms are secure against both quantum and classical computers, this document proposes a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although the proposed mechanism is applicable to any post-quantum Key Encapsulation Mechanism (PQ-KEM), this document specifies its use with Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM provides a one-pass (store-and-forward) cryptographic method for an originator to securely transmit keying material to a recipient using the recipient’s ML-KEM public key. Three parameter sets for ML-KEM are defined in <xref target="FIPS203"/>, namely ML-KEM-512, ML-KEM-768, and ML-KEM-1024, listed in order of increasing security strength and decreasing performance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="RFC9678"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for PQC KEM in EAP-AKA' FS.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pKR)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pkR is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT.</t>
        <t>The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="ml-kem">
      <name>ML-KEM</name>
      <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the PQ-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given PQ-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <section anchor="selecting-ml-kem-variants">
        <name>Selecting ML-KEM Variants</name>
        <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA1, TBA2) in the skippable range need to be assigned by IANA 
   for AT_PUB_KEM (<xref target="pqkem"/>) and AT_KEM_CT (<xref target="pqct"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA5    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="RFC9678">
          <front>
            <title>Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document updates RFC 9048, "Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')", and its predecessor RFC 5448 with an optional extension providing ephemeral key exchange. The extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term key from obtaining session keys established in the past. In addition, EAP-AKA' FS mitigates passive attacks (e.g., large-scale pervasive monitoring) against future sessions. This forces attackers to use active attacks instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9678"/>
          <seriesInfo name="DOI" value="10.17487/RFC9678"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NISTFINAL" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>NIST Releases First 3 Finalized Post-Quantum Encryption Standards</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="16" month="March" year="2025"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [RFC9678], providing updates to [RFC9048] with an optional extension
   that offers ephemeral key exchange using the traditional Ephemeral
   Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for
   achieving perfect forward secrecy (PFS).  However, it is susceptible
   to future threats from Cryptographically Relevant Quantum Computers,
   which could potentially compromise a traditional ephemeral public
   key.  If the adversary has also obtained knowledge of the long-term
   key and ephemeral public key, it could compromise session keys
   generated as part of the authentication run in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   leveraging PQ/T Hybrid [I-D.ietf-pquip-pqt-hybrid-terminology]
   algorithms to make it quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="6" month="May" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-11"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
      </references>
    </references>
    <?line 408?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
