<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ra-emu-pqc-eapaka-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ra-emu-pqc-eapaka-05"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="29"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 74?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="RFC9678"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="RFC9678"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="RFC9678"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="RFC9678"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>At the time of writing, NIST has standardized three PQC algorithms, with more expected to be standardized in the future (<xref target="NISTFINAL"/>). As these algorithms are secure against both quantum and classical computers, this document proposes a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although the proposed mechanism is applicable to any post-quantum Key Encapsulation Mechanism (PQ-KEM), this document specifies its use with Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM provides a one-pass (store-and-forward) cryptographic method for an originator to securely transmit keying material to a recipient using the recipient’s ML-KEM public key. Three parameter sets for ML-KEM are defined in <xref target="FIPS203"/>, namely ML-KEM-512, ML-KEM-768, and ML-KEM-1024, listed in order of increasing security strength and decreasing performance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="RFC9678"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for PQC KEM in EAP-AKA' FS.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pKR)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pkR is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT.</t>
        <t>The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    |   Reserved    |         Length (in bytes)     |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                       Value (variable)                        |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. Including this field ensures that the fixed header (Type, Reserved, Length) is 4 bytes long, maintaining 4-byte alignment for the following Value field. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the total length of the attribute in bytes, including the Type, 
   Reserved, Length, and Value fields, as well as any padding. The length is expressed in multiples of 4 bytes.</t>
        <t>This differs from the attribute format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte.The modification is necessary because PQC KEM public keys, such as those defined in ML-KEM-1024, will be 1568 bytes, which would exceed the 1024-byte limit imposed by the original EAP-AKA format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     |   Reserved    |         Length (in bytes)     |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                   Value (variable)                            |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the total length of the attribute in bytes, including the Type, Reserved, Length, and Value fields, along with any padding. The length is expressed in multiples of 4 bytes.</t>
        <t>This differs from the format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte. The change is necessary because ciphertexts produced by PQC KEM algorithms,such as 1568 bytes in ML-KEM-1024 will exceed the 1024 byte limit imposed by the original EAP-AKA attribute format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="ml-kem">
      <name>ML-KEM</name>
      <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the PQ-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given PQ-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <section anchor="selecting-ml-kem-variants">
        <name>Selecting ML-KEM Variants</name>
        <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA1, TBA2) in the skippable range need to be assigned by IANA 
   for AT_PUB_KEM (<xref target="pqkem"/>) and AT_KEM_CT (<xref target="pqct"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA5    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="RFC9678">
          <front>
            <title>Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document updates RFC 9048, "Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')", and its predecessor RFC 5448 with an optional extension providing ephemeral key exchange. The extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term key from obtaining session keys established in the past. In addition, EAP-AKA' FS mitigates passive attacks (e.g., large-scale pervasive monitoring) against future sessions. This forces attackers to use active attacks instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9678"/>
          <seriesInfo name="DOI" value="10.17487/RFC9678"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NISTFINAL" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>NIST Releases First 3 Finalized Post-Quantum Encryption Standards</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="16" month="March" year="2025"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [RFC9678], providing updates to [RFC9048] with an optional extension
   that offers ephemeral key exchange using the traditional Ephemeral
   Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for
   achieving perfect forward secrecy (PFS).  However, it is susceptible
   to future threats from Cryptographically Relevant Quantum Computers,
   which could potentially compromise a traditional ephemeral public
   key.  If the adversary has also obtained knowledge of the long-term
   key and ephemeral public key, it could compromise session keys
   generated as part of the authentication run in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   leveraging PQ/T Hybrid [I-D.ietf-pquip-pqt-hybrid-terminology]
   algorithms to make it quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="19" month="May" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-12"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
      </references>
    </references>
    <?line 427?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+U97XLbyJH/+RRz3B+WYoISJX/IuuwmNCWtVbJsWZI3l9py
uYbAkMQKBLAYQFrGciqvcf/uWe5R7kmuP2YGAxK0Ja+zSe6UqjUJDnp6+rt7
eiZBEHTKuEzUvuieZboM3lQyLau5OFELcZiGMtdVIss4S8WpCmcyjfVci42z
N+Lk8FRvijgVh8OzYHgyFHkRz1W3I8fjQl0jOB7TMiSUpZpmxWJf6DLqdKIs
TOUcMIgKOSmDQgZqXgX5z2GgZC6vZLC909HVeB5rDXiUixyGHh9eHnXSaj5W
xX4nAnj7nTBLtUp1pfdFWVSqAzjsdmShJOByocKqiMtFt3OTFVfTIqtyeHp4
+rbbuVILeBbtd0Qgzt6M8B+D7oNOp3Ot0gpgC2HfAdS68JWx6P4JoMXpVHyP
v+LzuYwTHvXHWJWTflZM8bEswhk8npVlrve3tnAUPoqvVd8O28IHW+Miu9Fq
C97f6sL0upRp9F4mWQqzLZTu5PG++LHMwp7QWVEWaqLh02JuPpRFHJY9EWbz
uUpLeAKkncs8BxTfdTqyKmdZgQsFjISYVEnCdL+Mi2ouE6VvZCHOVRQtaAAg
Bfz+C3F/X7zKrmJJz0Mg5L54LtMpIFYoelaoKY06kUUqS2Aaj8yqtEQ+H6eR
eVkZCl1laVTGxR+n+L0PGHdX8RoCywqJM6niJ6XugNRplcbhrDn396qYy3TR
mF0S5P7YQP5jinAYi06awfgSWINsPz8aPdt+tGc/PnkKHztxOqnHwC8gNsOz
432aQThtejMCUYLnIs1KpbvmV1lMVbkvrCSEugj7oFRlf5pdb40uzkdbcwW0
2jorsp9UWOotXyuDUbHIy2xayHy22ALmVsTnLfWLnOeJCiYxMHFL5nFAc/bz
aMLTkoaIiUw0UvHo9RKupB4KuAR6WbC2ZxMxBMGaK5QpAVIoLtw3sAuIBw67
CGdqvnZ1SZxe9TVofTpVBZIXhLyMw0RtDbb7g+3tp1t6e3vw6HGwPRgEzwaD
R8GgDd8XL06WEB6K0ywCw1SIYSqThY41IlzOlDiqfoq1vIqD11dynpWZuCxk
qg2/svTOiIKty0tVOESfPd0LdoPdwbPg6fbj7e1g5/1gp5W2x2cXO9u7S/ji
0wAfM94qeClLIIQKxlKrCI1tsMbYigs0AbKI1mCeXid5Nda1DOEHfLKFc269
Or647OOnPsy+Th5GB6cGX4fwiVJoNcTbXNzE5YxIi9Z8H/ApMqSSsDYVlBBR
1gKIzBYfpQWMTQYkh8VJj0Pws1lyXgBzwiyxorOyMIXcKPuxDAsyjzvbO7tb
g2e7tAphXmquAxd7dPxq+JJXY9eCj8GsJQom1uIoLnQpduFfwCv+C6DS8Hu+
bBvKGxSXEby5ufGorm50oK5JG/Ezovtoa3uP2BEUZnJQUJgc5GhiJw9ynPxn
o97KTR5oOznM3QmCQMgxmHcZlp3OUVaAoY6QAYUKF0R35M/hLyX4v3icKDEE
Uw+4xCFL05khNogVuICI3lgagjxDnz+cFkqhVREb1g2Kowtw9FroXIXxJAaK
gUv/8MHYw48fe8jM6zhCealyZIkWoHg8Aoznx48sQxKsCi1OJkIxrjBxOZMl
iMZEFVqoHK1JAb+DV4YxqANTJSqNoHGJQIEoNiAO3eDDJIkBcChGVXGtxEE8
ASyDFypJwPDDOkYHLw43CaR0q5MJRCCA1ZyIIcEXq2ucJVfFBOwuPiUia0Pk
jTOgQl+8yG6Ay0VPxCWRpNKhgqmR5rDkSVWiHS1nEHWUoBBFNheeyQZaJ8mC
RPEaGC6szI2yeV6BsQGHfQODZui7ElARsOHAIHoHTBIQGUIgJWSDCjXJQOkT
oAEssy+O2RjKCHDVsliImQS1THQmsnEp4xR4eJVmN4mKgLzGckKQMQ0AizlT
CuShDTatnPHzcALZJmbCAC2mCrwqq74WOVh8O4NsilxRpV5w+KDf6VzOgKYU
BQoZz0mKVAoyECp6X1uLA/A84XS2RIwXEIBRQAZIWqXScmJF6F4RbkARLmCF
2jePoyhRnc436CQLsOEhvvEP0sVITYiFTTWsdQ/mj5E11zDmfojsfn92Bi5q
DHGEeKVKDJbvgdxmm4kgA9D7lAWorUe7/vcFyUVesH1FKOA9ZXgFTuhmlpFs
T1moZRiCJKLcWIkWTqJJG1n8ca6GyCowtyDhesaY48u51BBKS62rubE+IOcz
CfZlrBQhDaYCNDMCbQZZ7zckcg7qOSVmABgNcaLBGARL9af9nkjQmQgNBkGh
ybmWNGiepXGZYRSyCaYKEAVPZWyKQVeDPL5CCwT4QKwHFsOftkIH51sHZ+W0
UeGAdLt+atBBE7lpjM9NnIAmwTKL7AoWCjol72PExMbo/M1o02jcBWQcD3Q9
I/JSISshVQvJ9ABwGC9uyKQUKo0ABHCjVEE2CWCVARiQXmNR7SuJVJ5kC+Bf
mUUSTMRYZ8gYklcgJEW4kCLF1pgQZ3OOXOQ4q0rWm5ScrAQNMIYGn0IgA4Ip
UQcS5Dxo01xbXUeTXKNRuzOwj+kkjlBDgFQqoQDImTDGMs1ISGEwZGlAVSt7
K/TpiyHTKTR0CkG72dRcvBieHx68vzgcnR9espSTBUKv5xlu4DUYKVLhJ/1d
hOzZjs2v4DI8z4AGg9wDCIQYnTzoiWP8D7JiBWN+DAkacLCI0WQBL+BFwtmo
/lxBDM+kxfc9gYkg2CfnC489l800BttuGck2BoCDOHvrBm06B1Jj6o3xB6l3
hMwC5Y6+xF2g6TFzMR6KTZm1L2QwgbsxxnelU3I0aY7wbCqdJZPWk1mKFoD1
kClRxnNixg2sF9StRyEwcc7GjxThYkCiME31JNWY5Dlk8GBpwW6XpDuo+Y13
jUgaM7Tx4YOLsklshnpVB2ThFm8XOM5gLrsOZHiYoGFEfQrr6Kck/2/SWjKx
GVo0KZi8dwzVmjHFMAHvVk1nRrEIZAQSZfMrmBF1D1AxQRyKoh+Vf4rzlvGb
y7hbR6hBKTTaZab2uuzvE5J1+tIEIoI/WfFCsmSpCtDBiA0NbgNMZRoFhhqb
IvRtNizYOXn0wkU8hRSkRAuWGV6B+SkxVwbfhTKLFMYEroAAlMUQiBvnMa6u
Dsjds//5239qh6EXiV6S6EEUKAEDNO2qZMtpxqKsNOIZk0BjzIBVIMCKRwaP
Bzs9+/npkz22G+b7ALItcKqgVQwmK9CNgGKAuYdYXLPDN2YB8iiVTikcAQOi
3ACUJ6wTgOHtY6Q3ylIMONhDwNADRJOckMZQlTUba4dadE/fXlx2e/yvePWa
Pp8fvnl7DIYOP4PJe/nSfeiYERcvXr99eVB/qt8cvT49PXx1wC/DU9F41Ome
Dv/cZQp0X59dHr8GdeyyqvpSiMRllQa/pgpwKxyVd0B8wiIeM7Gej87++78G
j4D2/waGcWcweAbBJH/ZGzx9hOkb2HOeLUuBIfwV2L/ogOqA9UQoEBWgwY1L
8BkYNwk9y25SAXYVqfm7H5Ey7/bF78dhPnj0nXmAC248tDRrPCSarT5ZeZmJ
2PKoZRpHzcbzJUo38R3+ufHd0t17+Ps/JCDIIhjs/eG7DorQJfjGOM2SbLqw
2Y3lDSQqii2DcaboR3VTF/5wHBxQgTjIf67iHP5bBrPFuIgj8roGMrgxiqom
WZJkN7GJedkMFwr4U6IWVdoa8zqV55B+H1IcrMzsf8oSdQJjhPfv7BbhldHh
yT7qESayfmkF3oJfWXnX18TWAsa0i+15VbCLIBp65LUJOkTJ+aRKjBZYEx/F
5KCbFtJzYKAtkEHcZOyllAYKdb1q6KUXjA7tW919IYagBvWwNeAFry9LSSkx
9ptAxAm/aVpmT5CVAXbGigOcENUWYq2pNOjB4pUteYRU8mgZ1bvTGAAFlp+S
9dYgty9g6Q2Gf8GCKXADZoxVAq67DjOaIYLNkNi5LMc8Gk3KDSwJ/20JHvos
li7EqJkZYnCFcSxMibkLzG9LA3UgBnRo1Avq9yGx4+o6CVk7KdDNJBVIFEs0
eY/nsBjcNCKjWWdpFAasiVw6neN6ZI90eqlkcq1QUsTG8IdNTC8wLsc4ANx2
BGE/1VrOh68OehRQ1q/CK/Tb8O3lKzYEFAd4sI07T03ObxLotxfHpwTLBYhA
sSopGdp/nB9ewK9isLMXjEHdvIya4JN4cyA+U+EV5AAm1l/7Rl3/hKwBYze0
h56nQpy4PNQoP3JtqMCECENfyn6GZ4JyLy+LyxWEzkRVM1jqKx49PMAVYz0K
dyk9wc1cMcvQFSnYMysfndByjk/64qjChLxAo0OixqmMhiEQF5lR+InyME6z
yTfHrAySCBqHtKNheYDRTwNdyL4cOox3s16Sy7iguSB3jLSxjzYSYyLIsjmS
InsqiCPBTIw4B67IqbJCwGQ7Np6Dx9EAoMbl+7O3z99zqrkRyqLAiLeedNNN
AiNPDo7eH124URkR7OjC2R8XI2Ks+xzzBeYbeMh5PJ2VFMZMU4hzQRYmJJtg
7pVOgbAgSlWeZwVnRctFOVdqMtUHhck5iqRGQMCzG4l1pTLjBFA6AHWNinMK
QTkFpsoLRekKpLn4OlZMqDhVUW0ElCTPYOGk6w0aUcg6HBGINGMvRW/zwhqD
XUpO+DoUWVLiHGUSsAICOixrcISZE11MQRCk430PDSFKG9ZHIFCTSFP8sXZN
JRbc4mscYcvBRgyb0b2TTpoXyK2wkIVog45wNYLwRwDN1dG79dS27FRXjyln
tBURC6P0Z4Tf7ZK0KxdGbGVwcQU4NY3/4KjYlDPcBGBg/vrXv3ZOTwxzvhVn
50cPNo5PHtxi0eK2WaboeoW27u2xsS2bBKLzzTefzOLuFLDcKDTpOsbMRX46
6cSM04Y0kK2udcGadme5UB8TZye+Z8SAQ08W1vjX8SNlCxCVAJ4fPvDuNgaZ
EAv8DgNUIOcc8PtepRubIvhObORXPaGvNutfGXN4zr9jU4LW3u8Hin6n5zxG
A5FuMFkQ+RWyyt9x0PSEnGTJT0KKJxBp0AR4qwQdwFiX6mbkzdBpOfKxiLFc
QLaMwFjwGCYIAu9bokle5KbCaQPmkLYNGTeMCUkBUf3xyRi1fQIfjCFnpLre
1EXXyW03Ut5jLMDoGe1x2OpQrYxmsdex9G24x91Fz6KEPtGDy3W7RlzWMPn4
M5bS46zSsEoz35KzcHu+/kIorDmAkGmainPJ8S9KyDeF+fIRAhhiDPgH3rnC
1WErggkBWZc5j+hh9QKcnYq4ykX1z5Xd+w8fjl5DAlraTXwM1NA2XUMEi3Hb
hw8vXpzAgMyCHgmqQGB8QrtHmjfkTOUQi6aYqBrFAFSPXx0Eo9FwR9gKscRy
I2X9q1lYmWibf0VEB5t6Hb32UETp5VICQKhLJeD/wEuFsxobi22T51zgwslX
sMNo/JUjZ1QV3r4oWA4yE1wA9jIU9BntoTF5sALL2wsyJRhsxfAdY0MQa0g5
C97hwdjMbdhbXoYZmDLyL2SosSNKLxmYCuiYsGytCc5R5bDhB2tPlaZ9lBdn
J4dkrFMiDs2GMfxYsaeLWNWsw2d+LFXsbBcCeQs/13VVe5t502wk7o0mNUSg
EXp2jBxwj5oslnrUUBBQPSxLD3nbktpzsObMatPp/AnwqaZT0Pglk8u+i7FW
3suUnA9BT24wQQJ0INtxgRepUVwXDYAsGF4tmrpQq3W9OQCxDHtRRLt9Anj3
/ehyPXzP8oIh3/QddxOBphubVGnoCapBhoJMxOTSDxZrjBAL3t8kLOI0Qoaq
xjzIWYOE1YtTdv/oTMHNn7153/DpNOEp5DNxnrTOSq7C5HYuAUE5OQflIB5i
yJhGZgPCLgRNnpVP2nZmBN36LMJGqt0EHImbaVqJ0IqBI4YUMwiUMUQr4owS
r4kxlyjsGAWwrc9WeilQOChnafJIk8l3G8UjeAJqara+qZylzZYSS4hxyd4w
wsCu1yvMQxAFkicwcKrBo2U+An3odLi9h0L8+u8MSbvm74JDwsbf8MB0Cd02
ny99/cyPt58HYvixZYPCuwP5fbD+7+EXYPIrlsOL0Hm9ii8AsnGGMhQugiPI
8UAvIAO8L5CHnyDJd58DYl/+FJDVH+HBwyacWytQmHObgMqVE6wHWaknrOJz
y5mYKzRgOZJaK9sLDuCR29d16xu2tkpEj8oQlzZ45ZpIGxyY2QQn2sv+bZdO
0w6Aemfsf1vXtVycMlSY4g4PbdOePDCljwdc+GjDRyaFktHiLqWQ34DvDvyy
nH3yxy9TzGNgoqN3/wuBWEvd+zWY+GT+QiDLtP3u72usPgfEV5EvA2IVi3sX
vgzIsnV/+BsZK67kKgwpWuvHfQFpmlhvZBQnkM5v12Wj1sriKpz71xpFKz6r
FUhVVydnyguDvSCpBY6tOa4Ji1eKlI67K9bKzWJBWnBeh5OtXXqS0GI9sWUC
+ySu4jynfSkv6vRzHlvybIUTexVCrIX6kSfXl7za51p8/omtpw2tMGYMRjPc
vsGO4HsAAaYaa3D5ng0Cs7l3L0ycaNjX3x+/Ont7eT8gDMclbvD5dDhqGftV
48WHK6y7I5sfekBuP1c4j1hT/Wo01a9vG0Coan6HgjmnnqSXNRUsECbb50ro
pJPm/XYgNruCQVj2Ng0MXBan4AfsJfyA511s0rIEpNbYHu3GxWmF8dlPFe5m
6ka6AzEXHiBqwQQbZCESTJQmE4f1XKw49mrFdjUyyPhM7r2CSYW7im4Dpc6t
KYUCWxU1w6cWmnwVOfmKpqB24V8KpKksK+pxZ0w+Ne6OQDhA79GeyBcCaXJj
NRO6A5CvbQpsvIH9yAvwNlh0yawyk4L6JqIpsUvbWMvGo1Zrf6dqWezbC6iN
jax6v+gBO+sVIMsda3QwKOF21rzIQqt9vKdLZmIViFN0nPxaJpUp5dXFENyn
x0qnoY+mhOafWQEb41x1YMkR3wsIuuLDi0Zx8f6Y1F7zi5fzT1JiWNra537r
xETv2P2LzcAsSzZib8HndqknYM2mArbcsue2e7OrqThvTlvxNXu5VPdkztlN
XBhUc24VDgo4lgWvVQLqdFFxJ7PZT9Bmt4A2LyfUHrMOTpgVgEPZF/WWB3Ye
LvU4xlTdjHrr8Sm5VdM/mET+0eksxuHOYFhT3U6fduoSxfri8Br7ASZmV+WG
y0YtcBqHVxT3yy/30lOjJWZhRMjWdTk43HRvmte5MdBs6dUrtq02LXCQNv8u
ZGSrwWZihyW1ozd3lnFQC9/NkZDl3i1MZTAxmdLuln9Cp3VdRie417nZgoDd
uoAGb3rKUv5rJjXeH8qg1ZB/gaqx63S4KFVOEa47exc2Ngf+pPAYB3XDNve5
kJPavmxa8gkAbXRd2BJim0WrnTQ2FvQawrGBbQRYaljtSXFtMJTiN+shP9T9
dI0XlysfvAnGx1Mk7slh1wfQQ1/1sF/hW78jgjtCghU8qEWfN9W9bjoKBUy1
qbFYb3H6anVVtnVwqQ5rO/02IHB+sWk734Y/0C4w9dDQoTjuQrxyO1KUJhBc
MGVx5KiF0bf1Az1unwEM+GAD7a9hIjaclOYoEv9maEvHY0mysQGXjmF51QqC
ZSoVutG1ZZohe6bviVK79Dq7UnVjidlVz69qTnCLCXPC6z5hZnTDstvSMEJe
oAZK/RRgtLtad1d6RDg2tPSqUcOKWJtkmUZJ6zXD0po8s+3aJiFEvoVz0MQk
lIxV7uN+Hi2mbHilptA02hcbi/EE2JCs2ZDDVLtsOhDt6MWDLUFXg2+rKU36
es13S41cXBVs6GnLbi1371RjjTufaQleyr1xegEO+xD+W587GCswOPU6T0/8
9i4s67p+Lr+Za40gnZxvMpBVpJpQb7VeahQT3qYg7pJTSfHkPXa6wrunJz9u
9/uDnafv+DFoMj8d7Oz1+7t7u+Y5GI5vW6fH13ceP35HYJEAa4btPH7S7z99
8pQHHn5i5NMne4TRs3csBaQVaOXOkeF3aypY06DlRtY6R2aBxxbxdKqKun3A
7aZjKGSER6sqygLT7uw6CTaQBZtiHNvidFMkjeIt9Sv0vJNkp8OXwXPstTkJ
Rpeo5TiZPaBkNqhMW472B5+d2I4vCN5tv2objbidJU7xXKNFh4Ijd9nKKtob
Wm+KDXKhOzjC9JZbwnm95+JHc2jqHXgxJJRugJcJkYYsJp1axvY177aO5gms
H0cHp+9o3//QJuMUrnlSTVGAV2f78E3+M7D0I23bX5K7x+tWnPdpq9LHDUXt
O0WFv+2WiGTQ8myn5dmugzGA33fFI/FYPBFPxZ54dp9nDOVh8Cv/1zHRlEcB
E13hqdPimsv6dbT1ks+lbcR47BrCn00/+Ppq2Py6v9tPg/kBUyGxQf1540Rt
rhn2OTD3xObX06YWPyfEeP6G1UNqE8Fquu/J4yfdNMNvxNxYygbn8vlwIJ7/
WRwPXw379I7lOL0xFIMAOWwO+RRWGlApzUnbCitEx9QaxN1MAJxHc1Ojdx56
Ev8C787ATOHx+8tFDvbaTtczQkU3uDxisaJcs4d3laX2NoRHjA4Ef9PUtfw1
I3fmLKHA1tjJMKNF5/noWA9RYJuqb3yglFNPsvVmN4siJIgr85Kpw0g6ag7F
DiNUpdg3R5aJz0qZZifX+JiVYN4S1ht7zYjfL0UL7pkeK/sWk8jniiUT9wh7
S+WzjPbgEZ0Nxkw5nTINzMy00Ybdx6ZneG6ayqgh0lC933FyEsV8341ziDXK
xnTa5mPblMjHMR8N9p7SZRqu89dYDOYAQB7QXH1EbZ5FjWC8rimNIX7DCHLV
UeElctiiSl4t0w3H0Dhqa7v1B4+f7Fkam+sjqBihfgmVqUHgC8zMJMazxfGc
j2AbN2+OIiduqUwBphYxYl+YfjDxO+H3vu1jUcydgmpuSlts4rWbvm29kDTP
c0OdsmbvimDNcYuHWmYtpz1G9zi0pZssQFgYA0+kOLD/iyoyo45U1XLsAcHC
IjquygTJ9a03tpRlzzzRHHwY1gXDEpamIBq55hnxWBXELtRsZA9CmZS7bx25
2W9DPx6Wn3Djdl/u/60XNwTg7/9HvfhdPfhnwHwBNr+9F2d+fsKJ73wFJ/73
8pW/maO8k5Os60q/zkn6rFjxk1/HOxJS5m65VsdYp4p4VgZv+2J/tdLso3vW
XdaOcMlXmmaHpj8U9/CHy7GB7xk9YReee+Sq4qp/XG7Zd3T9glb9r+Mqxb+S
rzRs7XRMacDcWqjVNV+S17zkhDAHK0rn61pugEId8q4coX58vPRqYm89arlM
BjHyroxwJQpbC6CEAC9ccbPwxPt3vUSFdQMzgxqEKRos6pJB2wVBdPNQ43i8
f1mtu0zTXN0rzP22fMAiijUaqirWM3thU0XskpHMaf8rxGg09QXYXahmz0ht
ig0NK7eXXA22+zt8y9XqLRphAMIKcS1wjy4xunSx41ajhArrw9aeelL7tGfK
rst0rus0pqwCkpkwjRxed8OK5M1dsToyB0Old/vMsqybO5JqYYhUTu2a6E7o
ZAiej+LbsBp1NL5G2yoFtocekQfjI+14bUTFTgkdUdsr1K+BtIdVoR3e3ntC
Czi2Z5CTnphmWbR0OjXHm9biEG+mCEvp+h6lmMa4kWrW47ZgINDEzGKsnPmn
PVI8RcghvLZHvOmyQAO7vokPaVTEWBan7sr68kqg3xIQttm4ZekNW7YvMuUj
7P575Lb984+oMn6evXxHGYfgFypB6cBKJAvPD3y8UTtTs3p7xtLRwHoD25lZ
vnhXmcK7AWQPTnLhVbOeJWSjcK1ACGzXqWmtCTUV8dlkXXLl3Z0P5ROD0ZIe
NCUoTCTTzNho1CpzoHyd8hgsQflyujmXD9m6k0sYl2pPqTRqFUIc7N5duTCq
W1EsjDxuMjoNZ9ogNrCU06NYcNPaurppt6AgIlWOLXgxCcVh4M5pBgRJd3zW
NcCNDx+4YPpx07ZUmMSCfoEU7KObqjt0nhSDMd2lq9Z1CdEKQmYzSQNdvAAQ
aVv5+FScuZbALt9gD/EVvkaYxdyUobQ5VMfn61hP7Bz1ZobrmKQdCYVHGt15
sSMbKJDnhrmcfKxETAIECBun662Zh9/av/pT+9/63ykrujWBA346oLObfJVI
S74BIS0e2ka325KJfEWMQGx2ecbmDTCnL4Eq4IxrjH68fH5gk419cfni+AIb
Rt/9PTB6tBYjCAn+IRg9XosRRcu/IUa8eR8EYE/DKzQTw9Bde0kHchu3FCcU
+uG53XqDq3FQmGwQHhXG/x+LfKKDwQDNz/8CGFzh0ndjAAA=

-->

</rfc>
