<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-spm-lake-pqsuites-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EDHOC PQC">Quantum-Resistant Cipher Suites for EDHOC</title>
    <seriesInfo name="Internet-Draft" value="draft-spm-lake-pqsuites-01"/>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 58?>

<t>The Lightweight Authenticated Key Exchange (LAKE) protocol, Ephemeral Diffie-Hellman over COSE (EDHOC), achieves post-quantum security by adding new cipher suites with quantum-resistant algorithms, such as ML-DSA for digital signatures and ML-KEM for key exchange. This document specifies how EDHOC operates in a post-quantum setting using both signature-based and PSK-based authentication methods, and defines corresponding cipher suites.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Lightweight Authenticated Key Exchange (LAKE) protocol, Ephemeral Diffie-Hellman over COSE (EDHOC) <xref target="RFC9528"/>, supports the use of multiple authentication methods and the negotiation of cipher suites based on COSE algorithms. Currently, four asymmetric authentication methods (0, 1, 2, and 3) are defined. In addition, a symmetric key-based authentication method is being developed, see <xref target="I-D.ietf-lake-edhoc-psk"/>.</t>
      <t>Currently defined cipher suites rely on Elliptic Curve Cryptography (ECC) for key exchange and authentication, making them vulnerable in the event that a Cryptographically Relevant Quantum Computer (CRQC) is constructed.</t>
      <t>This document specifies how EDHOC can operate in a post-quantum setting using both signature-based and PSK-based authentication, and defines corresponding cipher suites.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
        <t>Readers are expected to be familiar with EDHOC <xref target="RFC9528"/>.</t>
      </section>
    </section>
    <section anchor="edhoc-with-quantum-resistant-algorithms">
      <name>EDHOC with Quantum-Resistant Algorithms</name>
      <t>Method 0 in <xref target="RFC9528"/>, which uses digital signatures for authentication by both the Initiator and Responder, and also the PSK method in <xref target="I-D.ietf-lake-edhoc-psk"/>, is straightforward to use with standardized post-quantum algorithms.</t>
      <t>A quantum-resistant signature algorithm, such as ML-DSA <xref target="I-D.ietf-cose-dilithium"/>, is a drop-in replacement for classical signature algorithms such as ECDSA. For post-quantum secure key exchange, a quantum-resistant Key Encapsulation Mechanism (KEM), such as ML-KEM <xref target="I-D.ietf-jose-pqc-kem"/>, can be applied directly to EDHOC, as is detailed in <xref target="KEM"/>.</t>
      <t>To enable post-quantum security in EDHOC it suffices to register new cipher suites using COSE registered algorithms. Cipher suites using ML-KEM-512 <xref target="I-D.ietf-jose-pqc-kem"/> for key exchange and ML-DSA-44 <xref target="I-D.ietf-cose-dilithium"/> for digital signatures are specified in <xref target="suites-registry"/>. As both ML-KEM <xref target="FIPS203"/> and ML-DSA <xref target="FIPS204"/> internally use SHAKE256, it is natural to also use SHAKE256 for EDHOC's key derivation. Additional post-quantum cipher suites may be specified.</t>
      <t>Methods 1–3 in <xref target="RFC9528"/> use a Diffie-Hellman/Non-Interactive Key Exchange (NIKE) based API for authentication. As of this writing, no standardized post-quantum algorithms for these methods exist. To highlight which methods that require DH/NIKE a column is added to the EDHOC Method Type registry, see <xref target="method-update"/>. To highlight matching cipher suites a corresponding column indicating support for DH/NIKE is added, see <xref target="suites-registry"/>.</t>
      <t>An alternative path to post-quantum EDHOC, not pursued in this document, would be to define new authentication methods based on Key Encapsulation Mechanisms (KEMs).</t>
      <t>Compared to elliptic curve algorithms such as ECDHE, ECDSA, and EdDSA, ML-KEM-512 and ML-DSA-44 introduce significantly higher overhead <xref target="FIPS203"/><xref target="FIPS204"/>. More efficient post-quantum signature schemes are being standardized, such as FN-DSA.</t>
    </section>
    <section anchor="KEM">
      <name>Using KEMs in EDHOC Key Exchange</name>
      <t>Given a quantum-resistant KEM, such as ML-KEM-512, with encapsulation key ek, ciphertext c, and shared secret key K (using the notation of <xref target="FIPS203"/>). The Diffie-Hellman procedure in EDHOC is replaced by a KEM procedure as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The Initiator generates a new encapsulation / decapsulation key pair matching the selected cipher suite.</t>
        </li>
        <li>
          <t>The encapsulation key ek is transported in the G_X field in message_1.</t>
        </li>
        <li>
          <t>The Responder calculates (K,c) = Encaps(ek).</t>
        </li>
        <li>
          <t>The ciphertext c is transported in the G_Y field in message_2.</t>
        </li>
        <li>
          <t>The Initiator calculates the shared secret K = Decaps(c).</t>
        </li>
        <li>
          <t>G_XY is the shared secret key K.</t>
        </li>
      </ul>
      <t>The security requirements and security considerations of EDHOC and the KEM algorithm used apply. For example, the Initiator MUST generate a new encapsulation / decapsulation key pair for each EDHOC session.</t>
      <t>Note that G_Y does not contain a public key when a KEM is used in this way. The definition of EDHOC message_2 in <xref section="5.3.1" sectionFormat="of" target="RFC9528"/> remains the same:</t>
      <sourcecode type="CDDL"><![CDATA[
message_2 = (
  G_Y_CIPHERTEXT_2 : bstr,
)
]]></sourcecode>
      <t>and G_Y_CIPHERTEXT_2 remains the concatenation of G_Y and CIPHERTEXT_2, the latter is defined in <xref section="5.3.2" sectionFormat="of" target="RFC9528"/>. But now G_Y is a KEM ciphertext.</t>
      <t>Just as with the ephemeral key G_Y, the length of KEM ciphertext G_Y is known from the corresponding algorithm in the selected cipher suite, see <xref target="fig-ct-length"/>. Hence the Initator can separate out the concatenated ciphertexts and decapsulate and decrypt, respectively.</t>
      <figure anchor="fig-ct-length">
        <name>Length of ML-KEM Ciphertext.</name>
        <artwork><![CDATA[
+-------------+------------------------------+
|     KEM     | Length of ciphertext (bytes) |
+=============+==============================+
| ML‑KEM‑512  |                          768 |
| ML‑KEM‑768  |                         1088 |
| ML‑KEM‑1024 |                         1568 |
+-------------+------------------------------+
]]></artwork>
      </figure>
      <t>Note also that this use of KEM applies both to standalone KEM and hybrid KEMs such as, e.g., X-wing <xref target="I-D.connolly-cfrg-xwing-kem"/>.</t>
      <t>Conventions for using post-quantum KEMs within COSE are described in <xref target="I-D.ietf-jose-pqc-kem"/>. The shared secret key K corresponds to the initial shared secret SS' in that document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The cipher suites defined in <xref target="RFC9528"/> rely on Elliptic Curve Cryptography (ECC) for key exchange and authentication, which would be broken by a Cryptographically Relevant Quantum Computer (CRQC). In contrast, the cipher suites specified in this document use the quantum-resistant algorithms ML-KEM for key exchange and ML-DSA for authentication. When used with Method 0 from <xref target="RFC9528"/>, where both the Initiator and Responder authenticate using digital signatures, or with the PSK method defined in <xref target="I-D.ietf-lake-edhoc-psk"/>, these cipher suites preserve the same security properties even in the presence of a quantum-capable adversary.</t>
      <t>Security considerations of ML-KEM are discussed in <xref target="I-D.sfluhrer-cfrg-ml-kem-security-considerations"/>.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="method-update">
        <name>EDHOC Method Type Registry</name>
        <t>IANA is requested to update the EDHOC Method Type registry with a column with heading "Requires DH/NIKE" indicating that the method requires Diffie-Hellman or Non-Interactive Key Exchange. Valid table entries in this column are "Yes" and "No".</t>
        <t>For the existing Method Types, the following entries are inserted in the new "Requires DH/NIKE" column:</t>
        <artwork><![CDATA[
Value: 0, Requires DH/NIKE: No
Value: 1, Requires DH/NIKE: Yes
Value: 2, Requires DH/NIKE: Yes
Value: 3, Requires DH/NIKE: Yes
]]></artwork>
      </section>
      <section anchor="suites-registry">
        <name>EDHOC Cipher Suites Registry</name>
        <t>IANA is requested to update the EDHOC Cipher Suites registry with a column with heading "Supports DH/NIKE" indicating that the cipher suite supports Diffie-Hellman or Non-Interactive Key Exchange. Valid table entries in this column are "Yes" and "No".</t>
        <t>For the existing EDHOC Cipher Suites 0-6, 24, 25, the entry "Yes" is inserted in the new "Supports DH/NIKE" column.</t>
        <t>Furthermore, IANA is requested to register the following entries in the EDHOC Cipher Suites Registry:</t>
        <artwork><![CDATA[
Value: TBD1
Array: 30, -45, 16, TBD3, -48, 10, -16
Description: AES-CCM-16-128-128, SHAKE256, 16, MLKEM512, ML-DSA-44,
             AES-CCM-16-64-128, SHA-256
Supports DH/NIKE: No
Reference: [[This document]]
]]></artwork>
        <artwork><![CDATA[
Value: TBD2
Array: 3, -45, 16, TBD3, -48, 30, -16
Description: A256GCM, SHAKE256, 16, MLKEM512, ML-DSA-44,
             A256GCM, SHA-256
Supports DH/NIKE: No
Reference: [[This document]]
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="14" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-10"/>
        </reference>
        <reference anchor="I-D.ietf-jose-pqc-kem">
          <front>
            <title>Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="3" month="October" year="2025"/>
            <abstract>
              <t>   This document describes the conventions for using Post-Quantum Key
   Encapsulation Mechanisms (PQ-KEMs) within JOSE and COSE.

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-ietf-jose-pqc/.

   Discussion of this document takes place on the jose Working Group
   mailing list (mailto:jose@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/browse/cose/.  Subscribe at
   https://www.ietf.org/mailman/listinfo/jose/.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-pqc-kem-04"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-lake-edhoc-psk">
          <front>
            <title>EDHOC Authenticated with Pre-Shared Keys (PSK)</title>
            <author fullname="Elsa Lopez-Perez" initials="" surname="Lopez-Perez">
              <organization>Inria</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Rafael Marin-Lopez" initials="R." surname="Marin-Lopez">
              <organization>University of Murcia</organization>
            </author>
            <author fullname="Francisco Lopez-Gomez" initials="F." surname="Lopez-Gomez">
              <organization>University of Murcia</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a Pre-Shared Key (PSK) authentication method
   for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange
   protocol.  The PSK method enhances computational efficiency while
   providing mutual authentication, ephemeral key exchange, identity
   protection, and quantum resistance.  It is particularly suited for
   systems where nodes share a PSK provided out-of-band (external PSK)
   and enables efficient session resumption with less computational
   overhead when the PSK is provided from a previous EDHOC session
   (resumption PSK).  This document details the PSK method flow, key
   derivation changes, message formatting, processing, and security
   considerations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-psk-06"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="1" month="September" year="2025"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-09"/>
        </reference>
        <reference anchor="I-D.sfluhrer-cfrg-ml-kem-security-considerations">
          <front>
            <title>ML-KEM Security Considerations</title>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Quynh Dang" initials="Q." surname="Dang">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Kevin Milner" initials="K." surname="Milner">
              <organization>Quantinuum</organization>
            </author>
            <author fullname="Daniel Shiu" initials="D." surname="Shiu">
              <organization>Arqit Quantum Inc</organization>
            </author>
            <date day="15" month="May" year="2025"/>
            <abstract>
              <t>   NIST standardized ML-KEM as FIPS 203 in August 2024.  This document
   discusses how to use ML-KEM and how to use it within protocols - that
   is, what problem it solves, and what you need to do to use it
   securely.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sfluhrer-cfrg-ml-kem-security-considerations-03"/>
        </reference>
        <reference anchor="FIPS203" target="https://doi.org/10.6028/NIST.FIPS.203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 203"/>
        </reference>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
      </references>
    </references>
    <?line 196?>

<section numbered="false" anchor="acknowledgment">
      <name>Acknowledgments</name>
      <t>This work was supported partially by Vinnova - the Swedish Agency for Innovation Systems - through the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
