<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ra-emu-pqc-eapaka-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ra-emu-pqc-eapaka-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="21"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 70?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="I-D.ietf-emu-aka-pfs"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ra-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="I-D.ietf-emu-aka-pfs"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="I-D.ietf-emu-aka-pfs"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="I-D.ietf-emu-aka-pfs"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>As the National Institute of Standards and Technology (NIST) is still in the process of selecting the new post-quantum cryptographic algorithms that are secure against both quantum and classical computers, the purpose of this document is to propose a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although this mechanism could thus be used with any PQ-KEM, this document focuses on Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203-ipd"/>. In order of increasing security strength (and decreasing performance), these parameter sets are ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
      </ul>
    </section>
    <section anchor="kem-pqc-algorithms">
      <name>KEM PQC Algorithms</name>
      <t>The National Institute of Standards and Technology (NIST) started a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms, as seen <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">here</eref>. Said process has reached its <eref target="https://csrc.nist.gov/publications/detail/nistir/8413/final">first announcement</eref> in July 5, 2022, which stated which candidates to be standardized for KEM:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encapsulation Mechanisms (KEMs): <eref target="https://pq-crystals.org/kyber/">CRYSTALS-Kyber</eref>: ML-KEM, previously known 
 as Kyber, is a module learning with errors (MLWE)-based KEM. Three security levels have been defined in the NIST PQC Project, namely Level 1, 3, and 5. These levels correspond to the hardness of breaking AES-128, AES-192 and AES-256, respectively.</t>
        </li>
      </ul>
      <t>NIST announced as well that they will be <eref target="https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/guidelines-for-submitting-tweaks-fourth-round.pdf">opening a fourth round</eref> to standardize an alternative KEM, and a <eref target="https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf">call</eref> for new candidates for a post-quantum signature algorithm.</t>
      <section anchor="ml-kem">
        <name>ML-KEM</name>
        <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for PQC KEM in EAP-AKA' FS.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |     EAP-Req/AKA'-Challenge |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pKR)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pkR is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT. The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203-ipd"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_PUB_CT</name>
        <t>The format of the AT_PUB_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_CT     | Length        | Value                         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Length:</t>
        <t>The length of the attribute, set as other attributes in EAP-AKA <xref target="RFC4187"/>. The length is expressed in multiples of 4 bytes.  The length includes the attribute type field, the Length field itself, and the Value field (along with any padding).</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes,the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The security of the ML-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given ML-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA1, TBA1) in the skippable range need to be assigned by IANA 
   for AT_PUB_KEM (<xref target="pqkem"/>) and AT_PUB_CT (<xref target="pqct"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA2    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="I-D.ietf-emu-aka-pfs">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203-ipd" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="I-D.draft-ietf-emu-aka-pfs-11">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   Universal Subscriber Identity Module (USIM) card manufacturers and
   operators in an effort to compromise long-term keys stored on these
   cards.  Since the publication of those reports, manufacturing and
   provisioning processes have received much scrutiny and have improved.
   However, resourceful attackers are always a cause for concern.
   Always assuming a breach, such as long-term key compromise, and
   minimizing the impact of breach are essential zero trust principles.

   This document updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension providing
   ephemeral key exchange.  Similarly, this document also updates the
   earlier version of the EAP-AKA' specification in RFC 5448.  The
   extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated,
   provides forward secrecy for the session keys generated as a part of
   the authentication run in EAP-AKA'.  This prevents an attacker who
   has gained access to the long-term key from obtaining session keys
   established in the past, assuming these have been properly deleted.
   In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale
   pervasive monitoring) against future sessions.  This forces attackers
   to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-11"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="5" month="April" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Post-Quantum Cryptography enhancement in EAP-AKA prime</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [I-D.ietf-emu-aka-pfs], providing updates to [RFC9048] with an
   optional extension that offers ephemeral key exchange using the
   traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key
   agreement algorithm for achieving perfect forward secrecy (PFS).
   However, it is susceptible to future threats from Cryptographically
   Relevant Quantum Computers, which could potentially compromise a
   traditional ephemeral public key.  If the adversary has also obtained
   knowledge of the long-term key and ephemeral public key, it could
   compromise session keys generated as part of the authentication run
   in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS making it
   quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-00"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="22" month="February" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-03"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 409?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="I-D.draft-ietf-emu-aka-pfs-11"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
