<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-pqc-eapaka-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-pqc-eapaka-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 77?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="RFC9678"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="RFC9678"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="RFC9678"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="RFC9678"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>At the time of writing, NIST has standardized three PQC algorithms, with more expected to be standardized in the future (<xref target="NISTFINAL"/>). As these algorithms are secure against both quantum and classical computers, this document proposes a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although the proposed mechanism is applicable to any post-quantum Key Encapsulation Mechanism (PQ-KEM), this document specifies its use with Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM provides a one-pass (store-and-forward) cryptographic method for an originator to securely transmit keying material to a recipient using the recipient’s ML-KEM public key. Three parameter sets for ML-KEM are defined in <xref target="FIPS203"/>, namely ML-KEM-512, ML-KEM-768, and ML-KEM-1024, listed in order of increasing security strength and decreasing performance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="RFC9678"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes are included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
        <li>
          <t>EAP-AKA and EAP-AKA′ FS do not define a native attribute-level   fragmentation mechanism. As PQC public keys and ciphertexts may  exceed the EAP MTU, this specification defines an explicit   attribute-level fragmentation mechanism (AT_FRAGMENT) to support transport of large attribute values.</t>
        </li>
      </ul>
    </section>
    <section anchor="message-fragmentation-and-reassembly">
      <name>Message Fragmentation and Reassembly</name>
      <t>EAP-AKA and EAP-AKA' FS do not natively define fragmentation.  This specification therefore defines
attribute-level fragmentation for attributes whose total length may exceed the EAP MTU.</t>
      <t>This specification defines an attribute-level fragmentation mechanism similar to the lock-step acknowledgment model used by EAP-TLS <xref target="RFC2716"/>. Fragmentation applies to the entire attribute, including the attribute header and value.</t>
      <t>Only one fragmented attribute exchange (i.e., one fragmented attribute transmission in progress in either direction) <bcp14>MUST</bcp14> be active at any time.</t>
      <section anchor="fragment">
        <name>Fragmentation Attribute</name>
        <t>When an attribute is fragmented, each fragment carries a Fragmentation attribute. The Fragment Data field carries a contiguous portion of the original attribute, treated as an opaque sequence of octets. The first fragment
<bcp14>MUST</bcp14> begin with the attribute Type and Length fields. Subsequent fragments carry the next contiguous octets of the attribute.</t>
        <t>The receiver <bcp14>MUST</bcp14> reconstruct the original attribute by concatenating the Fragment Data fields, in the order received, excluding any per-fragment alignment padding. The reassembled attribute <bcp14>MUST</bcp14> be bitwise identical to the original, unfragmented attribute and <bcp14>MUST NOT</bcp14> be processed until reassembly has completed.</t>
        <t>The Fragmentation attribute has the following format:</t>
        <t>0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  AT_FRAGMENT  |    Reserved   |           Length              |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Flags     |    Reserved   |     Total Attribute Length    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   |                    Fragment Data (variable)                   |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</t>
        <t>Length:</t>
        <t>A 2-octet unsigned integer indicating the length of this
AT_FRAGMENT attribute in multiples of 4 octets, including the
Type, Reserved, Length, Flags, Total Attribute Length, Fragment
Data, and any alignment padding. The total length of the
attribute in octets is obtained by multiplying this field by 4.</t>
        <t>Each AT_FRAGMENT attribute <bcp14>MUST</bcp14> have a Length that is a
multiple of 4 octets.</t>
        <t>Flags (1 octet):</t>
        <t>The Flags field contains the following bits:</t>
        <t>0 1 2 3 4 5 6 7
  +-+-+-+-+-+-+-+-+
  |S|M|  Reserved |
  +-+-+-+-+-+-+-+-+</t>
        <ul spacing="normal">
          <li>
            <t>S (First Fragment)  </t>
            <t>
Indicates that this is the first fragment of a fragmented attribute.
This bit <bcp14>MUST</bcp14> be set on the first fragment and <bcp14>MUST NOT</bcp14> be set on
subsequent fragments.</t>
          </li>
          <li>
            <t>M (More Fragments)
Indicates that additional fragments follow.<br/>
This bit <bcp14>MUST</bcp14> be set on all fragments except the last.</t>
          </li>
          <li>
            <t>Reserved<br/>
              <bcp14>MUST</bcp14> be set to zero on transmission and ignored on receipt.</t>
          </li>
        </ul>
        <t>Total Attribute Length (2 octets)</t>
        <t>The Total Attribute Length field specifies the total length, in octets,
of the unfragmented attribute, including its Type, Length, and Value
fields. It is encoded as an unsigned 16-bit integer in network byte
order.</t>
        <t>This field <bcp14>MUST</bcp14> be present in all fragments belonging to the same
fragmented attribute. In fragments other than the first, the value of
Total Attribute Length <bcp14>MUST</bcp14> be identical to that of the first fragment.
If a mismatch is detected, the receiver <bcp14>MUST</bcp14> treat this as a protocol
error and abort the authentication exchange.</t>
      </section>
      <section anchor="fragmentation-procedure">
        <name>Fragmentation Procedure</name>
        <ul spacing="normal">
          <li>
            <t>When an EAP peer receives an EAP-Request containing an attribute
fragment with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Response of
the same EAP type containing no attributes.  This response serves as
a fragment acknowledgment.</t>
          </li>
          <li>
            <t>When an EAP server receives an EAP-Response containing an attribute
fragment with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Request of
the same EAP type containing no attributes.  This request serves as a
fragment acknowledgment.</t>
          </li>
          <li>
            <t>The sender <bcp14>MUST NOT</bcp14> transmit the next fragment until the
corresponding acknowledgment has been received.</t>
          </li>
        </ul>
      </section>
      <section anchor="use-of-the-eap-identifier">
        <name>Use of the EAP Identifier</name>
        <t>The EAP Identifier field is used to correlate fragments and
acknowledgments:</t>
        <ul spacing="normal">
          <li>
            <t>The Identifier in an EAP-Response <bcp14>MUST</bcp14> match the Identifier of the
immediately preceding EAP-Request.</t>
          </li>
          <li>
            <t>Fragment acknowledgments <bcp14>MUST</bcp14> echo the Identifier of the fragment
being acknowledged.</t>
          </li>
          <li>
            <t>Retransmitted fragments <bcp14>MUST</bcp14> reuse the same Identifier value as the
original transmission.</t>
          </li>
          <li>
            <t>For fragmented exchanges initiated by the EAP server, the Identifier
in each EAP-Request carrying a fragment <bcp14>MUST</bcp14> be incremented relative
to the previous EAP-Request.</t>
          </li>
        </ul>
      </section>
      <section anchor="reassembly">
        <name>Reassembly</name>
        <t>The receiver <bcp14>MUST</bcp14> reassemble attribute fragments strictly in the order
received and <bcp14>MUST NOT</bcp14> process the fragmented attribute until all
fragments have been successfully received and validated.</t>
        <t>The final fragment is identified by the M bit being cleared (M = 0). The
receiver <bcp14>MUST</bcp14> acknowledge each fragment, including the final fragment,
using the lock-step procedure defined for fragmentation. The sender
<bcp14>MUST</bcp14> wait for acknowledgment of the final fragment before considering
the fragmented attribute exchange complete.</t>
        <t>During the fragmentation phase (i.e., while the M bit is set in
AT_FRAGMENT), the EAP peer <bcp14>MUST</bcp14> respond to each
EAP-Request/AKA'-Challenge fragment with an
EAP-Response/AKA'-Challenge message containing a zero-length attribute
payload. These responses serve solely as transport-level acknowledgments
and <bcp14>MUST NOT</bcp14> trigger any AKA' cryptographic processing.</t>
        <t>The EAP peer <bcp14>MUST NOT</bcp14> initiate USIM processing (e.g., passing RAND and AUTN to the USIM) 
while attribute fragmentation is in progress. USIM processing has to occur only 
after the final fragment (M = 0) has been received and the complete attribute 
set has been successfully reassembled and validated. At that point, the peer will
invoke the AKA' algorithm using the RAND and AUTN values contained in the 
reassembled message.</t>
        <t>If a fragment is lost or corrupted, normal EAP retransmission procedures
apply. Retransmitted fragments <bcp14>MUST</bcp14> use the same EAP Identifier value
as the original transmission.</t>
        <t>The receiver <bcp14>MUST</bcp14> verify that:</t>
        <ul spacing="normal">
          <li>
            <t>The first fragment has the S bit set and subsequent fragments do not; and</t>
          </li>
          <li>
            <t>The cumulative length of all received Fragment Data fields equals the
Total Attribute Length.</t>
          </li>
        </ul>
        <t>Any inconsistency in fragmentation state (including unexpected S bit
usage, receipt of a new initial fragment while reassembly is in
progress, length mismatch, or malformed sequencing) <bcp14>MUST</bcp14> be treated
as a protocol error, and the authentication exchange <bcp14>MUST</bcp14> be
aborted. If reassembly cannot be successfully completed after a bounded
number of retransmissions, the authentication exchange <bcp14>MUST</bcp14> be
aborted.</t>
        <t>Fragmentation does not modify the AT_MAC calculation rules defined in
<xref target="RFC9048"/>. AT_MAC is calculated over the EAP packet exactly as
transmitted on the wire, including any AT_FRAGMENT attributes.</t>
        <t>Processing of data contained in reassembled fragmented attributes <bcp14>MUST</bcp14>
occur only after successful AT_MAC verification. Fragmentation therefore
does not alter the integrity protection scope of the EAP packet.</t>
      </section>
      <section anchor="applicability">
        <name>Applicability</name>
        <t>This fragmentation mechanism applies to any attribute within this EAP method whose encoded length exceeds the EAP MTU. (e.g., AT_PUB_KEM, AT_KEM_CT, or AT_IDENTITY carrying a large SUCI). Attributes that fit within a single EAP packet <bcp14>MUST</bcp14> be sent unfragmented.</t>
        <t>The following diagram details how the fragmentation works for both request and response:</t>
        <t>Peer                                               Server
 |                                                     |
 |                 &lt;- EAP-Request / Identity (Id=1)    |
 |                                                     |
 | EAP-Response / Identity (Id=1) -&gt;                   |
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=2)  |
 |                (unfragmented attributes)            |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=2) -&gt;             |
 |                                                     |
 |================ Server-Initiated Fragmentation ===============|
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=3)  |
 |                (Fragment 1: S=1, M=1)               |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=3) -&gt;             |
 |   (ACK, no attributes)                              |
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=4)  |
 |                (Fragment 2: M=1)                    |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=4) -&gt;             |
 |   (ACK, no attributes)                              |
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=5)  |
 |                (Fragment 3: M=0, last fragment)     |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=5) -&gt;             |
 |   (ACK, no attributes — final fragment)             |
 |                                                     |
 |================ Peer-Initiated Fragmentation =================|
 |                                                     |
 |                 &lt;- EAP-Request / Identity (Id=6)    |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=6) -&gt;             |
 |   (Fragment 1: S=1, M=1)                            |
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=7)  |
 |                (ACK, no attributes)                 |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=7) -&gt;             |
 |   (Fragment 2: M=0, last fragment)                  |
 |                                                     |
 |             &lt;- EAP-Request / AKA'-Challenge (Id=8)  |
 |                (ACK, no attributes — final fragment)|
 |                                                     |
 |             &lt;- EAP-Success (Id=9)                   |
 |                                                     |</t>
        <t>The term “ACK” in the above figure is used for illustrative purpose to describe an EAP-Request or EAP-Response of the same EAP method type that contains no attributes and is sent solely to acknowledge receipt of a fragment.</t>
      </section>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>The above section outlines how the fragmentation works. This section defines the construction for PQC KEM in EAP-AKA' FS and the other params that are sent via EAP Req/Resp AKA'-Challenge.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              | EAP-Req/AKA'-Challenge,    |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              |EAP-Resp/AKA'-Challenge     |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pk)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pk is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT.</t>
        <t>The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    |   Reserved    |         Length                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                       Value (variable)                        |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. Including this field ensures that the fixed header (Type, Reserved, Length) is 4 bytes long, maintaining 4-byte alignment for the following Value field. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the length of this attribute in multiples of 4 octets, including the Type, Reserved, Length, and Value fields, as well as any padding.</t>
        <t>The total length of the attribute in octets is obtained by multiplying this field by 4.</t>
        <t>This differs from the attribute format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte.The modification is necessary because PQC KEM public keys, such as those defined in ML-KEM-1024, will be 1568 bytes, which would exceed the 1024-byte limit imposed by the original EAP-AKA format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     |   Reserved    |         Length                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                   Value (variable)                            |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the length of this attribute in multiples of 4 octets, including the Type, Reserved, Length, and Value fields, as well as any padding.</t>
        <t>The total length of the attribute in octets is obtained by multiplying this field by 4.</t>
        <t>This differs from the format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte. The change is necessary because ciphertexts produced by PQC KEM algorithms,such as 1568 bytes in ML-KEM-1024 will exceed the 1024 byte limit imposed by the original EAP-AKA attribute format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="capability-negotiation">
      <name>Capability Negotiation</name>
      <t>Support for PQC KEM is negotiated using the AT_KDF_FS attribute.</t>
      <t>AT_PUB_KEM and AT_KEM_CT use an extended attribute header format
that is incompatible with legacy EAP-AKA and EAP-AKA' implementations.
Therefore, these attributes <bcp14>MUST NOT</bcp14> be sent unless a mutually
supported PQC KEM has been successfully negotiated via AT_KDF_FS.</t>
    </section>
    <section anchor="ml-kem">
      <name>ML-KEM</name>
      <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the PQ-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given PQ-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <t>Implementations <bcp14>MUST</bcp14> enforce a locally configured maximum Total Attribute Length for fragmented attributes. If the Total Attribute Length exceeds this limit, the attribute <bcp14>MUST</bcp14> be rejected and the authentication exchange aborted. This limit has to be chosen to mitigate DoS attack with support for large PQC key material.</t>
      <section anchor="selecting-ml-kem-variants">
        <name>Selecting ML-KEM Variants</name>
        <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three new Attribute Type values (TBA1, TBA2, and TBA3) from the
   skippable range are requested from IANA for AT_PUB_KEM (<xref target="pqkem"/>),
   AT_KEM_CT (<xref target="pqct"/>), and AT_FRAGMENT (<xref target="fragment"/>) in the
   "Attribute Types" registry under the "EAP-SIM/AKA/AKA'" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA5    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="RFC9678">
          <front>
            <title>Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document updates RFC 9048, "Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')", and its predecessor RFC 5448 with an optional extension providing ephemeral key exchange. The extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term key from obtaining session keys established in the past. In addition, EAP-AKA' FS mitigates passive attacks (e.g., large-scale pervasive monitoring) against future sessions. This forces attackers to use active attacks instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9678"/>
          <seriesInfo name="DOI" value="10.17487/RFC9678"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC2716">
          <front>
            <title>PPP EAP TLS Authentication Protocol</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links.The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2716"/>
          <seriesInfo name="DOI" value="10.17487/RFC2716"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NISTFINAL" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>NIST Releases First 3 Finalized Post-Quantum Encryption Standards</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="16" month="March" year="2025"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [RFC9678], providing updates to [RFC9048] with an optional extension
   that offers ephemeral key exchange using the traditional Ephemeral
   Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for
   achieving perfect forward secrecy (PFS).  However, it is susceptible
   to future threats from Cryptographically Relevant Quantum Computers,
   which could potentially compromise a traditional ephemeral public
   key.  If the adversary has also obtained knowledge of the long-term
   key and ephemeral public key, it could compromise session keys
   generated as part of the authentication run in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   leveraging PQ/T Hybrid [I-D.ietf-pquip-pqt-hybrid-terminology]
   algorithms to make it quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 669?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="RFC9678"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
