<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-spm-lake-pqsuites-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="EDHOC PQC">Quantum-Resistant Cipher Suites for EDHOC</title>
    <seriesInfo name="Internet-Draft" value="draft-spm-lake-pqsuites-02"/>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="19"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>

<t>The Lightweight Authenticated Key Exchange (LAKE) protocol, Ephemeral Diffie-Hellman over COSE (EDHOC), achieves post-quantum security by adding new cipher suites with quantum-resistant algorithms, such as ML-DSA for digital signatures and ML-KEM for key exchange. This document specifies how EDHOC operates in a post-quantum setting using both signature-based and PSK-based authentication methods, and defines corresponding cipher suites.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Lightweight Authenticated Key Exchange Working Group mailing list (<eref target="mailto:lake@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/lake/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gselander/pq-suites"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Lightweight Authenticated Key Exchange (LAKE) protocol, Ephemeral Diffie-Hellman over COSE (EDHOC) <xref target="RFC9528"/>, supports the use of multiple authentication methods and the negotiation of cipher suites based on COSE algorithms. Currently, four asymmetric authentication methods (0, 1, 2, and 3) are defined. In addition, a symmetric key-based authentication method is being developed, see <xref target="I-D.ietf-lake-edhoc-psk"/>.</t>
      <t>Currently defined cipher suites rely on Elliptic Curve Cryptography (ECC) for key exchange and authentication, making them vulnerable in the event that a Cryptographically Relevant Quantum Computer (CRQC) is constructed.</t>
      <t>This document specifies how EDHOC can operate in a post-quantum setting using both signature-based and PSK-based authentication, and defines corresponding cipher suites.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
        <t>Readers are expected to be familiar with EDHOC <xref target="RFC9528"/>.</t>
      </section>
    </section>
    <section anchor="edhoc-with-quantum-resistant-algorithms">
      <name>EDHOC with Quantum-Resistant Algorithms</name>
      <t>Method 0 in <xref target="RFC9528"/>, which uses digital signatures for authentication by both the Initiator and Responder, and also the PSK method in <xref target="I-D.ietf-lake-edhoc-psk"/>, is straightforward to use with standardized post-quantum algorithms.</t>
      <t>A quantum-resistant signature algorithm, such as ML-DSA <xref target="I-D.ietf-cose-dilithium"/>, is a drop-in replacement for classical signature algorithms such as ECDSA. For post-quantum secure key exchange, a quantum-resistant Key Encapsulation Mechanism (KEM), such as ML-KEM <xref target="I-D.ietf-jose-pqc-kem"/>, can be applied directly to EDHOC, as is detailed in <xref target="KEM"/>.</t>
      <t>To enable post-quantum security in EDHOC it suffices to register new cipher suites using COSE registered algorithms. Cipher suites using ML-KEM-512 <xref target="I-D.ietf-jose-pqc-kem"/> for key exchange and ML-DSA-44 <xref target="I-D.ietf-cose-dilithium"/> for digital signatures are specified in <xref target="suites-registry"/>. As both ML-KEM <xref target="FIPS203"/> and ML-DSA <xref target="FIPS204"/> internally use SHAKE256, it is natural to also use SHAKE256 for EDHOC's key derivation. Additional post-quantum cipher suites may be specified.</t>
      <t>Methods 1–3 in <xref target="RFC9528"/> use a Diffie-Hellman/Non-Interactive Key Exchange (NIKE) based API for authentication. As of this writing, no standardized post-quantum algorithms for these methods exist. To highlight which methods that require DH/NIKE a column is added to the EDHOC Method Type registry, see <xref target="method-update"/>. To highlight matching cipher suites a corresponding column indicating support for DH/NIKE is added, see <xref target="suites-registry"/>.</t>
      <t>An alternative path to post-quantum EDHOC, not pursued in this document, would be to define new authentication methods based on Key Encapsulation Mechanisms (KEMs).</t>
      <t>Compared to elliptic curve algorithms such as ECDHE, ECDSA, and EdDSA, ML-KEM-512 and ML-DSA-44 introduce significantly higher overhead <xref target="FIPS203"/><xref target="FIPS204"/>. More efficient post-quantum signature schemes are being standardized, such as FN-DSA.</t>
    </section>
    <section anchor="KEM">
      <name>Using KEMs in EDHOC Key Exchange</name>
      <t>Given a quantum-resistant KEM, such as ML-KEM-512, with encapsulation key ek, ciphertext c, and shared secret key K (using the notation of <xref target="FIPS203"/>). The Diffie-Hellman procedure in EDHOC is replaced by a KEM procedure as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The Initiator generates a new encapsulation / decapsulation key pair matching the selected cipher suite.</t>
        </li>
        <li>
          <t>The encapsulation key ek is transported in the G_X field in message_1.</t>
        </li>
        <li>
          <t>The Responder calculates (K,c) = Encaps(ek).</t>
        </li>
        <li>
          <t>The ciphertext c is transported in the G_Y field in message_2.</t>
        </li>
        <li>
          <t>The Initiator calculates the shared secret K = Decaps(c).</t>
        </li>
        <li>
          <t>G_XY is the shared secret key K.</t>
        </li>
      </ul>
      <t>The security requirements and security considerations of EDHOC and the KEM algorithm used apply. For example, the Initiator MUST generate a new encapsulation / decapsulation key pair for each EDHOC session.</t>
      <t>Note that G_Y does not contain a public key when a KEM is used in this way. The definition of EDHOC message_2 in <xref section="5.3.1" sectionFormat="of" target="RFC9528"/> remains the same:</t>
      <sourcecode type="CDDL"><![CDATA[
message_2 = (
  G_Y_CIPHERTEXT_2 : bstr,
)
]]></sourcecode>
      <t>and G_Y_CIPHERTEXT_2 remains the concatenation of G_Y and CIPHERTEXT_2, the latter is defined in <xref section="5.3.2" sectionFormat="of" target="RFC9528"/>. But now G_Y is a KEM ciphertext.</t>
      <t>Just as with the ephemeral key G_Y, the length of KEM ciphertext G_Y is known from the corresponding algorithm in the selected cipher suite, see <xref target="fig-ct-length"/>. Hence the Initator can separate out the concatenated ciphertexts and decapsulate and decrypt, respectively.</t>
      <figure anchor="fig-ct-length">
        <name>Length of ML-KEM Ciphertext.</name>
        <artwork><![CDATA[
+-------------+------------------------------+
|     KEM     | Length of ciphertext (bytes) |
+=============+==============================+
| ML‑KEM‑512  |                          768 |
| ML‑KEM‑768  |                         1088 |
| ML‑KEM‑1024 |                         1568 |
+-------------+------------------------------+
]]></artwork>
      </figure>
      <t>Note also that this use of KEM applies both to standalone KEM and hybrid KEMs such as, e.g., X-wing <xref target="I-D.connolly-cfrg-xwing-kem"/>.</t>
      <t>Conventions for using post-quantum KEMs within COSE are described in <xref target="I-D.ietf-jose-pqc-kem"/>. The shared secret key K corresponds to the initial shared secret SS' in that document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The cipher suites defined in <xref target="RFC9528"/> rely on Elliptic Curve Cryptography (ECC) for key exchange and authentication, which would be broken by a Cryptographically Relevant Quantum Computer (CRQC). In contrast, the cipher suites specified in this document use the quantum-resistant algorithms ML-KEM for key exchange and ML-DSA for authentication. When used with Method 0 from <xref target="RFC9528"/>, where both the Initiator and Responder authenticate using digital signatures, or with the PSK method defined in <xref target="I-D.ietf-lake-edhoc-psk"/>, these cipher suites preserve the same security properties even in the presence of a quantum-capable adversary.</t>
      <t>Security considerations of ML-KEM are discussed in <xref target="I-D.sfluhrer-cfrg-ml-kem-security-considerations"/>.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="method-update">
        <name>EDHOC Method Type Registry</name>
        <t>IANA is requested to update the EDHOC Method Type registry with a column with heading "Requires DH/NIKE" indicating that the method requires Diffie-Hellman or Non-Interactive Key Exchange. Valid table entries in this column are "Yes" and "No".</t>
        <t>For the existing Method Types, the following entries are inserted in the new "Requires DH/NIKE" column:</t>
        <artwork><![CDATA[
Value: 0, Requires DH/NIKE: No
Value: 1, Requires DH/NIKE: Yes
Value: 2, Requires DH/NIKE: Yes
Value: 3, Requires DH/NIKE: Yes
]]></artwork>
      </section>
      <section anchor="suites-registry">
        <name>EDHOC Cipher Suites Registry</name>
        <t>IANA is requested to update the EDHOC Cipher Suites registry with a column with heading "Supports DH/NIKE" indicating that the cipher suite supports Diffie-Hellman or Non-Interactive Key Exchange. Valid table entries in this column are "Yes" and "No".</t>
        <t>For the existing EDHOC Cipher Suites 0-6, 24, 25, the entry "Yes" is inserted in the new "Supports DH/NIKE" column.</t>
        <t>Furthermore, IANA is requested to register the following entries in the EDHOC Cipher Suites Registry:</t>
        <artwork><![CDATA[
Value: TBD1
Array: 30, -45, 16, TBD10, -48, 10, -16
Description: AES-CCM-16-128-128, SHAKE256, 16, MLKEM512, ML-DSA-44,
             AES-CCM-16-64-128, SHA-256
Supports DH/NIKE: No
Reference: [[This document]]
]]></artwork>
        <artwork><![CDATA[
Value: TBD2
Array: 3, -45, 16, TBD10, -48, 3, -16
Description: A256GCM, SHAKE256, 16, MLKEM512, ML-DSA-44,
             A256GCM, SHA-256
Supports DH/NIKE: No
Reference: [[This document]]
]]></artwork>
        <artwork><![CDATA[
Value: TBD3
Array: 3, -43, 16, TBD12, -48, 3, -43
Description: A256GCM, SHA-384, 16, MLKEM1024, ML-DSA-85,
             A256GCM, SHA-384
Supports DH/NIKE: No
Reference: [[This document]]
]]></artwork>
        <t>Cipher suite TBD3 is intended for for high security applications such as government use and financial applications. This cipher suites consists of algorithms from the Commercial National Security Algorithm (CNSA) 2.0 suite [CNSA2].</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="15" month="November" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>
        <reference anchor="I-D.ietf-jose-pqc-kem">
          <front>
            <title>Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="8" month="December" year="2025"/>
            <abstract>
              <t>   This document describes the conventions for using Post-Quantum Key
   Encapsulation Mechanisms (PQ-KEMs) within JOSE and COSE.

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-ietf-jose-pqc/.

   Discussion of this document takes place on the jose Working Group
   mailing list (mailto:jose@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/browse/cose/.  Subscribe at
   https://www.ietf.org/mailman/listinfo/jose/.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-pqc-kem-05"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-lake-edhoc-psk">
          <front>
            <title>EDHOC Authenticated with Pre-Shared Keys (PSK)</title>
            <author fullname="Elsa Lopez-Perez" initials="" surname="Lopez-Perez">
              <organization>Inria</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Rafael Marin-Lopez" initials="R." surname="Marin-Lopez">
              <organization>University of Murcia</organization>
            </author>
            <author fullname="Francisco Lopez-Gomez" initials="F." surname="Lopez-Gomez">
              <organization>University of Murcia</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a Pre-Shared Key (PSK) authentication method
   for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange
   protocol.  The PSK method enhances computational efficiency while
   providing mutual authentication, ephemeral key exchange, identity
   protection, and quantum resistance.  It is particularly suited for
   systems where nodes share a PSK provided out-of-band (external PSK)
   and enables efficient session resumption with less computational
   overhead when the PSK is provided from a previous EDHOC session
   (resumption PSK).  This document details the PSK method flow, key
   derivation changes, message formatting, processing, and security
   considerations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-psk-07"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-10"/>
        </reference>
        <reference anchor="I-D.sfluhrer-cfrg-ml-kem-security-considerations">
          <front>
            <title>ML-KEM Security Considerations</title>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Quynh Dang" initials="Q." surname="Dang">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Kevin Milner" initials="K." surname="Milner">
              <organization>Quantinuum</organization>
            </author>
            <author fullname="Daniel Shiu" initials="D." surname="Shiu">
              <organization>Arqit Quantum Inc</organization>
            </author>
            <date day="17" month="November" year="2025"/>
            <abstract>
              <t>   NIST standardized ML-KEM as FIPS 203 in August 2024.  This document
   discusses how to use ML-KEM and how to use it within protocols - that
   is, what problem it solves, and what you need to do to use it
   securely.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sfluhrer-cfrg-ml-kem-security-considerations-04"/>
        </reference>
        <reference anchor="FIPS203" target="https://doi.org/10.6028/NIST.FIPS.203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 203"/>
        </reference>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
      </references>
    </references>
    <?line 219?>

<section numbered="false" anchor="acknowledgment">
      <name>Acknowledgments</name>
      <t>This work was supported partially by Vinnova - the Swedish Agency for Innovation Systems - through the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
