<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-lake-edhoc-aka-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="EDHOC PSK AKA">EDHOC Authenticated with AKA</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-lake-edhoc-aka-02"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="14"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 40?>

<t>This document defines an Authentication and Key Agreement (AKA) authentication method for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange protocol. This method, named EDHOC-AKA, is designed as a specific profile of the EDHOC Pre-Shared Key (PSK) authentication method defined in [draft-ietf-lake-edhoc-psk-06].</t>
      <t>EDHOC-AKA leverages the 3GPP AKA protocol to dynamically generate a session-specific Pre-Shared Key, which is then used to run the EDHOC-PSK protocol flow. The AKA-specific parameters are transported within the External Authorization Data (EAD) fields of the EDHOC messages. This approach provides efficient mobile communication network access authentication for resource-constrained scenarios (such as Non-Terrestrial Networks, NTN) while inheriting the security properties of EDHOC-PSK, including mutual authentication, identity protection, and forward secrecy.</t>
    </abstract>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Authentication and Key Agreement (AKA) protocol is a widely used mechanism for authenticating devices in mobile networks, as specified for 3G, 4G, and 5G systems <xref target="RFC5448">RFC4187</xref> <xref target="RFC9048"/>. It relies on a long-term symmetric key pre-shared between the user's secure element (e.g., a SIM card) and the home network.</t>
      <t>This document defines EDHOC-AKA, an authentication method for the Ephemeral Diffie-Hellman Over COSE (EDHOC) protocol <xref target="RFC9528"/> that utilizes the AKA mechanism. The primary innovation of EDHOC-AKA is that it does not define a new standalone protocol flow. Instead, it profiles the EDHOC Pre-Shared Key (PSK) authentication method specified in [draft-ietf-lake-edhoc-psk-06].</t>
      <t>The core concept is as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The Initiator (e.g., a mobile device) and Responder (e.g., a service network) execute an AKA challenge-response exchange.</t>
        </li>
        <li>
          <t>This exchange is carried within the External Authorization Data (EAD) fields of the standard EDHOC message flow.</t>
        </li>
        <li>
          <t>Upon successful completion of the AKA exchange, both parties derive a shared, session-specific key, denoted here as K_AKA.</t>
        </li>
        <li>
          <t>This K_AKA is then used as the PSK required by the EDHOC-PSK authentication method.</t>
        </li>
      </ul>
      <t>This approach allows EDHOC-AKA to inherit the computational efficiency and security properties of EDHOC-PSK, such as identity protection against passive attackers and Perfect Forward Secrecy (PFS) against certain adversaries, while integrating seamlessly with established mobile network authentication infrastructure. This document specifies the mapping of AKA parameters to EAD fields, the derivation of K_AKA, and the necessary processing steps, while referencing [draft-ietf-lake-edhoc-psk-06] for the underlying protocol mechanics.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174].</t>
      <t>Readers are expected to be familiar with the terms and concepts described in EDHOC <xref target="RFC9528"/> and EDHOC-PSK [draft-ietf-lake-edhoc-psk-06].</t>
      <ul spacing="normal">
        <li>
          <t>AKA: Authentication and Key Agreement. A challenge-response protocol based on a symmetric key.</t>
        </li>
        <li>
          <t>K: The long-term secret key shared between a user's secure element and their home network.</t>
        </li>
        <li>
          <t>SUPI/SUCI: Subscription Permanent Identifier / Subscription Concealed Identifier. The user's permanent and concealed identities in 5G.</t>
        </li>
        <li>
          <t>AKA Vector: A set of parameters generated by the network for an AKA challenge, typically including RAND (random challenge), AUTN (authentication token), XRES (expected response), CK (ciphering key), and IK (integrity key).</t>
        </li>
        <li>
          <t>K_AKA: A session-specific key derived from the AKA-generated keys (CK, IK), which serves as the PSK for the EDHOC-PSK protocol.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <section anchor="relationship-to-edhoc-psk">
        <name>Relationship to EDHOC-PSK</name>
        <t>EDHOC-AKA is a profile of EDHOC-PSK and follow the protocol flow, key derivation logic, and message formatting specified in [draft-ietf-lake-edhoc-psk-06]. The fundamental difference lies in how the PSK is obtained. In a typical EDHOC-PSK scenario, the PSK is a static key provisioned out-of-band. In EDHOC-AKA, the PSK is dynamically derived in each session via an AKA exchange.</t>
        <t>This AKA exchange is performed using the EAD mechanism defined in <xref target="RFC9528"/>.</t>
      </section>
      <section anchor="deriving-the-session-special-pskkaka">
        <name>Deriving the Session-Special PSK(K_AKA)</name>
        <t>The Responder (network) initiates an AKA challenge by obtaining an AKA vector from the home network based on the Initiator's identity. The Initiator responds to the challenge. If the exchange is successful, both parties derive the session keys CK and IK.</t>
        <t>These keys are then used to derive K_AKA, which will be used as the PSK for the current EDHOC session. The key derivation function (KDF) for this purpose is application-specific but MUST produce a key of the length required by the selected EDHOC cipher suite. For example, a common method is to use the EDHOC-KDF:</t>
        <t>K_AKA = EDHOC-KDF(CK, "K_AKA", IK, desired_key_length)</t>
        <t>The context string "K_AKA" ensures that the derived key is unique to this purpose.</t>
      </section>
      <section anchor="message-flow-of-edhoc-aka">
        <name>Message Flow of EDHOC-AKA</name>
        <t>The message flow is identical to that of EDHOC-PSK, as shown in Figure 1 of [draft-ietf-lake-edhoc-psk-06]. The AKA-specific parameters are transported in EAD fields as follows:</t>
        <ul spacing="normal">
          <li>
            <t>EAD_1: Sent by the Initiator in message_1. It contains the Initiator's identity (e.g., SUCI) needed by the Responder to fetch the correct AKA vector.</t>
          </li>
          <li>
            <t>EAD_2: Sent by the Responder in message_2. It contains the AKA challenge parameters (RAND and AUTN).</t>
          </li>
          <li>
            <t>EAD_3: Sent by the Initiator in message_3. It contains the AKA response (RES).</t>
          </li>
          <li>
            <t>EAD_4: Sent by the Responder in message_4. It MAY contain a final confirmation of the AKA authentication result from the network.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Initiator                                   Responder
   |                                            |
   | METHOD, SUITES_I, G_X, C_I, EAD_1({SUCI})  |
   +------------------------------------------> | message_1
   |                                            |
   |           G_Y, Enc(C_R, EAD_2({RAND,AUTN}))|
   |<-------------------------------------------+ message_2
   |                                            |
   | Enc(ID_CRED_PSK, AEAD(EAD_3({RES})))       |
   +------------------------------------------> | message_3
   |                                            |
   |                AEAD(EAD_4({Auth-Result}))  |
   |<-------------------------------------------+ message_4
   |                                            |

      Figure 1: Overview of Message Flow of EDHOC-AKA
]]></artwork>
        <t>The field ID_CRED_PSK is used as defined in [draft-ietf-lake-edhoc-psk-06]. It may contain an identifier related to the ongoing AKA session or the long-term subscription to help the Responder manage keying material.</t>
      </section>
    </section>
    <section anchor="key-derivation">
      <name>Key Derivation</name>
      <t>The key derivation schedule for EDHOC-AKA SHALL be identical to the one specified in Section 4 of [draft-ietf-lake-edhoc-psk-06].</t>
      <t>The key derivation for PRK_4e3m is:</t>
      <t>PRK_4e3m = EDHOC_Extract(SALT_4e3m, PSK)</t>
      <t>For EDHOC-AKA, the PSK used in this formula is the session-specific K_AKA derived from the AKA exchange, as described in Section 3.2 of this document. All other PRKs and derived keys (e.g., PRK_out, K_3, IV_3) are computed exactly as specified in the EDHOC-PSK draft.</t>
    </section>
    <section anchor="message-formating-and-processing">
      <name>Message Formating and Processing</name>
      <t>Message formatting and processing SHALL follow the specifications in Section 5 of [draft-ietf-lake-edhoc-psk-06]. This section outlines the additional processing steps related to the EAD fields for the AKA exchange.</t>
      <section anchor="message1">
        <name>Message1</name>
        <t>Message 1 (Initiator -&gt; Responder)
Initiator: The Initiator composes message_1 as specified in [draft-ietf-lake-edhoc-psk-06]. The METHOD selected is EDHOC-AKA (TBD1). The Initiator MUST include an EAD_1 field containing its identity (e.g., SUCI), formatted with the appropriate EAD label (see Section 6.2).
Responder: The Responder processes message_1 and uses the identity from EAD_1 to request an AKA vector from the home network.</t>
      </section>
      <section anchor="message2">
        <name>Message2</name>
        <t>Message 2 (Responder -&gt; Initiator)
Responder: After obtaining the AKA vector, the Responder composes message_2 as specified in [draft-ietf-lake-edhoc-psk-06]. It MUST include an EAD_2 field containing the RAND and AUTN values, each formatted with the appropriate EAD label.
Initiator: The Initiator decrypts message_2 to retrieve EAD_2. It passes the AUTN and RAND to its secure element to verify the network's authenticity and compute the response RES, as well as the keys CK and IK. If verification succeeds, it derives K_AKA as per Section 3.2.</t>
      </section>
      <section anchor="message3">
        <name>Message3</name>
        <t>Message 3 (Initiator -&gt; Responder)
Initiator: The Initiator composes message_3 as specified in Section 5.3.2 of [draft-ietf-lake-edhoc-psk-06]. It uses the derived K_AKA as the PSK for this process. It MUST include an EAD_3 field containing the computed RES, formatted with the appropriate EAD label.
Responder: The Responder processes message_3 as specified in Section 5.3.3 of [draft-ietf-lake-edhoc-psk-06]. To do this, it must first derive the same K_AKA from the CK and IK it holds. A successful decryption of message_3 implicitly authenticates the Initiator. The Responder then extracts RES from EAD_3 and compares it with its expected XRES. If they match, the AKA authentication is fully successful.</t>
      </section>
      <section anchor="message4">
        <name>Message4</name>
        <t>Message 4 (Responder -&gt; Initiator)
As noted in [draft-ietf-lake-edhoc-psk-06], message_4 is required for mutual authentication. It proves to the Initiator that the Responder also successfully derived K_AKA and completed the protocol. The Responder MAY include an EAD_4 field to convey the final status of the authentication from the network's perspective.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="edhoc-method-type-registry">
        <name>EDHOC Method Type Registry</name>
        <t>IANA is requested to register the following entry in the "EDHOC
   Method Type" registry under the group name "Ephemeral Diffie-Hellman
   Over COSE (EDHOC)".</t>
        <artwork><![CDATA[
+-------+----------------------------+----------------------------+
| Value |Initiator Authentication Key|Responder Authentication Key|
+-------+----------------------------+----------------------------+
| TBD1  | EDHOC-AKA                  |  EDHOC-AKA                 |
+-------+---------------------- -----+----------------------------+
    Table 1: Addition to the EDHOC Method Type Registry.
]]></artwork>
        <t>NOTE: Suggested value: TBD1 = 5.  RFC Editor: Remove this note.</t>
      </section>
      <section anchor="edhoc-ead-label-registry">
        <name>EDHOC EAD Label Registry</name>
        <t>IANA is requested to register the following entries in the "EDHOC EAD Label" registry.</t>
        <artwork><![CDATA[
+-------+--------------------+----------------------------+
| Label |Description         |Reference                   |
+-------+--------------------+----------------------------+
| TBD2  |AKA SUCI            |  this document             |
+-------+--------------------+----------------------------+
| TBD3  |AKA RAND            |  this document             |
+-------+--------------------+----------------------------+
| TBD4  |AKA AUTN            |  this document             |
+-------+--------------------+----------------------------+
| TBD5  |AKA RES             |  this document             |
+-------+--------------------+----------------------------+
| TBD6  |AKA Auth-Result     |  this document             |
+-------+--------------------+----------------------------+

             Figure 3: EAD labels
]]></artwork>
        <t>NOTE: Suggested values: TBD2-TBD6 = sequential integers. RFC Editor: Remove this note.</t>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>As EDHOC-AKA is a profile of EDHOC-PSK, it inherits the security properties analyzed in Section 9 of [draft-ietf-lake-edhoc-psk-06]. This section discusses considerations specific to the AKA integration.</t>
      <t>Mutual Authentication: Strong mutual authentication is achieved. The Initiator authenticates the network by validating AUTN in message_2. The network authenticates the Initiator through two mechanisms: first, by the successful decryption of message_3 (which requires the correct K_AKA), and second, by the explicit validation of RES from EAD_3.
Identity Protection: The Initiator's permanent identity (SUPI) is protected by using a concealed identity (SUCI) in EAD_1, which is only sent in the first message. The rest of the exchange is protected by keys derived from the ephemeral Diffie-Hellman exchange, providing identity protection against passive attackers as per EDHOC-PSK.
Forward Secrecy: The protocol provides PFS. Even if the long-term key K is compromised, past session keys remain secure because they are derived from the ephemeral DH shared secret G_XY. An attacker who compromises K can impersonate the user in future sessions but cannot decrypt past traffic.
Key Binding: The final session keys (derived from PRK_out) are cryptographically bound to both the ephemeral DH secret (G_XY) and the AKA-derived session key (K_AKA). This provides strong resistance against key-compromise and misbinding attacks.
AKA Vector Handling: The AKA vector components (RAND, AUTN) are transported in an encrypted portion of message_2. This protects them from passive observation, though not from an active attacker who can manipulate the first two messages. The security of the AKA mechanism itself relies on the integrity of AUTN, which is handled by the Initiator's secure element.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9528">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9528"/>
        <seriesInfo name="DOI" value="10.17487/RFC9528"/>
      </reference>
      <reference anchor="RFC4187">
        <front>
          <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
            <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4187"/>
        <seriesInfo name="DOI" value="10.17487/RFC4187"/>
      </reference>
      <reference anchor="RFC5448">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="May" year="2009"/>
          <abstract>
            <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
            <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5448"/>
        <seriesInfo name="DOI" value="10.17487/RFC5448"/>
      </reference>
      <reference anchor="RFC9048">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="October" year="2021"/>
          <abstract>
            <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
            <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
            <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
            <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9048"/>
        <seriesInfo name="DOI" value="10.17487/RFC9048"/>
      </reference>
    </references>
    <?line 221?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
