<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-pqc-eapaka-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="PQ KEMs in EAP-AKA prime">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-pqc-eapaka-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="17"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 75?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="RFC9678"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by making it quantum-safe using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="RFC9678"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="RFC9678"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="RFC9678"/>.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>At the time of writing, NIST has standardized three PQC algorithms, with more expected to be standardized in the future (<xref target="NISTFINAL"/>). As these algorithms are secure against both quantum and classical computers, this document proposes a PQ-KEM for achieving perfect forward secrecy in EAP-AKA'.</t>
      <t>Although the proposed mechanism is applicable to any post-quantum Key Encapsulation Mechanism (PQ-KEM), this document specifies its use with Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM provides a one-pass (store-and-forward) cryptographic method for an originator to securely transmit keying material to a recipient using the recipient’s ML-KEM public key. Three parameter sets for ML-KEM are defined in <xref target="FIPS203"/>, namely ML-KEM-512, ML-KEM-768, and ML-KEM-1024, listed in order of increasing security strength and decreasing performance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="RFC9678"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored if USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully trusted. HPKE is an KEM that can be extended to support hybrid post-quantum KEMs and the specifications for the use of HPKE with EAP-AKA prime is described in 
<xref target="I-D.draft-ar-emu-pqc-eapaka"/>.</t>
    </section>
    <section anchor="pqc-kem-enhancements-by-design">
      <name>PQC KEM Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_KEM, is defined to carry the PQC KEM public key from the EAP server.</t>
        </li>
        <li>
          <t>A new attribute, AT_KEM_CT, is defined to carry the ciphertext (ct) generated by the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQC KEM for generating the Master Key MK_PQ_SHARED_SECRET.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes are included in the EAP-Request to handle the EAP peer not supporting PQC KEM.</t>
        </li>
        <li>
          <t>The PQC KEM can be included first in the AT_KDF_FS attribute in the EAP-Request to indicate a higher priority for its use compared to the traditional key derivation functions.</t>
        </li>
        <li>
          <t>EAP-AKA and EAP-AKA′ FS do not define a native attribute-level   fragmentation mechanism. As PQC public keys and ciphertexts may  exceed the EAP MTU, this specification defines an explicit   attribute-level fragmentation mechanism (AT_FRAGMENT) to support transport of large attribute values.</t>
        </li>
      </ul>
    </section>
    <section anchor="message-fragmentation-and-reassembly">
      <name>Message Fragmentation and Reassembly</name>
      <t>EAP-AKA and EAP-AKA' FS do not natively define fragmentation.  This specification therefore defines
attribute-level fragmentation for attributes whose total length may exceed the EAP MTU.</t>
      <t>This specification defines an attribute-level fragmentation mechanism similar to the lock-step acknowledgment model used by EAP-TLS <xref target="RFC2716"/>. Fragmentation applies to the entire attribute, including the attribute header and value.</t>
      <t>Only one fragmented attribute exchange (i.e., one fragmented attribute transmission in progress in either direction) <bcp14>MUST</bcp14> be active at any time.</t>
      <section anchor="fragment">
        <name>Fragmentation Attribute</name>
        <t>When an attribute is fragmented, each fragment carries a Fragmentation attribute. The Fragment Data field carries a contiguous portion of the original attribute, treated as an opaque sequence of octets. The first fragment
<bcp14>MUST</bcp14> begin with the attribute Type and Length fields. Subsequent fragments carry the next contiguous octets of the attribute.</t>
        <t>The receiver <bcp14>MUST</bcp14> reconstruct the original attribute by concatenating the Fragment Data fields, in the order received, excluding any per-fragment alignment padding. The reassembled attribute <bcp14>MUST</bcp14> be bitwise identical to the original, unfragmented attribute and <bcp14>MUST NOT</bcp14> be processed until reassembly has completed.</t>
        <t>The Fragmentation attribute has the following format:</t>
        <sourcecode type="artwork"><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  AT_FRAGMENT  |    Reserved   |           Length              |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Flags     |    Reserved   |     Total Attribute Length    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   |                    Fragment Data (variable)                   |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></sourcecode>
        <t>Length:</t>
        <t>A 2-octet unsigned integer indicating the length of this
AT_FRAGMENT attribute in multiples of 4 octets, including the
Type, Reserved, Length, Flags, Total Attribute Length, Fragment
Data, and any alignment padding. The total length of the
attribute in octets is obtained by multiplying this field by 4.</t>
        <t>Each AT_FRAGMENT attribute <bcp14>MUST</bcp14> have a Length that is a
multiple of 4 octets.</t>
        <t>Flags (1 octet):</t>
        <t>The Flags field contains the following bits:</t>
        <sourcecode type="artwork"><![CDATA[
   0 1 2 3 4 5 6 7
  +-+-+-+-+-+-+-+-+
  |S|M|  Reserved |
  +-+-+-+-+-+-+-+-+
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>S (First Fragment)  </t>
            <t>
Indicates that this is the first fragment of a fragmented attribute.
This bit <bcp14>MUST</bcp14> be set on the first fragment and <bcp14>MUST NOT</bcp14> be set on
subsequent fragments.</t>
          </li>
          <li>
            <t>M (More Fragments)
Indicates that additional fragments follow.<br/>
This bit <bcp14>MUST</bcp14> be set on all fragments except the last.</t>
          </li>
          <li>
            <t>Reserved<br/>
              <bcp14>MUST</bcp14> be set to zero on transmission and ignored on receipt.</t>
          </li>
        </ul>
        <t>Total Attribute Length (2 octets)</t>
        <t>The Total Attribute Length field specifies the total length, in octets,
of the unfragmented attribute, including its Type, Length, and Value
fields. It is encoded as an unsigned 16-bit integer in network byte
order.</t>
        <t>This field <bcp14>MUST</bcp14> be present in all fragments belonging to the same
fragmented attribute. In fragments other than the first, the value of
Total Attribute Length <bcp14>MUST</bcp14> be identical to that of the first fragment.
If a mismatch is detected, the receiver <bcp14>MUST</bcp14> treat this as a protocol
error and abort the authentication exchange.</t>
      </section>
      <section anchor="fragmentation-procedure">
        <name>Fragmentation Procedure</name>
        <ul spacing="normal">
          <li>
            <t>When an EAP peer receives an EAP-Request containing an attribute
fragment with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Response of
the same EAP type containing no attributes.  This response serves as
a fragment acknowledgment.</t>
          </li>
          <li>
            <t>When an EAP server receives an EAP-Response containing an attribute
fragment with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Request of
the same EAP type containing no attributes.  This request serves as a
fragment acknowledgment.</t>
          </li>
          <li>
            <t>The sender <bcp14>MUST NOT</bcp14> transmit the next fragment until the
corresponding acknowledgment has been received.</t>
          </li>
        </ul>
      </section>
      <section anchor="use-of-the-eap-identifier">
        <name>Use of the EAP Identifier</name>
        <t>The EAP Identifier field is used to correlate fragments and
acknowledgments:</t>
        <ul spacing="normal">
          <li>
            <t>The Identifier in an EAP-Response <bcp14>MUST</bcp14> match the Identifier of the
immediately preceding EAP-Request.</t>
          </li>
          <li>
            <t>Fragment acknowledgments <bcp14>MUST</bcp14> echo the Identifier of the fragment
being acknowledged.</t>
          </li>
          <li>
            <t>Retransmitted fragments <bcp14>MUST</bcp14> reuse the same Identifier value as the
original transmission.</t>
          </li>
          <li>
            <t>For fragmented exchanges initiated by the EAP server, the Identifier
in each EAP-Request carrying a fragment <bcp14>MUST</bcp14> be incremented relative
to the previous EAP-Request.</t>
          </li>
        </ul>
      </section>
      <section anchor="reassembly">
        <name>Reassembly</name>
        <t>The receiver <bcp14>MUST</bcp14> reassemble attribute fragments strictly in the order
received and <bcp14>MUST NOT</bcp14> process the fragmented attribute until all
fragments have been successfully received and validated.</t>
        <t>The final fragment is identified by the M bit being cleared (M = 0). The
receiver <bcp14>MUST</bcp14> acknowledge each fragment, including the final fragment,
using the lock-step procedure defined for fragmentation. The sender
<bcp14>MUST</bcp14> wait for acknowledgment of the final fragment before considering
the fragmented attribute exchange complete.</t>
        <t>During the fragmentation phase (i.e., while the M bit is set in
AT_FRAGMENT), the EAP peer <bcp14>MUST</bcp14> respond to each
EAP-Request/AKA'-Challenge fragment with an
EAP-Response/AKA'-Challenge message containing a zero-length attribute
payload. These responses serve solely as transport-level acknowledgments
and <bcp14>MUST NOT</bcp14> trigger any AKA' cryptographic processing.</t>
        <t>The EAP peer <bcp14>MUST NOT</bcp14> initiate USIM processing (e.g., passing RAND and AUTN to the USIM) 
while attribute fragmentation is in progress. USIM processing has to occur only 
after the final fragment (M = 0) has been received and the complete attribute 
set has been successfully reassembled and validated. At that point, the peer will
invoke the AKA' algorithm using the RAND and AUTN values contained in the 
reassembled message.</t>
        <t>If a fragment is lost or corrupted, normal EAP retransmission procedures
apply. Retransmitted fragments <bcp14>MUST</bcp14> use the same EAP Identifier value
as the original transmission.</t>
        <t>The receiver <bcp14>MUST</bcp14> verify that:</t>
        <ul spacing="normal">
          <li>
            <t>The first fragment has the S bit set and subsequent fragments do not; and</t>
          </li>
          <li>
            <t>The cumulative length of all received Fragment Data fields equals the
Total Attribute Length.</t>
          </li>
        </ul>
        <t>Any inconsistency in fragmentation state (including unexpected S bit
usage, receipt of a new initial fragment while reassembly is in
progress, length mismatch, or malformed sequencing) <bcp14>MUST</bcp14> be treated
as a protocol error, and the authentication exchange <bcp14>MUST</bcp14> be
aborted. If reassembly cannot be successfully completed after a bounded
number of retransmissions, the authentication exchange <bcp14>MUST</bcp14> be
aborted.</t>
        <t>Fragmentation does not modify the AT_MAC calculation rules defined in
<xref target="RFC9048"/>. AT_MAC is calculated over the EAP packet exactly as
transmitted on the wire, including any AT_FRAGMENT attributes.</t>
        <t>Processing of data contained in reassembled fragmented attributes <bcp14>MUST</bcp14>
occur only after successful AT_MAC verification. Fragmentation therefore
does not alter the integrity protection scope of the EAP packet.</t>
      </section>
      <section anchor="applicability">
        <name>Applicability</name>
        <t>This fragmentation mechanism applies to any attribute within this EAP method whose encoded length exceeds the EAP MTU. (e.g., AT_PUB_KEM, AT_KEM_CT, or AT_IDENTITY carrying a large SUCI). Attributes that fit within a single EAP packet <bcp14>MUST</bcp14> be sent unfragmented.</t>
        <t>The following diagram details how the fragmentation works for both request and response:</t>
        <sourcecode type="artwork"><![CDATA[
Peer                                               Server
 |                                                     |
 |                 <- EAP-Request / Identity (Id=1)    |
 |                                                     |
 | EAP-Response / Identity (Id=1) ->                   |
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=2)  |
 |                (unfragmented attributes)            |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=2) ->             |
 |                                                     |
 |================ Server-Initiated Fragmentation ===============|
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=3)  |
 |                (Fragment 1: S=1, M=1)               |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=3) ->             |
 |   (ACK, no attributes)                              |
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=4)  |
 |                (Fragment 2: M=1)                    |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=4) ->             |
 |   (ACK, no attributes)                              |
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=5)  |
 |                (Fragment 3: M=0, last fragment)     |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=5) ->             |
 |   (ACK, no attributes — final fragment)             |
 |                                                     |
 |================ Peer-Initiated Fragmentation =================|
 |                                                     |
 |                 <- EAP-Request / Identity (Id=6)    |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=6) ->             |
 |   (Fragment 1: S=1, M=1)                            |
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=7)  |
 |                (ACK, no attributes)                 |
 |                                                     |
 | EAP-Response / AKA'-Challenge (Id=7) ->             |
 |   (Fragment 2: M=0, last fragment)                  |
 |                                                     |
 |             <- EAP-Request / AKA'-Challenge (Id=8)  |
 |                (ACK, no attributes — final fragment)|
 |                                                     |
 |             <- EAP-Success (Id=9)                   |
 |                                                     |
]]></sourcecode>
        <t>The term “ACK” in the above figure is used for illustrative purpose to describe an EAP-Request or EAP-Response of the same EAP method type that contains no attributes and is sent solely to acknowledge receipt of a fragment.</t>
      </section>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>The above section outlines how the fragmentation works. This section defines the construction for PQC KEM in EAP-AKA' FS and the other params that are sent via EAP Req/Resp AKA'-Challenge.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates an a PQC KEM key pair, sends the public key  |
  |      | of that key pair and the first EAP method message      |
  |      | to the peer. In the message the AT_PUB_KEM attribute   |
  |      | carries the PQC KEM public key and the AT_KDF_FS       | 
  |      | attribute carries PQC KEM algorithm. Both of           |
  |      | these are skippable attributes that can be ignored     |
  |      | if the peer does not support this extension.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              | EAP-Req/AKA'-Challenge,    |                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |      AT_PUB_KEM, AT_MAC    |                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_KEM_CT and     |     |
| AT_MAC. If not, it will ignore AT_PUB_KEM and          |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will calculate a   |     |
| PQC KEM shared secret key based on the server's PQC    |     |
| KEM public key. Finally, it proceeds to derive all     |     |
| EAP-AKA' key values and  constructs a full response.   |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              |EAP-Resp/AKA'-Challenge     |                |
  |              | AT_RES, AT_KEM_CT,         |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the PQC KEM shared secret and checks the RES |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and PQC KEM shared secret value. Even if there was an  |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM public key(pk), private key (sk) pair. The server will generate the Authentication Vector (AV). The server PQC KEM key pair is derived as:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   sk, pk = kemKeyGen()
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The server will store the expected response XRES, the PQC KEM private key sk. The server will forward the authenticator part (AUTH) of the AV to peer along with pk.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTN received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke kemEncaps using pk:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ct, ss = kemEncaps(pk) 
]]></artwork>
        <t>"ct" is the ciphertext from kemEncaps whereas "ss" is shared secret key.</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication result RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct and PQC KEM private key sk to generate shared secret:</t>
          </li>
        </ul>
        <artwork><![CDATA[
   ss = kemDecaps(ct, sk)
]]></artwork>
        <t>The generated ss from kemDecaps is the shared secret key derived from kemEncaps. The peer and the server first generate the MK_PQ_SHARED_SECRET and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   ct, ss = kemEncaps(pk)
   MK_PQ_SHARED_SECRET = PRF'(IK'|CK'|ss,"EAP-AKA' FS"| Identity | ct)  
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_PQ_SHARED_SECRET [0..255] 
   MSK = MK_PQ_SHARED_SECRET [256..767] 
   EMSK = MK_PQ_SHARED_SECRET [768..1279]
]]></artwork>
        <t>where, pk is PQC KEM public key from the EAP server, ct is the ciphertext from the kemEncaps and it is triggered by the EAP peer only. The pseudo-random function (PRF') binds the shared secret to the ciphertext (ct), achieving MAL-BIND-K-CT.</t>
        <t>The ML-KEM already achieves MAL-BIND-K-PK as the hash of the PQC KEM public key is an input to the computation of the shared secret (ss) (line 2 of ML-KEM.Encaps algorithm in <xref target="FIPS203"/>).  These computational binding properties for KEMs are defined in <xref target="CDM"/>.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="pqkem">
        <name>AT_PUB_KEM</name>
        <t>The format of the AT_PUB_KEM attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_KEM    |   Reserved    |         Length                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                       Value (variable)                        |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_KEM:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. Including this field ensures that the fixed header (Type, Reserved, Length) is 4 bytes long, maintaining 4-byte alignment for the following Value field. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the length of this attribute in multiples of 4 octets, including the Type, Reserved, Length, and Value fields, as well as any padding.</t>
        <t>The total length of the attribute in octets is obtained by multiplying this field by 4.</t>
        <t>This differs from the attribute format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte.The modification is necessary because PQC KEM public keys, such as those defined in ML-KEM-1024, will be 1568 bytes, which would exceed the 1024-byte limit imposed by the original EAP-AKA format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the PQC KEM public key from the EAP server.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
      <section anchor="pqct">
        <name>AT_KEM_CT</name>
        <t>The format of the AT_KEM_CT attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_KEM_CT     |   Reserved    |         Length                |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                   Value (variable)                            |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_KEM_CT:</t>
        <t>This is set to TBA2 BY IANA.</t>
        <t>Reserved:
   A 1-byte field reserved for future use. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the length of this attribute in multiples of 4 octets, including the Type, Reserved, Length, and Value fields, as well as any padding.</t>
        <t>The total length of the attribute in octets is obtained by multiplying this field by 4.</t>
        <t>This differs from the format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte. The change is necessary because ciphertexts produced by PQC KEM algorithms,such as 1568 bytes in ML-KEM-1024 will exceed the 1024 byte limit imposed by the original EAP-AKA attribute format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Response: It contains the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="capability-negotiation">
      <name>Capability Negotiation</name>
      <t>Support for PQC KEM is negotiated using the AT_KDF_FS attribute.</t>
      <t>AT_PUB_KEM and AT_KEM_CT use an extended attribute header format
that is incompatible with legacy EAP-AKA and EAP-AKA' implementations.
Therefore, these attributes <bcp14>MUST NOT</bcp14> be sent unless a mutually
supported PQC KEM has been successfully negotiated via AT_KDF_FS.</t>
    </section>
    <section anchor="ml-kem">
      <name>ML-KEM</name>
      <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the PQ-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given PQ-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromise of one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <t>Implementations <bcp14>MUST</bcp14> enforce a locally configured maximum Total Attribute Length for fragmented attributes. If the Total Attribute Length exceeds this limit, the attribute <bcp14>MUST</bcp14> be rejected and the authentication exchange aborted. This limit has to be chosen to mitigate DoS attack with support for large PQC key material.</t>
      <section anchor="selecting-ml-kem-variants">
        <name>Selecting ML-KEM Variants</name>
        <t>ML-KEM is believed to be IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three new Attribute Type values (TBA1, TBA2, and TBA3) from the
   skippable range are requested from IANA for AT_PUB_KEM (<xref target="pqkem"/>),
   AT_KEM_CT (<xref target="pqct"/>), and AT_FRAGMENT (<xref target="fragment"/>) in the
   "Attribute Types" registry under the "EAP-SIM/AKA/AKA'" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the PQC KEM algorithm entries:</t>
      <artwork><![CDATA[
   +=========+===============================+=========================+
   | Value   | Description                   | Reference               |
   +=========+===============================+=========================+
   | TBA3    | EAP-AKA' with MLKEM512        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA4    | EAP-AKA' with MLKEM768        | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
   | TBA5    | EAP-AKA' with MLKEM1024       | [TBD BY IANA: THIS RFC] |
   +=========+===============================+=========================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="RFC9678">
          <front>
            <title>Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document updates RFC 9048, "Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')", and its predecessor RFC 5448 with an optional extension providing ephemeral key exchange. The extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term key from obtaining session keys established in the past. In addition, EAP-AKA' FS mitigates passive attacks (e.g., large-scale pervasive monitoring) against future sessions. This forces attackers to use active attacks instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9678"/>
          <seriesInfo name="DOI" value="10.17487/RFC9678"/>
        </reference>
        <reference anchor="RFC2716">
          <front>
            <title>PPP EAP TLS Authentication Protocol</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links.The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2716"/>
          <seriesInfo name="DOI" value="10.17487/RFC2716"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CDM" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NISTFINAL" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>NIST Releases First 3 Finalized Post-Quantum Encryption Standards</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="I-D.draft-ar-emu-pqc-eapaka">
          <front>
            <title>Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="16" month="March" year="2025"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [RFC9678], providing updates to [RFC9048] with an optional extension
   that offers ephemeral key exchange using the traditional Ephemeral
   Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for
   achieving perfect forward secrecy (PFS).  However, it is susceptible
   to future threats from Cryptographically Relevant Quantum Computers,
   which could potentially compromise a traditional ephemeral public
   key.  If the adversary has also obtained knowledge of the long-term
   key and ephemeral public key, it could compromise session keys
   generated as part of the authentication run in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   leveraging PQ/T Hybrid [I-D.ietf-pquip-pqt-hybrid-terminology]
   algorithms to make it quantum-safe.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ar-emu-pqc-eapaka-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 671?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="RFC9678"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
