<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-hybrid-pqc-eapaka-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Hybrid in EAP-AKA prime">Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-hybrid-pqc-eapaka-01"/>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <area>Security</area>
    <workgroup>EMU</workgroup>
    <keyword>PQC</keyword>
    <keyword>EAP-AKA'</keyword>
    <abstract>
      <?line 56?>

<t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in <xref target="RFC9678"/>, providing updates to <xref target="RFC9048"/> with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'.</t>
      <t>This draft aims to enhance the security of EAP-AKA' FS protocol by leveraging PQ/T Hybrid <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> algorithms to make it quantum-safe.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-hybrid-pqc-eapaka/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) defined in <xref target="RFC9678"/> updates the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA') specified in <xref target="RFC9048"/>, with an optional extension providing ephemeral key exchange. This prevents an attacker who has gained access to the long term key from obtaining session keys established in the past, assuming these have been properly deleted. EAP-AKA' FS mitigates passive attacks (e.g., large scale pervasive monitoring) against future sessions.</t>
      <t>Nevertheless, EAP-AKA' FS uses traditional algorithms public-key algorithms (e.g., ECDH) which will be broken by a Cryptographically Relevant Quantum Computer (CRQC) using Shor's algorithm. The presence of a CRQC would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. A CRQC could recover the SHARED_SECRET from the ECDHE public keys (Section 6.3 of <xref target="RFC9678"/>). If the adversary has also obtained knowledge of the long-term key, it could then compute CK', IK', and the SHARED_SECRET, and any derived output keys. This means that the CRQC would disable the forward security capability provided by <xref target="RFC9678"/>.</t>
      <t>The migration to PQC is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs. During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types.</t>
      <t>This specification defines HPKE <xref target="I-D.ietf-hpke-pq"/> <xref target="I-D.irtf-cfrg-hybrid-kems"/> for use with EAP-AKA' FS.  HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation mechanism (KEM), key derivation function (KDF), and authenticated encryption with additional data (AEAD) function. HPKE can be extended to support hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.ietf-hpke-pq"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two key exchange algorithms based on different cryptographic assumptions, e.g., one traditional algorithm and one Post-Quantum algorithm, with the purpose of the final shared secret key being secure as long as at least one of the component key exchange algorithms remains unbroken. It is referred to as PQ/T Hybrid Scheme in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>PQ/T Hybrid Key Encapsulation Mechanism: A Key Encapsulation mechanism (KEM) made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="background-on-eap-aka-with-perfect-forward-secrecy">
      <name>Background on EAP-AKA' with perfect forward secrecy</name>
      <t>In EAP-AKA', The authentication vector (AV) contains a random part RAND, an authenticator part AUTN used for authenticating the network to the USIM, an expected result part XRES, a 128-bit session key for integrity check IK, and a 128-bit session key for encryption CK.</t>
      <t>As described in the draft <xref target="RFC9678"/>, the server has the EAP identity of the peer. The server asks the AD to run AKA algorithm to generate RAND, AUTN, XRES, CK and IK. Further it also derives CK’ and IK’ keys which are tied to a particular network name. The server now generates the ephemeral key pair and sends the public key of that key pair and the first EAP method message to the peer. In this EAP message, AT_PUB_ECDHE (carries public key) and the AT_KDF_FS(carries other FS related parameters). Both of these might be ignored of USIM doesn’t support the Forward Secrecy extension. The peer checks if it wants to have a Forward extension in EAP AKA'. If yes, then it will eventually respond with AT_PUB_ECDHE and MAC. If not, it will ignore AT_PUB_ECDHE. If the peer wants to participate in FS extension, it will then generate its ECDH key pair, calculate a shared key based on its private key and server public key. The server will receive the RES from peer and AT_PUB_ECDHE. The shared key will be generated both in the peer and the server with key pairs exchanged, and later master key is also generated.</t>
      <artwork><![CDATA[
MK_ECDHE = PRF'(IK'| CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
]]></artwork>
    </section>
    <section anchor="hybrid-enhancements-by-design">
      <name>Hybrid Enhancements by Design</name>
      <t>We suggest the following changes and enhancements:</t>
      <ul spacing="normal">
        <li>
          <t>A new attribute, AT_PUB_HYBRID, is defined to carry the public key, which is the concatenation of traditional and PQC KEM public keys from the EAP server. The AT_PUB_HYBRID attribute will carry the encapsulated key, which is formed by concatenating the encapsulated key (enc) from the traditional KEM algorithm and the ciphertext (ct) from the PQC KEM Encapsulation function from the EAP peer.</t>
        </li>
        <li>
          <t>The AT_KDF_FS attribute is updated to indicate the PQ/T Hybrid KEM in HPKE and HKDF for generating the Hybrid Master Key MK_HYBRID.</t>
        </li>
        <li>
          <t>Multiple AT_KDF_FS attributes is included in the EAP-Request to handle the EAP peer not supporting PQ/T Hybrid KEM in HPKE.</t>
        </li>
        <li>
          <t>The Hybrid key derivation function will be included first in the EAP-Request to indicate a higher priority than the traditional key derivation function.</t>
        </li>
      </ul>
    </section>
    <section anchor="message-fragmentation-and-reassembly">
      <name>Message Fragmentation and Reassembly</name>
      <t>The message fragmentation and reassembly will be similar to as outlined in <xref target="I-D.ietf-emu-pqc-eapaka"/>. For brevity, the authors would like to defer the reader to <xref target="I-D.ietf-emu-pqc-eapaka"/> for details.</t>
    </section>
    <section anchor="protocol-construction">
      <name>Protocol Construction</name>
      <t>This section defines the construction for hybrid key exchange in EAP-AKA' FS. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <section anchor="protocol-call-flow">
        <name>Protocol Call Flow</name>
        <artwork><![CDATA[
 USIM           Peer                        Server              AD
  |              |                            |                |
  |              |           EAP-Req/Identity |                |
  |              |<---------------------------+                |
  |              |                            |                |
  |              | EAP-Resp/Identity          |                |
  |              | (Privacy-Friendly)         |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | Server now has an identity for the peer. The server    |
  |      | then asks the help of AD to run AKA algorithms,        |
  |      | generating RAND, AUTN, XRES, CK, IK. Typically, the    |
  |      | AD performs the first part of key derivations so that  |
  |      | the authentication server gets the CK' and IK' keys    |
  |      | already tied to a particular network name.             |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                            | ID, key deriv. |
  |              |                            | function,      |
  |              |                            | network name   |
  |              |                            +--------------->|
  |              |                            |                |
  |              |                            |    RAND, AUTN, |
  |              |                            | XRES, CK', IK' |
  |              |                            |<---------------+
  |      +-------+----------------------------+----------------+--+
  |      | Server now has the needed authentication vector. It    |
  |      | generates a PQC KEM key pair, an ephemeral ECDHE key   |
  |      | pair, sends the hybrid (PQC + ECDHE) public key of that|
  |      | key pair and the first EAP method message to the peer  |
  |      | In the message the AT_PUB_HYBRID attribute             |
  |      | carries the concatenation of PQC KEM and ECDHE public  |
  |      | keys and the AT_KDF_FS attribute carries other         |
  |      | FS-related parameters. Both of these are               |
  |      | skippable attributes that can be ignored if the peer   |
  |      | does not support this extension.                       |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              | EAP-Req/AKA'-Challenge (1),|                |
  |              |  EAP-Req/AKA'-Challenge (2)|                |
  |              |  AT_RAND, AT_AUTN, AT_KDF, |                |
  |              |   AT_KDF_FS, AT_KDF_INPUT, |                |
  |              |       AT_PUB_HYBRID, AT_MAC|                |
  |              |<---------------------------+                |
+--+--------------+----------------------------+---------+     |
| The peer checks if it wants to do the FS extension. If |     |
| yes, it will eventually respond with AT_PUB_HYBRID and |     |
| AT_MAC. If not, it will ignore AT_PUB_HYBRID and       |     |
| AT_KDF_FS and base all calculations on basic EAP-AKA'  |     |
| attributes, continuing just as in EAP-AKA' per RFC     |     |
| 9048 rules. In any case, the peer needs to query the   |     |
| auth parameters from the USIM card.                    |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |   RAND, AUTN |                            |                |
  |<-------------+                            |                |
  |              |                            |                |
  | CK, IK, RES  |                            |                |
  +------------->|                            |                |
+--+--------------+----------------------------+---------+     |
| The peer now has everything to respond. If it wants to |     |
| participate in the FS extension, it will then generate |     |
| its ECDHE key pair, calculate a hybrid shared secret   |     |
| key based on the server's PQC KEM public key, its ECDHE|     |
| key pair and the server's ECDHE public key. Finally,   |     |
| it proceeds to derive all EAP-AKA' key values and      |     |
| constructs a full response.                            |     |
+--+--------------+----------------------------+---------+     |
  |              |                            |                |
  |              | EAP-Resp/AKA'-Challenge    |                |
  |              |  EAP-Req/AKA'-Challenge (2)|                |
  |              | AT_RES, AT_PUB_HYBRID,     |                |
  |              | AT_MAC                     |                |
  |              +--------------------------->|                |
  |      +-------+----------------------------+----------------+--+
  |      | The server now has all the necessary values. It        |
  |      | generates the Hybrid shared secret and checks the RES  |
  |      | and MAC values received in AT_RES and AT_MAC,          |
  |      | respectively. Success requires both to be found        |
  |      | correct. Note that when this document is used,         |
  |      | the keys generated from EAP-AKA' are based on CK, IK,  |
  |      | and the ECDHE and PQC KEM values. Even if there was an |
  |      | attacker who held the long-term key, only an active    |
  |      | attacker could have determined the generated session   |
  |      | keys; additionally an attacker with a cryptographically|
  |      | relevant quantum computer cannot get access to the     |
  |      | server KEM private key and decrypt the data.           |
  |      +-------+----------------------------+----------------+--+
  |              |                            |                |
  |              |                EAP-Success |                |
  |              |<---------------------------+                |
  |              |                            |                |
]]></artwork>
      </section>
      <section anchor="key-steps-in-protocol-construction">
        <name>Key Steps in protocol construction</name>
        <t>We outline the following key steps in the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>Server generates the PQC KEM Public key(pq_PK), private key (pq_SK) pair and the ECDH public key (trad_PK), private key (trad_SK) pair. The server will generate and send the EAP AKA' Authentication Vector (AV).</t>
          </li>
          <li>
            <t>The server will store the expected response XRES, the ECDH private key trad_SK and the PQC KEM private key pq_SK. The server will forward the EAP AKA' AV to peer along with pq_PK and trad_PK.</t>
          </li>
          <li>
            <t>The USIM will validate the AUTH received, also verifies the MAC. After the verification is successful and if the peer also supports the Forward secrecy, peer will invoke Encapsulate using concat(pq_PK, trad_PK) as defined in section 5.4 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>.</t>
          </li>
        </ul>
        <t>"ct" is the concatenation of the ciphertext from PQC KEM and encapsulated key from ECDH whereas "ss" is hybrid shared secret key. Hybrid shared key ss is generated by the peer using the Encapsulate() (<xref target="I-D.irtf-cfrg-hybrid-kems"/>).</t>
        <ul spacing="normal">
          <li>
            <t>The peer will send the Authentication response RES and ct to the server.</t>
          </li>
          <li>
            <t>The server will verify the RES with XRES. The server will use the ct, PQC KEM private key pq_SK and ECDH private key trad_SK to generate shared secret.</t>
          </li>
        </ul>
        <t>The generated ss from Decapsulate is the hybrid shared secret key derived from PQC KEM and traditional ECDH. The peer and the server first generate the MK_HYBRID and subsequently generate MSK, EMSK as shown below:</t>
        <artwork><![CDATA[
   MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
   HYBRID_SHARED_SECRET, ct = Encapsulate(pKR)
   MK_HYBRID = PRF'(IK'|CK'| HYBRID_SHARED_SECRET,"EAP-AKA' FS"| Identity) 
   K_encr = MK[0..127]
   K_aut = MK[128..383]
   K_re = MK_HYBRID [0..255] 
   MSK = MK_HYBRID [256..767] 
   EMSK = MK_HYBRID [768..1279]
]]></artwork>
        <t>where, pkR is concatenation of PQC KEM and traditional public keys of the receiver, ct is concatenation of the ciphertext from the PQC KEM and encapsulated key from ECDH; the Encapsulate() function is perfomed by the peer only.</t>
      </section>
    </section>
    <section anchor="extensions-to-eap-aka-fs">
      <name>Extensions to EAP-AKA' FS</name>
      <section anchor="hybrid">
        <name>AT_PUB_HYBRID</name>
        <t>The format of the AT_PUB_HYBRID attribute is shown below.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | AT_PUB_HYBRID    |   Reserved    |      Length (in bytes)     |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                       Value (variable)                        |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields are as follows:</t>
        <t>AT_PUB_HYBID:</t>
        <t>This is set to TBA1 BY IANA.</t>
        <t>Reserved:</t>
        <t>A 1-byte field reserved for future use. Including this field ensures that the fixed header (Type, Reserved, Length) is 4 bytes long, maintaining 4-byte alignment for the following Value field. The Reserved field <bcp14>MUST</bcp14> be set to 0 on transmission and ignored on receipt.</t>
        <t>Length:</t>
        <t>A 2-byte unsigned integer indicating the total length of the attribute in bytes, including the Type, Reserved, Length, and Value fields, as well as any padding. The length is expressed in multiples of 4 bytes.</t>
        <t>This differs from the attribute format used in EAP-AKA <xref target="RFC4187"/>, where the Length field is 1 byte. The modification is necessary because PQ/T Hybrid KEM public keys, such as X25519 and ML-KEM-768 (e.g., X-Wing), would exceed the 1024-byte limit imposed by the original EAP-AKA format.</t>
        <t>Value:</t>
        <artwork><![CDATA[
  *  EAP-Request: It contains the public key, which is the concatenation of 
     traditional and PQC KEM public keys from the EAP server.
  *  EAP-Response: It contains the encapsulated key, which is formed by 
     concatenating the ciphertext (ct) from the PQC KEM Encapsulation function
     and the encapsulated key (enc) from the traditional KEM algorithm and from the 
     EAP peer.
]]></artwork>
        <t>Because the length of the attribute must be a multiple of 4 bytes, the sender pads the Value field with zero bytes when necessary. To retain the security of the keys, the sender <bcp14>SHALL</bcp14> generate a fresh value for each run of the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-KEM is IND-CCA2 secure based on multiple analyses. The ML-KEM variant and its underlying components should be selected consistently with the desired security level. For further clarity on the sizes and security levels of ML-KEM variants, please refer to the tables in Sections 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The security of the ML-KEM algorithm depends on a high-quality pseudo-random number generator. For further discussion on random number generation, see <xref target="RFC4086"/>.</t>
      <t>In general, good cryptographic practice dictates that a given ML-KEM key pair should be used in only one EAP session. This practice mitigates the risk that compromising one EAP session will not compromise the security of another EAP session and is essential for maintaining forward security.</t>
      <t>For security properties of traditional ECDHE for EAP-AKA FS, see section 7 of <xref target="RFC9678"/>. The overall Hybrid scheme needs to be IND-CCA2 robust; i.e., atleast one of the schemes should be IND-CCA2 secure.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Two new values (TBA2) and (TBA3) in the skippable range need to be assigned by IANA 
   for AT_PUB_HYBRID (<xref target="hybrid"/>) in the "Attribute Types" registry 
   under the "EAP-AKA and EAP-SIM Parameters" group.</t>
      <t>IANA is requested to update the registry "EAP-AKA' AT_KDF_FS
   Key Derivation Function Values" with the Hybrid key derivation 
   function entry:</t>
      <artwork><![CDATA[
   +=========+========================================================+=====================================+
   | Value   | Description                                                        | Reference               |
   +=========+========================================================+=====================================+
   | TBA2    | QSF-KEM(ML-KEM-768,P-256)-XOF(SHAKE256)-KDF(SHA3-256)              | [TBD BY IANA: THIS RFC] |
   +=========+===============================+========================+=====================================+
   | TBA3    | KitchenSink-KEM(ML-KEM-768,X25519)-XOF(SHAKE256)-KDF(HKDF-SHA-256) | [TBD BY IANA: THIS RFC] |
   +=========+===============================+========================+=====================================+
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC9048">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
              <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
              <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
              <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9048"/>
          <seriesInfo name="DOI" value="10.17487/RFC9048"/>
        </reference>
        <reference anchor="RFC9678">
          <front>
            <title>Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document updates RFC 9048, "Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')", and its predecessor RFC 5448 with an optional extension providing ephemeral key exchange. The extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term key from obtaining session keys established in the past. In addition, EAP-AKA' FS mitigates passive attacks (e.g., large-scale pervasive monitoring) against future sessions. This forces attackers to use active attacks instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9678"/>
          <seriesInfo name="DOI" value="10.17487/RFC9678"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="27" month="January" year="2026"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-08"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.ietf-emu-pqc-eapaka">
          <front>
            <title>Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA prime</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   Forward Secrecy for the Extensible Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS) is specified in
   [RFC9678], providing updates to [RFC9048] with an optional extension
   that offers ephemeral key exchange using the traditional Ephemeral
   Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for
   achieving perfect forward secrecy (PFS).  However, it is susceptible
   to future threats from Cryptographically Relevant Quantum Computers,
   which could potentially compromise a traditional ephemeral public
   key.  If the adversary has also obtained knowledge of the long-term
   key and ephemeral public key, it could compromise session keys
   generated as part of the authentication run in EAP-AKA'.

   This draft aims to enhance the security of EAP-AKA' FS protocol by
   making it quantum-safe using Post-Quantum Key Encapsulation
   Mechanisms (PQ-KEMs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-pqc-eapaka-01"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 341?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft leverages text from <xref target="RFC9678"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9U823bbOJLv/Aqs5iHSRFJ8ydUz3TOKLY89jh235fTl9OmT
Q5GQxDFFsgnSbnXcc/Y39m2/ZT9lv2TrAoAgRTmxk5mdUfeJJRIoFAp1RwGD
wcAroiKWe6IzThZ+EkTJXExkUOZRsRJRIsaj88HoZPRI3ETFQhytpnkUivNU
FYNvSj8pyqXYz1dZkc5zP1usOp4/nebyGsCdf7NvmldgRJZHS9nxAr+Q8zRf
7QlVhJ4XpkHiLwGJMPdnxSCSxWwgl+VgQf0H2c/BQPqZf+UPtrY9VU6XkVJR
mhSrDPocjy8PvaRcTmW+54UAeM8L0kTJRJVqTxR5KT3AZ9fzc+kDXmZyHe8m
za/meVpmOPnTdx3vSq7gWbjniYEA9PGPmb7nedcyKQG2EKYPYNiBn4xF5zuA
hsT7C77F50s/irnVn3FCwzSf42M/DxbweFEUmdp78gRb4aPoWg5Nsyf44Mk0
T2+UfAL9n3RgeFX4Sfjej9MERltJ5WXRnvixSIO+UGle5HKm4Ntqqb8UeRQU
fRGky6VMCngCNF76WQYo/uR5flks0hwnChgJMSvjmBdgBKTJffHaT2T+Nynp
LWDkJ9GvfgEk3xNn6VXk0/MAqLgn3qRJmCb8IC2TAhf1XRIVMhQnMFiYLumd
1OTwaYDhVA/w5wTBDQHNzjoyl1FeLv1Yqhs/FxcyDFefgA+gPgcq5Yx7LufU
6sTPE78ADqojepyEurPB7wqmU0T5n+f4m/HykjRfwmjXtPoXh/uvtl9uma9b
T1+ar89fwFcvSmZuc/j/8Ph8srO1u0fjCCNu+HSAj8VpGpaxHLzxiyIK5GDq
K6SdXA3GSeBnqoxppuJUBiCgkVqKCbKCn4cdDdHP57LYE4alkus4K6dqCG2L
4Ty9foJf8MkTHPPJ2fHkcojfhjD6MAtnDIUkR8z8WEnPGwwGwp8CE/lB4XmH
aQ4rEKJeyGWwEjBBUSykGP9SgJRF01iKETAU8FkUMK7neQqcmcaANDBaSD0a
TWAKOEkxmudSIo+KrtU1h5OeiJRQmQyiWSRJg3z4oGn82299UCPpdRSiuJUZ
Iq5EkeoWsCC//cbayk9EmuFgfiwk4woDFwu/EOlsJnMlZLaAsXN4D7IPbZDC
cylKhaBxikCBMNIgxrbxOI4jAByI/TK/luIgmgGWgyMZx0sYszvePzga9wik
b2fnx6DwAKslEcMHiZfXOEom85kMCnxKRFaayN1zoMJQHKU38lrmfREVRJJS
BRKGRprDlGdlUebwbQG6rVBilqc1fQy0juMViE4sr0FZC6uy02VWFkCAvriB
RgsUiDgUWVrgAlEf4HwgMihaKfwaFSqSAUvFQAOY5lAcz4hcfgi4Kj9fiYWv
YMoqFem08KME1vAqSW9iGQJ5U24Mqmw+ACyWTCnghzbYNHPGz8FJSbIA2ECJ
uQRl4qPGgUEzPy/MCH6d5fIycU3a0PMuF0BTMjrCj5bERZLMoKT+yhhCgOcw
J7Ifs/d0JWJcHn+OS3n+zZNLY/M+fPjT8eCAVDrYrzLK4N/CGDScdJSkcTpf
Aa9azqDxl/6VxCn/zGs1UP5MDlkil1EYxiCdvwO9VeSgNQKc1v+TfIZyRsta
F81KHmH8CJfrGtrcD5Hdv5yfg1KcRtD8TBZopu+BXK9NbZBS6N+lFSqN0q4T
hoJ4JQPnBu0pQgF97QdXMgcZSonf58zofhAAd+JaGi4XlstJQlkkcKwaG0sw
8cD1asGYY+fMV2DEfaXKpdZIwPsLH3TOVEpCGtQHSGsIEg78P6xx6RJEdk6L
AWAU2CONsRJdOZwP+yJGwyEUKAmJaujap0bLFKw3MGQy74H6AkRVYfSMRlcB
P54h2wM+YJ1Bi7jDlgqX39EYDn+zWA9I3qunGh1Umz2tkG6iGKQLppmnVzBR
kDP/PopNdPcvvtnvaUU+AV/nkapGxLWUuJTgJAakjgA4tBc3pGZymYQAAlaj
kIN0NoBZDkCp9GuTap9JKLM4XcH6FWnog9qYqhQXhvgVCInqRIJzFhkFQytL
zAjoTdOyYLlJyPD6IAFa+eBT8CmAMX2UgRhXHqQJRtSyjmraUSPWxIHOTGZR
iBKCiipWCM2qNcYySYlJoTH4h/HK8t4afYZixHQKNJ0CkG5WNZOj0cX44P1k
vH8xvmQuJw2EltBR5rDWoKRIhJ8PdxGyozt6X8CMONYCFQaZDGAIsX/yqC+O
8R9cijWM+bGfoCTlEaosWAvoSDhr0V9KP9Gkxf4Ow4SR8skgw2PHjDONwYUz
C8k6BoADOzvzJjsE6xsBaxNpQHNg9ARjlkn0cynNigAWIJjEEMsUEE1g5HlU
ADsETgzGrQHLRAI36PXZII+JthQZBnTa4rjvIWYif3yFcZQqiLHJ+qHHAore
t7Yml2DkcmhAT+NoJguI9JQWtQ3gZz6wVwk8luPiAoUqGShRBuMVim/F+IoC
miyOyEJDEFhKeFQmyBOJuC5j9AOI2BG+WMBC3OAUcHFVOivoB1ilmGyGz3JH
tCKdmqT4BZqW4M8FEQoNDFvmpHphNjj5HFx1ZA4RxKhUA0N8Hyi7QpfQ6FgS
+dpQYlrOgSAHGiCvClgfesci46wSErqdbH3sixOBQYBfFZBdoEtp1oDsIa6L
cVP0HEExi2mKFtC6ohi7KuMHabupTSzbdyWOzk/GNW9mkV1JcGbA1punOTwN
ZvncuDdXoJjgNaKAY5LVdSzEUDBQ7YP74hqCQtTiwNeOWgXdg4RFXFAD5VMM
HPPVQEW/AptlMXIM2G9WgTj5IMpozVy/lAZCD0I3S8iznUaJbwGDIYeweSkx
YhZ6YCfsWtqwq3syPu31qQlpCX4/A/6lL92Tg8OeViSVtwKoOhNhByS0i0zC
0h2NRwc9C0gjHQBiYADJQwlZ8FSZZRDqCyZznT3QG9oQLyrCXPXQO655bS1r
OkTvcj9N0MlhqwTTOcBOhLJiVYUkwEyJEp3Td5PLTp//irO39P1i/M27Y1Cu
+B3U7Js39ounW0yO3r57c1B9q3ruvz09HZ8dcGd4KmqPvM7p6IcOE7nz9vzy
+O3Z6E2HNR568mlQcrCVk7BOyZbKHEwZRwceiEuQR1OmwOv98//57+2nQIn/
AGW8s739ipgaf7zcfvEUw0hYRh4tTUAJ8k9Y25UHplL6OUIBTwSVPOphhb6a
UAvURiiiQM3f/4iU+WlP/HEaZNtPv9YPcMK1h4ZmtYdEs/Una52ZiC2PWoax
1Kw9b1C6ju/oh9pvQ3fn4R//FANbicH2yz997SELXVYRjomyzNpggKNIMWgD
jrZ7I2feHTsNxaGxYGUO8iAVA3XGM5EzuKoZmDLNFr4OoMMILbJrP1GFVxYK
2Afc+JuU1b1Ue57XuXS09Mg07eyJUU2TbAApOL2TJsSZ6HSBEUR3W5HU9gWJ
GljdSLJnESDvgpMz9zVKMGFp8g8B5R9aWoErxT4D+H+oJZEsf307GfdBofho
lZhQzkxqCZAaBYK4BBLdnfOociMTNHYBriGI0fOtV1tsKFCmtnZf4JKtY7b/
eZiZsQd67O4Y4tODI5JbfmTfTPgNI/Rq69kOqbxOLaF9/zUl8wo8NpVxJK9Z
WU91+kDaIMp4BhyUGMUdmFwMqo4bICf+dZwL8xpiO4c+6B9+jC4nq6nMcXac
kujUOvSt0tTr0LcOrrTCCXy/aRDLxmGEZhwFu0GdKrSBpaUAL002OKJaw8r6
xoJ9rQN3R8yN6gBhATgKHD2pM2fksgPxObpm+isOwjGUwDAIYmoaTMNACsPP
pNg41xyTwwl64xyOAgvTcucSZp7zcgNwN/0zCZAn76nMPM8FcYdFB75sed3w
VEDRAhOUmVlJ0BvLNHfnC63cad6QV1kjEbmY7W4oOzprjVvXl7yK18D8uHVC
S93YV9qQBPU8VBamaZ9iiUZO71qi9gQf6tsecTItFHiDgB041JQMvBidHfTJ
z6u6oneM70bvLs+Q3Tnz5MLWLnqiE1A6m/NucnxKsOQv4C2jUwFRchkXDO37
i/EE3ortnZcDcFfd9A7BJ5XPUeFCBlcQkGp/cWMPx3fcPwEyjtBQOi4M4sT5
y1p+nJOXOUbnGEFTKD46F5QIcFIKmQQFQVTVjX11xa1HBxzsJAJ37RxNl9ps
q6YrUrCvZ75/QtM5PgG7XOYUfEYFx+8cVyto8r//+V+6FX6jpADnfMhpi7Q4
EUGjAHg7t2uAu0I1dCHss+gw3vXkXeZHOQd/4EMrrUBMcMBE8It6S9YqObA0
EmzJWUkIZJU/l4YJmGzHWn9yO2oA1Lh8f/7u9XvOe3QDP88jqZxBe3YQaAkB
w/vDiW2VEsEOJ8BSMQUOQAKYMSr/3lC8xsiN101RsmBRkH87hxgeNfGMeBPc
HqkSIGxhowUcrJkhtnlPHZ9LzBQhS4L1mOGa3fiY5CxSDox9C6BKmHIiXVAi
HfM2K8mBaULdMX1HmdKSEnUgJKBzQhb2Go2QHKejfQIB8Xff9uaJ1Rrb/BDh
a1FkToky5EnACghosazAEWaWdSPoiSDt2vfBhY+R2zBZZwwKWRLrrhWY/cWo
T9r9Cs2GbsDpcCeNC+SWmFVFtEFGOM4n/BFAfXbUtxra5ECr7Q2K3k16zsAo
3BHhvZmSsrYsZC2DkwMbAOoa/mCrSOfW7ACgYP7+9797pyd6cb4S5xeHj7rH
J49uMYN2W8+ZdZyYvnN7rHVLj0CAvtdmjMsKKCmhMPF1IBUsred9B1iX87lU
hc6bxXF6g1qXcebIUzqdwfUegN1L5A16UqABwS2yAnf0w+uLY9BGURVIAGeg
ZK0aYm+2vCJlvFCM0qt8QM2AAQroaaGhdJOYVX4TJIBpz6tXw6ZCk5eywqbK
MPBSOzjh5jFnCB3MtC1qdhNdeNKrsHFRr9l2yycgJaBjyO3uBoXT1cyy7lHY
3EZtwqT+cDEuXTXmzBYTl7QNRIsQJSElQvQ4joMD4wEzU7YDETwCQGT0ND+a
aevmp8y46PcAgzKJCY1TsL9RFrfiohAZ7RBbg4l8eyF/Lon3UMUloc7emulR
KlAr0ObOnoO2pYJ+tSk1ZCTZIsIWph0dSy9fLEDLo37Jo5Tz9YDq2kpvGJR8
rlNtuA5zf17lIZHYFxLj2eU0Xunss245W2uZ25Z2HipaYtWK9nvTsojbQnes
4KlKd0ywjuVBMJe+3aBNQVNxHj2OrjgoR79aZ5V93Iqhzf3NgIlpQgm+X6xo
2nZXcR+ijyI3+6Sc5dT7Dya/qZWAbUbAFtV62oDALYbCJOZRSxuKCMgocZC3
NKy5KbQASkITP5FpqWI2KpyfNMyv3UsbAM1TWHJMlNr9SrvTgPYWzTcmpID3
22McN05Uoh7PLNOC7BupHyc33UxFu7sNQ094v3MpjqMfgir3PK4rIa+k+pyj
dG34TNiK1T6jAwYjbuvPGz8/8vL240C0FD4xduzTgfxxsPnz+AGYfMZ0eBIq
q2bxACDdc1QmwWpwCG4pqEZwWu8L5PEdJPn6Y0BM57uArL+EB4/rcG4NQ2GY
QBuJSRUBmX2rtRBoHZ9bdh5tbISZRBSsDTESuMHt87p1DVtb8NSnyOlylfH2
NqvINjgwMkbMab5UTsBiKl/qBgF0TMpxTuu8mvG0psJcFgwa3D4drT1i36cN
Hz9GRb36lOjtn7DuFnyTz+58+TDBRJ/T0nv4QCDGZPc/BxOXzA8E0qTt1/9Y
ZfUxIK6IPAyIESze+38YkKZ2f/xPUlacfJLoLbamvMhoi81KBiMo69ZXYS6m
rqo6Rory8GULHG5fZU60T9RFmI+FrnFcT6eswXlQeqUFH71tYBvfEW7VFrAJ
x6RbWqM/QzDEtVa8sg6HtOFaNsfBop7X2YjP4WSwnvBp5nswN9ZgzCYcdRVl
Ge1rOdEPKX69lWxSRZGTRGmBgxkkN/7hLJeTMWr//Hsoc+PloRc/2F+AmZXo
kXe3e/17KK5NUHZ69wACLKM13OV7VnLMRP17qVDLeKb7++Oz83eX9wMiGJCb
SIGfp6P9f6QP/Hht/T+RVx47QG4/lr8MWae4SUFKI97WgFDy8hPzlkbbwOM6
ECbZxzKZTneXlA4Qo0igBWYfdYEBZyfJocNSIl+BUrLxaANIpQD6tCkSJSX6
nH8rcRdS1SJZ8CPx8EILJlg0S+VOvJlMpTOATr9SHmieiMg/l1JnttYwKXF3
x6q1KpFEYSFoyLBVn7hAvgiffEF9UrklDwVSF5Y18fhkTO5q94lAOOjoU2r6
gUDqq7Ee3X0CkC+tCowPhTXKKzBfmEtJjTCTgLoqos6xjd2EpvLYtKNQB2L2
F8YbNhi0L1XfuG7KTm37ocryP1ItOel+NeQ6kJr3ZYE0a3OH4hB30zHubGIC
U87yNDDiznt5pJesHsFxrv241Il7Z7UNEJtkQ8cUi0r1gii5yaVYA/Kvpgpq
7WzupeEV3AvIF3Et0LMYT9b2Ru6HCVuzZvN7AfkXyQI1Noy5pDzWARYe1cBC
c+ZdE1S14HPb2Gk+ahNhyt+yH2I2/FqyJbzlacRF7xBS+pxXzmwNQiObS2qB
g+KDyexrGYPwTko+dqKLgBVvFnIh0oyqLjbBCdIccCiG4iylXRqIGLDQsVFS
GVHNXtjfjE/BlaHueSwy91ZHYBBjFZqxPO30qQ4PuHtwZpHGOtPNddA3nNpb
h1M7nyP5SEDzuADVdWJtCBGydV4WDp8roB3xUHLpjmSg1YxNAUcLHKTNH5zq
Xz2wxZJqg+tVVNioZd31qZdmCRkGehi4zZETa4eQWuelZYIMSWNjO5SEBpeX
+IXvauh/j0Cv8UEeNBLyjwxqvtB0PNxTwZ3OSSEzctjtkcOgtqX1nTTbb41d
dFxJZTqTx64B0Db6xGR5XY1mpOzcugTd7Of35ye9fo0/8OHkpFf3KqiYwkkG
dXGHsqUvPTa916slrDtlinbsriwpkMYpwG+r2i+7E+tCw9MyTBe3WotcDp0a
rFB3kNQ42rlZb8tpQzRYx9/Ur9Wx/pZ20KhegwoRueQNSctjMKnsFCg0InCg
76LQbJ1DxHFkjUWfKzdgYDzpyOtHwedoVui9U36nSUVHh4n9sQaazqY4WSCC
pdM9qlYwpAvx+rrkhsLZ5Dq9kk6lgDkvzck05pm+mVXz1IHZfn02fMrHv+46
QoLFq0HR2VyrUS9pIGvjZvDWCibYHuGCU7EjoNZRiuC3euR8hKT2huSK9k6d
spxVRcrq6LhDoG5PdO+eacXAFaEt/zfY3vKwcRWCwuh5XYvSJgzEDivrlhAP
ohCsMzFW/xJli/5m3rcZ0lbRccsEayTVZ90ce6lzAgeyYqeolnBer+41Z/TW
1rt2Wh9wc6rbGpVSnIO2OJL4nLi5GVVOFdZkJAWYadvudAKcPT7F6ZtzHlMJ
GnePC6dAc5+euFVTuPVgy6TcGiloyYO9b5xDhLX8qsY62clFjwEb9Orwb9sB
1YuzhB0ZL6QQJ++xrhQAnZ78uDUcbu+8+Ikf+2XBT7d3Xg6Huy939XNQo185
GGCnnWfPfiJgSI3ay51nz4fDF89f8Ovx2vsXz1/SmK9+4lIxEkXQMFcXgsvR
N6fk10/gssepdYHWjjmRsQ1Wm8JwVfzdSuMPLXJta3zwcDjuyS4bCgEdTCpK
GZsUAnllzvKQsa9nBz/8jpn/NyqiuCTLjpeKmDls2viIalw5tFwJn60W/2O7
5dlOy7NdC2Mb3u+Kp+KZeC5eiJfi1X2eMZTHg8/8z9O+U50I2p2CCBwlPHTc
qzcQQYOy60Z4jhycnZ7ran0xbD7vc3s3mG8x8BFdOig5jWVvQ7OPgbknNp9P
m4r9LB/juSY+WOwr7a9iaadwdyCOD+iyHO4TkbVVkozc5evRtnj9gzgenY2G
1MssuO0xEtsDXGd9hCo3DIEVH/oegxJzTsdUjMfWGgsvqTXeGpWbfTPerPwF
+i64Dq17ucpAU5kh+5q16LKap8xcFF/28fKnxFzy8JTRAV9untizuXVvndeX
UGCbZdmY0aIjg3SiiKiwRRlBLNDSN2GxR2dKwRNWhBlYW00TxtMh0Q7jVCZY
jEueGR9G08WH9oByiqfLYxYgc6lKpW20QPV1YaPp1U4lLkJ2ZsqnJc2RJ9xf
yDA4TuZMAj0q7T3iXQSKHUhTUkdKXxN96FlW4eNIzkZDha5WoaUGZK4k4wOf
T7dfvqArQiilgB212uAFAMjbNBbjtkzDmm9d5ZGm4MegA9WsGHWsVR9d8QXO
+XswotuvOCH0ZgDNBmAbzXUY3w++wzs4+ro4Uv6C+VfCbHtrR/NUHC3xdOMS
z0RZs5Pm0ZzORZkZ8sSZSET/PaGL88TvhVt+uofpL3uK5n51057VHg+toG6i
xF7uOk6fVD1dobNeR/3AKugKpHEmP68g2zarADvl1fDrtealopKGNRlc4p4e
Hmitak0ruTAHgeg+ExAupp8jghwG/CrzVGsvSvxZbgZmx20TJL2GVN2HZLJ9
tTH4eHIVxcMcpVpw3o7PM/mwUFgyZ04g6awEeUj23kEs241CyddhKM9j4cAF
Pj47GOzvj3bM2T6bTrSzp4sYlLl5Qvc0NwyQmiyUe7uELY0l1wkljfRszPkC
zLZEquAwwBbh8qULziUfdLcK1zfP9MGnIPaZVJp00a96a6TeidRYHUsgaYan
6nQ5sYnt8HIgSekcfYUKqKQdgri964bS7kHDYABsA6E3aER7z0hzEfXgFW+G
MqOiHzQrVIKOhb98gYmSZZgO9OE6vnPRrDZWJLnzx0PJJRsnNEhtXWg7TUmp
j+M+3Xr5nLA8NvtqcV/M0zRsnCzN8HKcKMBzz0Hh2yoXX8wjzAvr+diNr2pV
jeannC9WR7PyUeYgFN3vpGFXlydRYBGpK11LY+4gQ95pwODwGTOwzk1lTbnx
E64HcvsRW+IFUIrvXyNRcV2I5q0yQ7r0q4LLF0EV0frhaU6iIzxjDbBUBIlu
MjEvGtfwsODgzT64S2KyH3ye1e74AzWtKObpFJTQH0Q0lGC2/GLthC13duWr
IcYk/ejSrUk+mvWblA796O2SLriAO3yMDr/u9kyCs6p/yqnKPpH2IDYepiY3
BwwDDYNw6c6zWgjR/fBBh12/WaidkVW16NaoDl0pqYqcTQwpEm5o6EuJEUw3
H5+Kc1v50OFrQ1mxEw4R79VIc60OH5nRcaweooribV0IBeQSz1HZIx+HJgYl
zQ5DWUXVfi6FZm/6SLoJ00aKj78yn+rbPT+f1pECp1ttjPDbAZ1r5bOuD41b
wOmkw+hBa7XcP3tuyKmM1jeTQ1RK3crL658Pdp497w2+f3vYBat5MqZfsMT4
a5feNef24+XrAxP77InLo+MJVu78dN+5bXx/37ntMlonUQHynUyi5Ko5R/Zv
2yaJZ70G8Ign+q8zN0pIDQYDcCyCK9RKo8BeOEanEGt3Ruq7H9FI2HRS/WKv
/wPiuqu6YVkAAA==

-->

</rfc>
