<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-lake-edhoc-aka-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EDHOC PSK AKA">EDHOC Authenticated with AKA</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-lake-edhoc-aka-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="19"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 42?>

<t>This document defines the EDHOC-AKA authentication method based on the 3GPP authentication and key negotiation protocol and the Ephemeral Diffie-Hellman Over COSE(EDHOC) key exchange protocol. This method is designed to provide efficient mobile communication network access authentication for scenarios with limited computing and network resources (such as Non-Terrestrial Network, NTN). EDHOC-AKA utilizes the pre-shared long-term key and employs symmetric cryptography techniques to achieve mutual authentication and key derivation. It ensures security while significantly enhancing the authentication efficiency.</t>
    </abstract>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a AKA authentication method for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange protocol <xref target="RFC9528"/>. AKA is a symmetric ciper, it achieves key negotiation through two-way authentication between the mobile users and networks, and subsequently generates data encryption keys and integrity protection keys. AKA relies on long-term keys which is provided out-of-band and realize dynamic symmetric key derivation. Symmetric key authentication offers greater computational efficiency compared to the methods outlined in <xref target="RFC9528"/>.</t>
      <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an
   authentication mechanism for devices wishing to access mobile
   networks. <xref target="RFC4187"/> (EAP-AKA) made the use of this mechanism possible
   within the Extensible Authentication Protocol (EAP) framework. <xref target="RFC5448"/> (EAP-AKA') was an improved version of EAP-AKA. <xref target="RFC9048"/>is the most recent specification of EAP-AKA'related to 5G networks.</t>
      <t>The authentication vectors of EDHOC-AKA and EAP-AKA' are consistent. The authentication vectors are defined in the CRED_AKA_X.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The following terms are used:</t>
      <ul spacing="normal">
        <li>
          <t>AKA: Authentication and Key Agreement.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>This document specifies a new EDHOC authentication method (see Section 3.2 of <xref target="RFC9528"/>) referred to as the Authentication and Key Agreement method (EDHOC-AKA). Authentication is based on a long-term key shared between the Initiator and the Responder. As in the methods defined in <xref target="RFC9528"/>, CRED_I and CRED_R are authentication credentials containing identifying information for the Initiator and Responder, respectively. We defined CRED_AKA_R and CRED_AKA_I to hold the authentication vector of AKA for the Initiator and Responder, respectively. We have added a new method to indicate that the Initiator and Responder support AKA authentication.</t>
      <section anchor="credentials">
        <name>Credentials</name>
        <t>According to RFC 9528 and the existing specifications of 3GPP AKA, designing a new authentication method ( Method = 5)and defining new credential parameter CRED_AKA_X, it is necessary to ensure that the Initiator (I) and the Responder (R) meet the following core requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The Initiator and Responder are assumed to share a long-term key, or it is possible to obtain the derived parameters indirectly.</t>
          </li>
          <li>
            <t>The explicit indication of the authentication method is 3GPP AKA, and it also carries the necessary identity credential information.</t>
          </li>
        </ul>
        <t>The requirements for Initiator</t>
        <ul spacing="normal">
          <li>
            <t>The long-term key K and user identifier must be pre-set and stored in a secure environment.</t>
          </li>
          <li>
            <t>Support the capability of generating the 5-tuple of 3GPP AKA (RAND/AUTN/XRES/CK/IK).</t>
          </li>
        </ul>
        <t>The requirements for Responder</t>
        <ul spacing="normal">
          <li>
            <t>Based on the SUPI/SUCI in EAD_1, route to the correct home network</t>
          </li>
          <li>
            <t>Obtain the AKA five-tuple (or generate dynamic vector) from home network</t>
          </li>
        </ul>
        <section anchor="credakax">
          <name>CRED_AKA_X</name>
          <t>CRED_AKA is a COSE header map containing header parameters that indicate the AKA authentication parameters. CRED_AKA_X is uesed to refer to CRED_AKA_I or CRED_AKA_R, CRED_AKA_I and CRED_AKA_R are authentication credentials associated with the AKA.</t>
          <t>CRED_AKA_R: Contains the AKA parameters sent by the responder, typically including:
* AT_RAND: Random Number Challenge
* AT_AUTN: Authentication Token</t>
          <t>CRED_AKA_I: Contains parameters for the responder's response to the challenge, typically including:
* AT_RES: Authentication Response</t>
          <t>An example of CRED_AKA_I and CRED_AKA_R is shown below: TBD</t>
        </section>
        <section anchor="encoding-and-processing">
          <name>Encoding and processing</name>
          <t>The AKA parameters should be encoded in the CWT format and the encryption and signature methods for them should be standardized in COSE.</t>
          <t>NOTE: Encode AKA in CWT format. Need to standardize the encryption and signature of CWT-AKA in COSE.  RFC Editor: Remove this note.</t>
        </section>
      </section>
      <section anchor="message-flow-of-edhoc-aka">
        <name>Message Flow of EDHOC-AKA</name>
        <t>The message flow of EDHOC-AKA follows the structure defined in
   <xref target="RFC9528"/>, with authentication based on symmetric keys rather than
   public keys.</t>
        <t>The Responder authenticates the Initiator first.  Figure 1
   illustrates the message flow of the EDHOC-AKA authentication method.</t>
        <artwork><![CDATA[
Initiator                                 Responder
    |                                         |    
    |                                         |    
    | Method,SUITES_I,G_X,C_I,EAD_1           |    
    +----------------------------------------->    
    | Message_1                               |    
    |                                         |    
    |           G_Y,Enc(C_R,CRED_AKA_R,EAD_2) |    
    <-----------------------------------------+    
    |                  Message_2              |    
    |                                         |    
    |                                         |    
    |                                         |    
    | AEAD(CRED_AKA_I, EAD_3)                 |    
    +----------------------------------------->    
    | Message_3                               |    
    |                                         |    
    |                                         |    
    |                   AEAD(EAD_4)           |    
    <-----------------------------------------+    
    |                   Message_4             |    
    |                                         |    

 Figure 1: Overview of Message Flow of EDHOC-AKA
]]></artwork>
        <t>EDHOC message_4 is required to indicate EDHOC-AKA authentication success.</t>
        <t>EAD_1 = Initiator identity, it usually represents a pseudo identity rather than the user's genuine and long-term identity. Based on this pseudo identity, the real identity can be retrieved on the Responder side.</t>
        <t>Both endpoints are authenticated with AKA (TBD1：METHOD = 5)</t>
        <t>NOTE: Assuming TBD1 = 5, to be confirmed by IANA.  RFC Editor: Remove this note.</t>
      </section>
    </section>
    <section anchor="key-derivation">
      <name>Key Derivation</name>
      <t>The key derivation of EDHOC-AKA is similar to that of EDHOC-PSK, but the source of the key PRK_4e3m is different. 
The derivation methods of PRK_2e and PRK_3e2m are exactly the same as those of the standard EDHOC (based on G_XY).
The key difference lies in PRK_4e3m:
In EDHOC-PSK: PRK_4e3m = EDHOC_Extract(SALT_4e3m, PSK)
In EDHOC-AKA: PRK_4e3m = EDHOC_Extract(SALT_4e3m, K_AKA)
Here, K_AKA is the key material generated from the AKA process. In 3GPP AKA, this is usually derived by the key derivation function using CK (encryption key) and IK (integrity key) as inputs to generate a new key for the specific service (EDHOC).
The subsequent derived keys PRK_out and so on are securely derived from PRK_4e3m, ensuring the independence and forward security of the final session key.</t>
    </section>
    <section anchor="message-formating-and-processing">
      <name>Message Formating and Processing</name>
      <section anchor="message1">
        <name>Message1</name>
        <t>Message 1 (Initiator -&gt; Responder)
METHOD = 5: Clearly declare that this conversation uses AKA authentication.
EAD_1: include the permanent identity (such as SUPI) or temporary identity (such as GUTI) of the initiating party, to assist the responder (service network) in requesting an authentication vector from its home network.</t>
      </section>
      <section anchor="message2">
        <name>Message2</name>
        <t>Message 2 (Responder -&gt; Initiator)
The responder obtains the AKA authentication vectors (RAND, AUTN, XRES, CK, IK) from the home network.
The responder sends the challenge RAND and AUTN to the initiator through CRED_AKA_R.
The remaining part of Message 2 (G_Y, C_R) is consistent with the standard EDHOC.
The encryption structure Enc(C_R, CRED_AKA_R, EAD_2) is encrypted using the key stream derived from PRK_2e, similar to EDHOC-PSK.</t>
      </section>
      <section anchor="message3">
        <name>Message3</name>
        <t>Message 3 (Initiator -&gt; Responder)
The initiating party (UE) uses its built-in USIM card and long-term key K to verify the AUTN. If the verification is successful, the response RES and session keys CK, IK are calculated.
The initiating party sends RES through CRED_AKA_I to the responding party.
The responding party verifies whether the received RES matches the expected XRES, thereby completing the authentication of the initiating party.</t>
      </section>
      <section anchor="message4">
        <name>Message4</name>
        <t>Message 4 (Responder -&gt; Initiator)
This message should be sent as it provides clear key confirmation to the initiator and authenticates the responder.
It is also an AEAD encryption structure, proving that the responder has successfully derived the session key.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following entry in the "EDHOC
   Method Type" registry under the group name "Ephemeral Diffie-Hellman
   Over COSE (EDHOC)".</t>
      <artwork><![CDATA[
+-------+----------------------------+----------------------------+
| Value |Initiator Authentication Key|Responder Authentication Key|
+-------+----------------------------+----------------------------+
| TBD2  | EDHOC-AKA                  |  EDHOC-AKA                 |
+-------+---------------------- -----+----------------------------+
    Table 1: Addition to the EDHOC Method Type Registry.
]]></artwork>
      <t>NOTE: Suggested value: TBD1 = 5.  RFC Editor: Remove this note.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Mutual authentication: Strong mutual authentication is achieved through the AKA challenge-response mechanism.
Identity protection: The permanent identity of the initiator (such as SUPI) is only transmitted in the possible EAD_1 and can be replaced by a temporary identity. The identity of the responder is protected in the message flow.
Forward security: Based on the temporary Diffie-Hellman exchange, even if the long-term subscription key K or the CK/IK derived from AKA is leaked, the past session will not be decrypted.
Key binding: The final session key PRK_out is simultaneously bound to the temporary DH shared secret G_XY and the key K_AKA derived from AKA, providing stronger security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9528">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9528"/>
        <seriesInfo name="DOI" value="10.17487/RFC9528"/>
      </reference>
      <reference anchor="RFC4187">
        <front>
          <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
            <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4187"/>
        <seriesInfo name="DOI" value="10.17487/RFC4187"/>
      </reference>
      <reference anchor="RFC5448">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="May" year="2009"/>
          <abstract>
            <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
            <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5448"/>
        <seriesInfo name="DOI" value="10.17487/RFC5448"/>
      </reference>
      <reference anchor="RFC9048">
        <front>
          <title>Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
          <author fullname="V. Torvinen" initials="V." surname="Torvinen"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <date month="October" year="2021"/>
          <abstract>
            <t>The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA.</t>
            <t>This document is the most recent specification of EAP-AKA', including, for instance, details about and references related to operating EAP-AKA' in 5G networks.</t>
            <t>EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC-SHA-256 instead of SHA-1 / HMAC-SHA-1, which is used in EAP-AKA.</t>
            <t>This version of the EAP-AKA' specification defines the protocol behavior for both 4G and 5G deployments, whereas the previous version defined protocol behavior for 4G deployments only. While EAP-AKA' as defined in RFC 5448 is not obsolete, this document defines the most recent and fully backwards-compatible specification of EAP-AKA'. This document updates both RFCs 4187 and 5448.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9048"/>
        <seriesInfo name="DOI" value="10.17487/RFC9048"/>
      </reference>
    </references>
    <?line 222?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
