Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA

The 3GPP Mobile Network Authentication and Key Agreement (AKA) is the primary authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible within the Extensible Authentication Protocol (EAP) framework. RFC 5448 (EAP-AKA') was an improved version of EAP-AKA. This memo replaces the specification of EAP-AKA'. EAP-AKA' was defined in RFC 5448 and updated EAP-AKA RFC 4187. As such this document obsoletes RFC 5448 and updates RFC 4187. EAP-AKA' differs from EAP-AKA by providing a key derivation function that binds the keys derived within the method to the name of the access network. The key derivation function has been defined in the 3rd Generation Partnership Project (3GPP). EAP-AKA' allows its use in EAP in an interoperable manner. EAP-AKA' also updates the algorithm used in hash functions, as it employs SHA-256 / HMAC- SHA-256 instead of SHA-1 / HMAC-SHA-1 as in EAP-AKA. This version of EAP-AKA' specification specifies the protocol behaviour for both 4G and 5G deployments, whereas the previous version only did this for 4G.

[1]  Paul E. Hoffman,et al.  Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms , 2011, RFC.

[2]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[3]  Muxiang Zhang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Transactions on Wireless Communications.

[4]  Stig Fr. Mjølsnes,et al.  A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols , 2012, MMM-ACNS.

[5]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[6]  Christopher Thompson,et al.  Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android , 2013, WOOT.

[7]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.

[8]  C. Kaufman Internet Key Exchange (IKEv2) Protocol", RFC 4306 , 2005 .

[9]  Hao Zhou,et al.  Tunnel Extensible Authentication Protocol (TEAP) Version 1 , 2014, RFC.

[10]  Mark Ryan,et al.  New privacy issues in mobile telephony: fix and verification , 2012, CCS.

[11]  Simon Blake-Wilson,et al.  Funk Request for Comments : 5281 Unaffiliated Category : Informational , 2008 .

[12]  Donald E. Eastlake,et al.  Randomness Requirements for Security , 2005, RFC.

[13]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[14]  Dan Simon,et al.  Extensible Authentication Protocol (eap) Key Management Framework , 2007 .

[15]  Hugo Krawczyk,et al.  Perfect Forward Secrecy , 2011, Encyclopedia of Cryptography and Security.

[16]  Jari Arkko,et al.  Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.

[17]  Stephen Farrell,et al.  Pervasive Monitoring Is an Attack , 2014, RFC.

[18]  Henry Haverinen,et al.  Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.

[19]  Barry Leiba,et al.  Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words , 2017, RFC.

[20]  Jari Arkko,et al.  The Network Access Identifier , 2005, RFC.

[21]  Thomas Narten,et al.  Guidelines for Writing an IANA Considerations Section in RFCs , 1998, RFC.

[22]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2 , 2005, RFC.

[23]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[24]  Paul E. Hoffman,et al.  Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.

[25]  Jari Arkko,et al.  Network Discovery and Selection Problem , 2008, RFC.

[26]  Elisa Bertino,et al.  Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.

[27]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[28]  Ravishankar Borgaonkar,et al.  New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..

[29]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.