<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-pqc-eap-tls-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PQC Enhancements to TLS-Based EAP Methods">Post-Quantum Enhancements to TLS-Based EAP Methods</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-pqc-eap-tls-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="14"/>
    <area>Security</area>
    <workgroup>EAP Method Update</workgroup>
    <keyword>PQC</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <keyword>TLS</keyword>
    <keyword>EAP</keyword>
    <abstract>
      <?line 74?>

<t>This document proposes enhancements to TLS-based EAP methods, including the Extensible
Authentication Protocol with Transport Layer Security (EAP-TLS), EAP Tunneled TLS
(EAP-TTLS), Protected EAP (PEAP), and EAP Tunnel Method (TEAP), to incorporate
post-quantum cryptographic mechanisms. It also addresses challenges related to large
certificate sizes and long certificate chains, as identified in <xref target="RFC9191"/>, and
provides recommendations for integrating PQC algorithms into TLS-based EAP deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-pqc-eap-tls/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EAP Method Update Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would break the
mathematical assumptions that underpin widely deployed public-key algorithms, rendering
them insecure and obsolete. As a result, there is an urgent need to update protocols and
infrastructure with post-quantum cryptographic (PQC) algorithms designed to resist
attacks from both quantum and classical adversaries. The cryptographic primitives
requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST
PQC Standardization process has initially selected algorithms such as ML-KEM
<xref target="FIPS203"/>, ML-DSA <xref target="FIPS204"/>, and SLH-DSA <xref target="FIPS205"/> for usage in security
protocols.</t>
      <t>To mitigate the risks posed by a CRQC, such as the potential compromise of encrypted
data and the forging of digital signatures, existing security protocols must be upgraded
to support PQC. These risks include "Harvest Now, Decrypt Later" (HNDL) attacks, where
adversaries capture encrypted traffic today with the intent to decrypt it once CRQCs
become available. TLS-based EAP methods are widely used for network access
authentication in enterprise and wireless environments. This document applies to all EAP
methods that use TLS as their underlying transport, including EAP-TLS <xref target="RFC9190"/>,
EAP-TTLS <xref target="RFC5281"/>, PEAP, and TEAP <xref target="RFC7170"/>. To continue providing long-term
confidentiality and authentication guarantees, these methods must evolve to incorporate
post-quantum algorithms.</t>
      <t>However, transitioning these protocols to support PQC introduces practical challenges.
<xref target="RFC9191"/> highlights issues related to large certificates and certificate chains in
EAP-TLS, which can lead to session failures due to round-trip limitations. PQC
certificates and certificate chains tend to be significantly larger than their
traditional counterparts, further exacerbating these issues by increasing TLS handshake
sizes and the likelihood of session failures. To address these challenges, this draft
proposes mitigation strategies that enable the use of PQC within TLS-based EAP methods,
ensuring secure and efficient authentication even in constrained network environments.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.
For the purposes of this document, it is useful to categorize cryptographic algorithms
into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer
factorization, finite field discrete logarithms, or elliptic curve discrete
logarithms. In the context of TLS, an example of a traditional key exchange algorithm
is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its
ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure
against attacks from both quantum and classical computers. An example of a
post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism
(ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms
              </t>
              <ul spacing="normal">
                <li>
                  <t>one traditional algorithm and one post-quantum algorithm. The resulting shared
secret remains secure as long as at least one of the component key exchange
algorithms remains unbroken.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed
of two or more component signature algorithms, where at least one is a post-quantum
algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate
Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP)
statements, and any other mechanism that contributes signatures during a TLS handshake
or in the context of a secure communication establishment.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality in TLS-Based EAP Methods</name>
      <t>One of the primary threats to TLS-based EAP methods is the HNDL attack. In this
scenario, adversaries can passively capture EAP-TLS handshakes such as those transmitted
over the air in Wi-Fi networks and store them for future decryption once CRQCs become
available.</t>
      <t>While EAP-TLS 1.3 <xref target="RFC9190"/> provides forward secrecy through ephemeral key exchange
and improves privacy by encrypting client identity and reducing exposure of session
metadata, these protections rely on the security of the underlying key exchange
algorithm. In the presence of a CRQC, traditional key exchange mechanisms (e.g., ECDHE)
would no longer provide long-term confidentiality. In such cases, an adversary could
mount an HNDL attack by passively recording EAP-TLS handshakes and decrypting the
captured traffic once quantum-capable cryptanalysis becomes feasible. This could
retroactively expose information that TLS 1.3 is otherwise designed to protect,
including:</t>
      <ul spacing="normal">
        <li>
          <t>The identity of the authenticated client.</t>
        </li>
        <li>
          <t>Client credentials used in certificate-based authentication (e.g., usernames,
device or organization identifiers).</t>
        </li>
        <li>
          <t>In the case of EAP-TTLS and TEAP, HNDL attacks present an additional threat. These 
methods typically carry legacy inner authentication protocols within the outer TLS tunnel, such as MS-CHAPv2. If a CRQC is used to break the outer TLS tunnel, the exposed inner authentication exchange could enable offline password attacks, potentially allowing an adversary to recover user credentials.</t>
        </li>
      </ul>
      <t>To preserve the intended privacy guarantees of TLS 1.3 and to protect against HNDL
attacks, TLS-based EAP deployments that require long-term confidentiality will need to
adopt post-quantum key exchange mechanisms, as outlined in Section 4 of
<xref target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>These mechanisms ensure that even if handshake data is recorded today, it cannot be
decrypted in the future, maintaining the confidentiality and privacy of the TLS session.</t>
      <t>Furthermore, to support hybrid or PQC-only key exchange in bandwidth or
latency-constrained EAP deployments, EAP clients and servers should apply the
optimizations described in Section 4.1 of <xref target="I-D.ietf-uta-pqc-app"/> to minimize
performance overhead.</t>
    </section>
    <section anchor="eaptls-authentication">
      <name>Post-Quantum Authentication in TLS-Based EAP Methods</name>
      <t>Although a CRQC would primarily impact the confidentiality of recorded TLS sessions, it
could also pose risks to authentication mechanisms that rely on traditional public-key
algorithms with long-lived credentials. In particular, if quantum-capable cryptanalysis
were to become practical within the validity period of a certificate, an adversary could
recover the private key corresponding to a traditionally signed certificate and
subsequently impersonate the certificate holder in real time. The feasibility and impact
of such attacks depend on several factors, including certificate lifetimes and key
management practices.</t>
      <t>TLS-based EAP deployments rely on X.509 certificates issued by CAs, and the transition
to PQ certificate authentication is constrained by the long lifecycle associated with
distributing, deploying, and validating new trust anchors. If CRQCs arrive sooner than
anticipated, deployed authentication systems may lack the agility to transition
credentials and trust anchors in a timely manner.</t>
      <t>As a result, deployments that rely on long-lived certificates or that require resistance
to future quantum-capable adversaries face an increased risk of authentication
compromise. In such scenarios, an on-path attacker that is able to recover a server's
private key within the certificate validity period could impersonate access points (APs)
in real time, potentially deceiving users into revealing credentials or connecting to
rogue networks.</t>
      <t>To mitigate these risks, TLS-based EAP deployments will need to adopt, over time, either
PQ or PQ/T hybrid certificate-based authentication, as described in <xref section="5" sectionFormat="of" target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>The use of PQ or PQ/T hybrid certificates increases the size of individual certificates,
certificate chains, and signatures, resulting in significantly larger handshake messages.
These larger payloads can lead to packet fragmentation, retransmissions, and handshake
delays, issues that are particularly disruptive in constrained or lossy network
environments.</t>
      <t>To address these impacts, TLS-based EAP deployments can apply certificate chain
optimization techniques outlined in Section 6.1 of <xref target="I-D.ietf-uta-pqc-app"/> to reduce
transmission overhead and improve handshake reliability.</t>
    </section>
    <section anchor="ext-extn">
      <name>EST Integration</name>
      <t>The EAP client is expected to validate the certificate presented by the EAP server using
a trust anchor that is provisioned out-of-band prior to authentication (e.g., using
EST). The intermediate certificates are provided by the EAP server during the TLS
handshake. The EAP client relies solely on the pre-provisioned trust anchor to build and
validate the certificate chain. This model assumes a managed deployment environment with
explicitly configured trust relationships between the EAP client and EAP server.</t>
      <t>To further reduce handshake overhead, particularly in deployments using large certificate
chains due to post-quantum (PQ) or composite certificates, this draft proposes an
optimization that leverages the Enrollment over Secure Transport (EST) protocol
<xref target="RFC7030"/>, extended by <xref target="RFC8295"/>. Specifically, it allows intermediate certificates
to be retrieved in advance by using EST, thereby avoiding the need to transmit them
during each TLS handshake.</t>
      <t>For EAP methods that use TLS as an outer tunnel (e.g., PEAP and TEAP), the EST
optimization described in this section applies to the certificates used in the outer TLS
tunnel. The EST pre-fetching of client intermediate certificates is relevant only when mutual TLS authentication is used. This is always the case for EAP-TLS, and optionally the case for EAP-TTLS and TEAP when client certificate authentication is used in the outer tunnel.</t>
      <t>This section defines extensions to EST to support retrieval of the certificate chain used
by an EAP server and EAP clients. The first extension enables clients to obtain access to
the complete set of published intermediate certificates of the EAP server.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapservercertchain
]]></artwork>
      <t>The '/eapservercertchain' is intended for informational retrieval only and does not
require client authentication. It allows clients to retrieve the intermediate certificate
chain that the EAP server presents during TLS handshakes. This request is performed
using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client
authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same
certificate chain the EAP server uses in a TLS-based EAP session.</t>
      <t>The second extension enables EAP servers to obtain access to the complete set of
published intermediate certificates of the EAP clients. Rather than relying on static
configuration, the EAP server can dynamically fetch the client's intermediate certificate
chain from a trusted EST server within the same administrative domain.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapclientcertchain
]]></artwork>
      <t>The '/eapclientcertchain' is intended for informational retrieval only and does not
require client authentication. It allows the EAP server to retrieve the intermediate
certificate chain that the EAP clients present during TLS handshakes. This request is
performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without
requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14>
be the same certificate chain EAP clients use in the TLS-based EAP session.</t>
      <t>EAP clients and servers <bcp14>MUST</bcp14> authenticate the EST server using a trust anchor obtained
via a suitable bootstrapping mechanism before retrieving intermediate certificate chains
via HTTPS. Various bootstrapping mechanisms exist for establishing this trust, such as
BRSKI <xref target="RFC8995"/>, EST <xref target="RFC7030"/>, or out-of-band provisioning. The choice of
bootstrapping mechanism is a deployment decision and is out of scope for this document.
Certificate chains retrieved from an unauthenticated or untrusted EST server <bcp14>MUST NOT</bcp14> be
used for TLS chain validation.</t>
      <t>EAP servers and clients are <bcp14>RECOMMENDED</bcp14> to cache retrieved certificate chains to reduce
latency and network overhead. However, they <bcp14>SHOULD</bcp14> implement mechanisms to detect changes
or expiration. These include periodic re-fetching, honoring HTTP cache control headers
(e.g., Cache-Control, ETag), and verifying the validity period of intermediate
certificates.</t>
      <t>EAP clients <bcp14>MAY</bcp14> omit intermediate certificates from the TLS handshake only if they have
been explicitly configured by the administrator to do so. Such configuration is recommended only in deployments where both the EAP client and EAP server support this specification and have completed EST pre-fetching as part of provisioning. If no such
configuration is present, the EAP client <bcp14>MUST</bcp14> include the full certificate chain in the
TLS handshake. Similarly, an EAP server <bcp14>MAY</bcp14> omit intermediate certificates from the TLS
handshake only if it has been explicitly configured by the administrator to do so.
Administrators are advised to ensure that clients in the deployment have retrieved the
server's intermediate certificates via EST as part of their provisioning process before
enabling this configuration.</t>
      <t>Note: A TLS extension could be used to explicitly signal support for intermediate
certificate omission between peers, avoiding the need for administrator configuration.
Such a mechanism is considered a possible future solution but is out of scope for this
document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-uta-pqc-app"/> and
<xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account for
all TLS-based EAP deployments.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new path components under the EST well-known URI
'/.well-known/est/', following the extension mechanism established by <xref target="RFC8295"/>:
'/eapservercertchain' and '/eapclientcertchain'. As these are sub-paths under the
already-registered '/.well-known/est/' prefix defined in <xref target="RFC7030"/>, no new IANA
registry entries are required.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to John Mattsson, Hannes Tschofenig, Alan Dekok and Michael Richardson for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-pqc-app">
          <front>
            <title>Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   Post-quantum cryptography presents new challenges for device
   manufacturers, application developers, and service providers.  This
   document highlights the unique characteristics of applications and
   offers best practices for implementing quantum ready usage profiles
   in applications that use TLS and key supporting protocols such as
   DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-01"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk"/>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase. During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase. During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel. The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks. The data phase may also be used for additional, arbitrary data exchange. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="FIPS203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="203"/>
        </reference>
        <reference anchor="FIPS204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="204"/>
        </reference>
        <reference anchor="FIPS205">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="205"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
