<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-connolly-cfrg-hybrid-sig-considerations-00" category="info" consensus="true" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="hybrid-sig-considerations">Hybrid Signature Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-hybrid-sig-considerations-00"/>
    <author fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <author fullname="Sophie Schmieg">
      <organization>Google</organization>
      <address>
        <email>sschmieg@google.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="14"/>
    <area>IRTF</area>
    <workgroup>Crypto Forum</workgroup>
    <keyword>post-quantum</keyword>
    <keyword>hybrid</keyword>
    <keyword>signatures</keyword>
    <abstract>
      <?line 95?>

<t>This document discusses how and when to use hybrid post-quantum/traditional
signatures, and when not to, including prehashing and key use.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dconnolly.github.io/draft-connolly-cfrg-hybrid-sig-considerations/draft-connolly-cfrg-hybrid-sig-considerations.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-connolly-cfrg-hybrid-sig-considerations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cfrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dconnolly/draft-connolly-cfrg-hybrid-sig-considerations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 100?>

<section anchor="intro">
      <name>Introduction</name>
      <t>This document discusses how and when to use hybrid post-quantum/traditional
signatures, and when not to, including prehashing and key use.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="recommendations">
      <name>Specific Recommendations</name>
      <t>Working Groups <bcp14>SHOULD</bcp14> enable the use of ML-DSA signatures, as well as SLH-DSA
signatures and <bcp14>MAY</bcp14> enable the use of HashSLH-DSA signatures.</t>
      <t>Working Groups <bcp14>SHOULD NOT</bcp14> include HashML-DSA as a signature option.</t>
      <t>Working Groups <bcp14>SHOULD</bcp14> include non-hybrid options for signature schemes in
their protocols.</t>
      <t>It is <bcp14>NOT RECOMMENDED</bcp14> to use hybrid signatures, except for rare
circumstances, and implementors <bcp14>MUST</bcp14> be warned to not reusing old key
material in a hybrid.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="prehashing">
        <name>Prehashing</name>
        <t>Prehashing allow the computation of a signature on two entities: The Message
Entity (ME) has access to the message and is not memory constrained, and a
signing entity (SE) that has access to the private key, but has limited
memory and bandwidth.  Prehashing allows the computation of a message
representative by the ME, which is then transfered to the SE to compute the
signature.</t>
        <t>In some designs, the signature is computed in a streaming manner, i.e. the ME
first opens a stream to the SE, and then streams the entire message to the
SE, but the SE never has to buffer the entire message itself, and can operate
on the message stream only.  <!-- TODO: I basically just pulled that out of a -->
<!-- hat, we should look if there is academic literature on it. -->
        </t>
      </section>
      <section anchor="ml-dsa">
        <name>Security Considerations for ML-DSA</name>
        <t>ML-DSA allows for both streaming and prehashing messages. For prehashing,
this uses the comment on <xref target="FIPS204"/>, Algorithm 7, Line 6, and computes the
message representative <tt>mu</tt> in the ME as:</t>
        <artwork><![CDATA[
mu = SHAKE256(SHAKE256(pk, 64) || 0x00 || len(ctx) || ctx || m, 64)
]]></artwork>
        <t>where <tt>pk</tt> is the public key, <tt>ctx</tt> is the context string and <tt>m</tt> is the
message.</t>
        <t>For streaming, the SE can accumulate the message by updating the SHAKE256
state, only having to keep track of the state.</t>
        <t>Since ML-DSA can be both prehashed and streamed, the HashML-DSA variation
defined in <xref target="FIPS204"/> is superfluous and <bcp14>SHOULD NOT</bcp14> be used to reduce
interoperability difficulties.</t>
      </section>
      <section anchor="slh-dsa">
        <name>Security Considerations for SLH-DSA</name>
        <t>SLH-DSA, standardized in <xref target="FIPS205"/>, does not allow for prehashing or
streaming messages. The HashSLH-DSA variant defined in <xref target="FIPS205"/> <bcp14>MAY</bcp14> be
used to allow for prehashing and streaming. Alternatively, working groups can
design protocols in such a fashion that any message that has to be signed is
small enough to be transmitted over the network or be held in the memory of a
HSM.  If HashSLH-DSA is used, the hash function used for the prehash <bcp14>MUST</bcp14> be
part of the public key. It is <bcp14>RECOMMENDED</bcp14> to use the same hash function for
the prehash as is used for the rest of SLH-DSA, but the hash function <bcp14>MUST</bcp14>
have collision resistance on par with the security level. (TODO maybe add a
list instead of leaving it like this)</t>
        <t>In order to increase interoperability, it is <bcp14>RECOMMENDED</bcp14> to reduce the
overall number of variants, and only pick to support either SLH-DSA or
HashSLH-DSA.</t>
        <t>SLH-DSA is proven to be secure as long as the hash function used as the
parameter of SLH-DSA is secure.  Since any signature scheme is only secure as
long as the hash function used with the scheme is secure, this means that in
scenarios where public keys cannot be revoked or expired, SLH-DSA can be used
to defend against the possibility of mathematical breakthroughs.</t>
      </section>
      <section anchor="using-context">
        <name>Security Considerations for the use of Context</name>
        <t>TODO</t>
      </section>
      <section anchor="hybrids">
        <name>Security Considerations for Hybrids</name>
        <t>The main argument for using hybrid signatures is that they continue to be
secure, even if one of the constituant schemes is broken.  While this is a
strong argument for encryption and KEMs, for signatures continuing to be
secure only matters if the public key cannot be changed.  Forging a signature
for a revoked public key is not a security vulnerability.</t>
        <t>Systems <bcp14>SHOULD</bcp14> be designed to be able to recover from compromise, so they
usually have mechanism to revoke public keys, or only use short lived public
keys, which limit the damage of a compromised key. Breaking a signature
scheme compromises all keys using this scheme, but this break usually happens
fairly publicly.  If the protocol has the ability to switch to a new public
key, this can be used to mitigate the vulnerability posed by the broken
scheme. It is <bcp14>RECOMMENDED</bcp14> for protocols to include the algorithm used in the
public key, and not hardcode it or dynamically negogiate it, which would then
allow the migration to a new algorithm.</t>
        <t>The benefit of this approach is that it works both in a prequantum and in a
post-quantum world, since it is agnostic of the type of breakage of the
algorithm, so designing protocols in this fashion also makes them robust for
the future.</t>
        <section anchor="hybrids-downsides">
          <name>The Downsides of Hybrid Signatures</name>
          <t>There are two main downsides of hybrid signatures. Neither of them are
unavoidable, but both require conscious effort to avoid.</t>
          <t>First, hybrid signatures technically allow for the continued use of the same
key material. However, if a key is used in both hybrid and non-hybrid cases,
this constitutes key reuse, and allows for stripping the PQC key and reusing
the signature as if it was classical only. The only way to avoid this problem
is to introduce a domain separator from a prefix-free set for both the
classical and the hybrid signature. Introducing it only for the hybrid
signature is not sufficient, since it would leave the classical signature
with the empty string as domain separator, but the empty string is a prefix
of every string, making the set of domain separators not prefix free. If all
clients can be updated to use the domain separated classical signature, they
can also be updated to use a new public key instead, and using a new key is
best practice, as it completely sidesteps this problem.  Hence protocol
designers <bcp14>MUST NOT</bcp14> allow the reuse of old key material in a hybrid.</t>
          <t>The other downside of hybrid signatures is the combinatorial explosion that
occurs when the various classical schemes are combined with the various PQC
schemes.  It is <bcp14>RECOMMENDED</bcp14> to avoid this as much as possible by selecting
only very few possible combinations.</t>
        </section>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
          <front>
            <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
            <author initials="N." surname="Bindel" fullname="Nina Bindel">
              <organization/>
            </author>
            <author initials="U." surname="Herath" fullname="Udyani Herath">
              <organization/>
            </author>
            <author initials="M." surname="McKague" fullname="Matthew McKague">
              <organization/>
            </author>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization/>
            </author>
            <date year="2017" month="May"/>
          </front>
        </reference>
        <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
          <front>
            <title>A Note on Hybrid Signature Schemes</title>
            <author initials="N." surname="Bindel" fullname="Nina Bindel">
              <organization/>
            </author>
            <author initials="B." surname="Hale" fullname="Britta Hale">
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="October" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

   Discussion of this work is encouraged to happen on the IETF PQUIP
   mailing list pqc@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dconnolly/draft-ietf-pquip-hybrid-
   signature-spectrums

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
      </references>
    </references>
    <?line 258?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
