<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-falcon-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title>FN-DSA for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-02"/>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Tradeverifyd</organization>
      <address>
        <email>orie@or13.io</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="October" day="11"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>JOSE</keyword>
    <keyword>COSE</keyword>
    <keyword>PQC</keyword>
    <keyword>FN-DSA</keyword>
    <abstract>
      <?line 81?>

<t>This document specifies JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in US NIST FIPS 206 (expected to be published in late 2026 early 2027).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cose-wg.github.io/draft-ietf-cose-falcon/draft-ietf-cose-falcon.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-falcon/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/draft-ietf-cose-falcon"/>.</t>
    </note>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in US NIST FIPS 206 (expected to be published in late 2026 early 2027).</t>
      <t>See Section 11.3 of <xref target="I-D.draft-ietf-pquip-pqc-engineers"/> for a comparison of FN-DSA with ML-DSA <xref target="USNIST.FIPS.204"/> and SLH-DSA <xref target="USNIST.FIPS.205"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-fn-dsa-algorithm-family">
      <name>The FN-DSA Algorithm Family</name>
      <t>The FN-DSA Signature Scheme is parameterized to support different security levels.</t>
      <t>This document introduces the registration of the following algorithms in <xref target="IANA.jose"/>:</t>
      <table align="left" anchor="jose-algorithms">
        <name>JOSE Algorithms for FN-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FALCON512</td>
            <td align="left">FALCON512</td>
            <td align="left">Falcon with parameter set 512</td>
          </tr>
          <tr>
            <td align="left">FALCON1024</td>
            <td align="left">FALCON1024</td>
            <td align="left">Falcon with parameter set 1024</td>
          </tr>
        </tbody>
      </table>
      <t>This document introduces the registration of the following algorithms in <xref target="IANA.cose"/>:</t>
      <table align="left" anchor="cose-algorithms">
        <name>COSE Algorithms for FN-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FALCON512</td>
            <td align="left">TBD1 (-54)</td>
            <td align="left">CBOR Object Signing Algorithm for FALCON512</td>
          </tr>
          <tr>
            <td align="left">FALCON1024</td>
            <td align="left">TBD2 (-55)</td>
            <td align="left">CBOR Object Signing Algorithm for FALCON1024</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="fn-dsa-keys">
      <name>FN-DSA Keys</name>
      <t>The FN-DSA Algorithm Family uses the Algorithm Key Pair (AKP) key type, as defined in <xref target="I-D.draft-ietf-cose-dilithium"/>.</t>
      <t>The specific algorithms for FN-DSA, such as FALCON512 and FALCON1024, are defined in this document and are used in the <tt>alg</tt> value of an AKP key representation to specify the corresponding algorithm.</t>
      <t>Thumbprints for FN-DSA keys are computed according to the process described in <xref target="I-D.draft-ietf-cose-dilithium"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC7515"/>, <xref target="RFC7517"/> and <xref target="RFC9053"/> apply to this specification as well.</t>
      <t>A detailed security analysis of FN-DSA is beyond the scope of this specification; see <xref target="USNIST.FIPS.206"/> for additional details.</t>
      <section anchor="validating-public-keys">
        <name>Validating Public Keys</name>
        <t>TODO</t>
      </section>
      <section anchor="side-channel-attacks">
        <name>Side-Channel Attacks</name>
        <t>TODO</t>
      </section>
      <section anchor="randomness">
        <name>Randomness</name>
        <t>TODO</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-cose-algorithms">
        <name>New COSE Algorithms</name>
        <t>IANA is requested to add the following entries to the COSE Algorithms Registry.
The following completed registration templates are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>
        <section anchor="falcon512">
          <name>FALCON512</name>
          <ul spacing="normal">
            <li>
              <t>Name: FALCON512</t>
            </li>
            <li>
              <t>Value: TBD1 (requested assignment -54)</t>
            </li>
            <li>
              <t>Description: CBOR Object Signing Algorithm for FALCON512</t>
            </li>
            <li>
              <t>Capabilities: <tt>[kty]</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: RFC XXXX</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
        <section anchor="falcon1024">
          <name>FALCON1024</name>
          <ul spacing="normal">
            <li>
              <t>Name: FALCON1024</t>
            </li>
            <li>
              <t>Value: TBD2 (requested assignment -55)</t>
            </li>
            <li>
              <t>Description: CBOR Object Signing Algorithm for FALCON1024</t>
            </li>
            <li>
              <t>Capabilities: <tt>[kty]</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: RFC XXXX</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="new-jose-algorithms">
        <name>New JOSE Algorithms</name>
        <t>IANA is requested to add the following entries to the JSON Web Signature and Encryption Algorithms Registry.
The following completed registration templates are provided as described in <xref target="RFC7518"/>.</t>
        <section anchor="falcon512-1">
          <name>FALCON512</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: FALCON512</t>
            </li>
            <li>
              <t>Algorithm Description: FALCON512 as described in US NIST FIPS 206.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): RFC XXXX</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): <xref target="USNIST.FIPS.206"/></t>
            </li>
          </ul>
        </section>
        <section anchor="falcon1024-1">
          <name>FALCON1024</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: FALCON1024</t>
            </li>
            <li>
              <t>Algorithm Description: FALCON1024 as described in US NIST FIPS 206.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): RFC XXXX</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): <xref target="USNIST.FIPS.206"/></t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-09"/>
        </reference>
        <reference anchor="USNIST.FIPS.206" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>Fast Fourier Transform over NTRU-Lattice-Based Digital Signature Algorithm</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="USNIST.FIPS.204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="USNIST.FIPS.205" target="https://doi.org/10.6028/NIST.FIPS.205">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 215?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="jose">
        <name>JOSE</name>
        <section anchor="key-pair">
          <name>Key Pair</name>
          <figure anchor="FALCON512-private-jwk">
            <name>Example FALCON512 Private JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "FALCON512",
  "pub": "V53SIdVF...uvw2nuCQ",
  "priv": "V53SIdVF...cDKLbsBY"
}
]]></sourcecode>
          </figure>
          <figure anchor="FALCON512-public-jwk">
            <name>Example FALCON512 Public JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "FALCON512",
  "pub": "V53SIdVF...uvw2nuCQ"
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="json-web-signature">
          <name>JSON Web Signature</name>
          <figure anchor="FALCON512-jose-jws">
            <name>Example FALCON512 Decoded Protected Header for a JSON Web Signature</name>
            <artwork><![CDATA[
{
  "kid: "clpwZ...RWYU9CUF",
  "alg": "FALCON512",
  "typ": "JWT"
}
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <section anchor="key-pair-1">
          <name>Key Pair</name>
          <figure anchor="FALCON512-private-cose-key">
            <name>Example FALCON512 Private COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{
  / kty AKP       / 1: 7,
  / alg FALCON512 / 3: -54,
  / public key    / -1: h'7803c0f9...3f6e2c70',
  / private key   / -2: h'7803c0f9...3bba7abd'
}
]]></sourcecode>
          </figure>
          <figure anchor="FALCON512-public-cose-key">
            <name>Example FALCON512 Public COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{
  / kty AKP       / 1: 7,
  / alg FALCON512 / 3: -54,
  / public key    / -1: h'7803c0f9...3f6e2c70',
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="cose-sign1">
          <name>COSE Sign1</name>
          <figure anchor="FALCON512-cose-sign-1-diagnostic">
            <name>Example FALCON512 COSE Sign1</name>
            <sourcecode type="cbor-diag"><![CDATA[
18([
  <<{
    / alg FALCON512 / 1: -54,
  }>>,
  / unprotected / {},
  / payload / h'66616b65',
  / signature / h'53e855e8...0f263549'
])
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Converted to markdown</t>
        </li>
        <li>
          <t>Applied feedback from IESG Evaluation on ML-DSA</t>
        </li>
        <li>
          <t>Revised references</t>
        </li>
        <li>
          <t>Revised abstract</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Added Acknowledgements</t>
        </li>
        <li>
          <t>Added Document History</t>
        </li>
        <li>
          <t>Updated test vectors</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to especially thank David Balenson for careful review of approaches taken in this document. We would also like to thank Michael B. Jones for guidance in authoring.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Rafael Misoczki">
        <organization>Google</organization>
        <address>
          <email>rafaelmisoczki@google.com</email>
        </address>
      </contact>
      <contact fullname="Michael Osborne">
        <organization>IBM</organization>
        <address>
          <email>osb@zurich.ibm.com</email>
        </address>
      </contact>
      <contact fullname="Christine Cloostermans">
        <organization>NXP</organization>
        <address>
          <email>christine.cloostermans@nxp.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1Z3VbbSBK+11PUmotATiRjg4F4MxmMgUAGMMGQTHbOnJO2
1LY7yGpNt2THIeRZ5ln2ybaqW7Yk2ySTOZPZi10usFTdXV311W+3XNd1EpGE
vAmV4wv3sNuCvlTwstM9AhYF0MaHiuOzhA+kmjZBJ4HjBNKP2AiXBIr1E1fw
pO/6UnO3z0JfRu5m3dFpbyS0FjJKpjHOPD26PnaidNTjqukEyK7p4EzNI53q
JiQq5c64CVsOU5yhKF3up0ok04ozkep2oGQaI7V90LmCTu899xPoikEkooER
8ijy1TROcLOKc8unuCRoOuAaLei3nf1evmrTj9XTccY8SlEOgG/hD2AVqrxB
wWjCC1pM9BETIdIJiH2CxJNqQHSm/CHSh0kS62a1StOIJMbcm02rEqHaU3Ki
eZUYVGnhQCTDtJexdCeD6mq4aWqIiOqksEu2xLM8PCEfWPwA2Rsmo7DiOCxN
hlIRmLgJQD8NQ2v5yrnwh4yHcKmkkv5txYyjKiwSHxlB1YQR16nCrc0Qz+AZ
xXbB/my0soJ5RwkO3YTzkK9ifK1YwMdcif40KDGXuG5fqtrWA3xPWBRxDdfa
H8o+j8RgFfebCE2jNHofyD604jgUPICuL3jk4+IDGUXu1ZCLyO0KPjAMWK+n
+Jg2cA+uupapL9MooZB5wdWIRdOSoEMjiJfMBdkfjD54EU8Qc4Q/UaKXJquB
v2J9wv1caOl/vBWrNHgh5SDkpQ2VWTXKFu0PzAzPl6NVMM1s29E9qaKVJjg9
OC8jr3v7HzFk/aEneqOHGLeHSuhERBzaoZQ6McjoVfwvfr4s8fdnKz2/sHI/
+hDbvZxIIiVBy1FAXx23dxu1Rv64mz0+3Wxs5Y/b+YQ9ejx1D73FeAhEiCEk
0lETzs9M3gC46V6cdq+949PLrlff3GkaSedZlOkEjiViwRV5aqQxoY5Aok/B
xfXVjXvGkkT43D1gGv3qUGCIstDkG5akikMrxFSLe44sLglTA46hPYvsyWTi
RYiFN5DjasQn2sVQiBJtnqv1zfp2dXOvSjNchfGDm2i3LxS+buFvxELxkQdu
jBi6v6UsStKRy+f5zdUJJjymAu04IuoXMT1tXbS89whJM3+ckf2c7GfkMpTx
b6mI8b+Pew3QihhfzSUgt8tAnssgDflX4epmEq9GK5DCJNjaprezWd+rlvZb
kqBRlgBZJwih1nDC9PA7SNBwHBcLMP3DHKITxfzEca6HQgPW2HSEdgUdc1/0
BWael93OxZfLE6xTyduwlfurxQzW22a2xkxKbmFCT5v6f3x8Det99GR35snJ
zJM3/owrw7otuhtPgMEl+d4r63vQJmHkQLF4OIV1rNAbEGR89JwPpkk+4hBw
dGDcSERoNyAggYAEjEFY5x8QqARHEwk9DnHaC4Ue2tlUHnFWfQc4U+GUHnc3
PMcCPxJBgNnSWYNTTLzodD7h8H8z/H1m6HIMIm5gh1rN26K6e3f39RRyf29Q
YlhrRzHDAoHrcWnWx05Q4yxnI7eFVINLyQrds5OV4437e3KPNbjGQiMiGcrB
lDyCA/aXQA2mxgR1072uPLG/cNExz1dHr25Or44O6bl70jo7mz842YzuSefm
7DB/yle2O+fnRxeHdjFSoURyKuettzhCYlc6l9ennYvWWYVgTUqOih10hr2I
sEzGipM1mHYCrn3sK6wpDtqX//69to2K/wMLYL1We4qI2Je92i7BMxnyyO4m
I7SVfU2GfOqwOEb7ERcWhuCzmNxE41wNeignEQy54gjf418ImV+b8Kznx7Xt
5xmBFC4RZ5iViAazZcrSYgviCtKKbeZolugLSJflbb0tvc9wLxCf/RhSQ+PW
9n58bl0GvSRzwTzwjtlIhJkLZYOFAmLjCq2IXoydEpqNijSZUadxLFWCwdjv
I6qUiLKjEYRY90PtLSYqkSUxzFRoLVB8IKiwmODC4CBaX4ahnJhMNBNQkznv
7tx5ab+/bzrOJ7hAccD+faLZ+P/Q+JFNXZ+cT27x71PpZ0ZEPsets3bnolGr
E5/Ci+F7bM4cNmDnCKCiCdCcfHkNm5t8vX37CgMz6ZNz14Q10sotKIy5dhD9
UAl5P6nYkv9DxZx7W/kck4SNuSr33wFo/zsDfX1wWIN1t7G9gS+rKlHuoEbT
+dplzJFVnVg1voVVAX3/D6Df/iL6a7PA+YlPdSmSFsMMUp0ZJR/BRXDJhIL1
1k+XGyaN00HeZK1CQUPL2JJhCgDtkRV+v2jCXLAnGKH+kJjk4FHOzPV/YjJy
YYuFdI2TaUKqZ6Mc3uFW72DMwpSTJ7EIUGYjsuKYzzWus25GCcKINzXrfKlw
NJZRUHI5o0g66sUKXbYoPLHUZncqoKmpEz4yMcuRN/HE47pPHXCpepRRWoPZ
dQ20sXMRAbdRkBlpnrD80qAt8tlJ7f7+yfxlN6vN5p0ObPSOp/CpFQnBm5nE
goDYT3gYoiAtlDLB8yIKOd+U4YlnqoUuNAb40uNTRMkoqH0Zcxuwi6z/iWz4
Um+wM2s7gkDQLGyR7LaUi9fW4DW6doDrEcNL6n78mcN2DjtmQhdBcNvmCiCE
VpIw/7Y4fIXKy1GEoM+J5mi1BC7OveATWIgaxzGTURfFf0u5znoxlHYhJXG6
ZqA4sYZeDL4rm8+mnjFivoxcJTQ9RSnjJRzJdAtl/Am9ZoyiBja6Sp5TMGrB
yNvWk1CleRxhA2GyYrNAekzopkiymS3XkGlqU01EUbrDiYXs2fyW3IdL2yxm
PTr3IzxNePfLbTL99R3R0WYDTnbAzB+GXGX3mo8RLFOdfZQM9YGf8c9QESyU
CYFowluuiwpSaljU0NCKKtYfVLHxp1XMNvmeOhq3fPnXuKU5bb3hvUK7tHB8
+nt8lu6IVvtoDvKyt+ZjJVsVasXCXosHKq/E5EYztM2ZtOlpXW80KcvjFAP2
KSk5mheHK8RZKENAC3dim6u+aOJuKbEeZjXK7FMweS5Pa5ZcZ1O1mbsiY65y
/dXAZf75ReRMX/G/Ax3dUvSwSlAlOPrASFYbZ+YDh0F21t44zufPn9/jQdi5
cwAqGNWVJlSwfcADJL6jyvQ+9z9LxUM6UV83trqnwetjz/PS8aQepe1X2bgS
44UJ/uFPZz198Lbi3NOOpsWbc3VpAcaV+35yO+vtMrkLrn9pJ+URjjpQn/fX
KrBaPlOXvyKerd2L0hm0l5OSY3cxIouALqzDePIvFOTqzdubp+2b4y+Jj40o
UV++uV4trjm5vJ/oh4U9xCxMqetSycRev5xwhq1Cdj+yLK9pqNfsl7FlB/oM
fk8qNxBsYHSqAtrBNKH2rwq1Juw+MSN0VskFqcJWkyqwHbM4m87VrHJx2fDR
7t7mlr/Zf4robPV3eN3f3XyUzc9cwi7A+fXF+b0e22W94JHF6SG/M4cN0+J/
zflM15M73n9D8dWaWA/9A4rYnYp6rGWGNdauLelV21v/BYV89uzOscItKlKb
K3L//LnVJ43iuWdV4e4+05JNQ8mIMny0s7NT2+ntNDJL5peGNNjY4nuNBt9D
xTf79Z2txvbTR86vG6sUNxrTardmxI2kTlC/B/XPFTXRiRlyllDhBCu9VFPM
n5tYqAEeAyXuMVdZ7zFi6jaQk8gOzT709TkPKNlCX8kRZvfuCziio1h2sI/y
z0C46IqPhTZtRdYb6TI9v9R3N2uZDK2AIrXl30ZygkeVgS0zxbElDczYTUzf
zVFybJ5gjLaQShuFc1aW013TfmjnwQ+VPgu1CfY3HCYyDQMIxa25IOTmqMNC
OldhVbuFQ4btDxywkEd0kUqZw8e+qJ+GqN5YYEtHZ9EYHYH5Q2rQ2C2Plg60
Hsx3wq3lfDu7x+zL4oEHLyV9iqVdBimelxA7c6NoPjhjz0bXr/8B+R7L1p0g
AAA=

-->

</rfc>
