<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-falcon-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>FN-DSA for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-03"/>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Tradeverifyd</organization>
      <address>
        <email>orie@or13.io</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="October" day="12"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>JOSE</keyword>
    <keyword>COSE</keyword>
    <keyword>PQC</keyword>
    <keyword>FN-DSA</keyword>
    <abstract>
      <?line 108?>

<t>This document specifies JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in US NIST FIPS 206 (expected to be published in late 2026 early 2027).</t>
      <t>It does not define new cryptographic primitives; rather, it specifies how existing FN-DSA mechanisms are serialized for use in JOSE and COSE. This document registers signature algorithms for JOSE and COSE, specifically <tt>FN-DSA-512</tt> and <tt>FN-DSA-1024</tt>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cose-wg.github.io/draft-ietf-cose-falcon/draft-ietf-cose-falcon.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-falcon/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/draft-ietf-cose-falcon"/>.</t>
    </note>
  </front>
  <middle>
    <?line 114?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in US NIST FIPS 206 (expected to be published in late 2026 early 2027).</t>
      <t>FN-DSA (formerly known as Falcon) is a lattice-based digital signature scheme based on the GPV hash-and-sign framework <xref target="GPV08"/>, instantiated over NTRU lattices with fast Fourier sampling techniques <xref target="DP16"/>. The core hard problem underlying FN-DSA is the SIS (Short Integer Solution) problem over NTRU lattices.</t>
      <t>FN-DSA (formerly known as Falcon) is a digital signature algorithm based on lattice mathematics.
It follows the hash-and-sign design introduced by Gentry, Peikert, and Vaikuntanathan <xref target="GPV08"/>.
FN-DSA operates on NTRU lattices and uses fast Fourier techniques <xref target="DP16"/> to make signature generation compact and efficient.
The security of the scheme relies on the hardness of solving certain lattice problems, in particular the Short Integer Solution (SIS) problem.</t>
      <t>FN-DSA offers:</t>
      <ul spacing="normal">
        <li>
          <t>Post-quantum security under the assumption that NTRU-SIS remains hard.</t>
        </li>
        <li>
          <t>Compactness in key and signature size.</t>
        </li>
        <li>
          <t>Efficient operations (roughly O(n log n)).</t>
        </li>
        <li>
          <t>A requirement for careful implementation to avoid side-channel leakage (notably Gaussian sampling must be constant-time where applicable).</t>
        </li>
      </ul>
      <t>The sizes of public key, private key, and signature for the parameter sets are the same as in the original Falcon specification:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Parameter Set</th>
            <th align="left">Signature size (bytes)</th>
            <th align="left">Public Key size (bytes)</th>
            <th align="left">Private Key size (bytes)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FN-DSA-512</td>
            <td align="left">666</td>
            <td align="left">897</td>
            <td align="left">1281</td>
          </tr>
          <tr>
            <td align="left">FN-DSA-1024</td>
            <td align="left">1280</td>
            <td align="left">1793</td>
            <td align="left">2305</td>
          </tr>
        </tbody>
      </table>
      <t>For a detailed comparison of FN-DSA with ML-DSA <xref target="USNIST.FIPS.204"/> and SLH-DSA <xref target="USNIST.FIPS.205"/> see <xref section="11.3" sectionFormat="of" target="I-D.draft-ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines how FN-DSA is used with JSON Object Signing and Encryption (JOSE) <xref target="RFC7515"/> and CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/> <xref target="RFC9053"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-fn-dsa-algorithm-family">
      <name>The FN-DSA Algorithm Family</name>
      <t>The FN-DSA Signature Scheme is parameterized to support different security levels.</t>
      <t>This document introduces the registration of the following algorithms in <xref target="IANA.jose"/>:</t>
      <table align="left" anchor="jose-algorithms">
        <name>JOSE Algorithms for FN-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FN-DSA-512</td>
            <td align="left">FN-DSA-512</td>
            <td align="left">FN-DSA with parameter set 512</td>
          </tr>
          <tr>
            <td align="left">FN-DSA-1024</td>
            <td align="left">FN-DSA-1024</td>
            <td align="left">FN-DSA with parameter set 1024</td>
          </tr>
        </tbody>
      </table>
      <t>This document introduces the registration of the following algorithms in <xref target="IANA.cose"/>:</t>
      <table align="left" anchor="cose-algorithms">
        <name>COSE Algorithms for FN-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FN-DSA-512</td>
            <td align="left">TBD1 (-54)</td>
            <td align="left">CBOR Object Signing Algorithm for FALCON512</td>
          </tr>
          <tr>
            <td align="left">FN-DSA-1024</td>
            <td align="left">TBD2 (-55)</td>
            <td align="left">CBOR Object Signing Algorithm for FALCON1024</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="fn-dsa-keys">
      <name>FN-DSA Keys</name>
      <t>The FN-DSA Algorithm Family uses the Algorithm Key Pair (AKP) key type, as defined in <xref target="I-D.draft-ietf-cose-dilithium"/>.</t>
      <t>The specific algorithms for FN-DSA, such as FALCON512 and FALCON1024, are defined in this document and are used in the <tt>alg</tt> value of an AKP key representation to specify the corresponding algorithm.</t>
      <t>Thumbprints for FN-DSA keys are computed according to the process described in <xref target="I-D.draft-ietf-cose-dilithium"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC7515"/>, <xref target="RFC7517"/> and <xref target="RFC9053"/> apply to this specification as well.</t>
      <t>A detailed security analysis of FN-DSA is beyond the scope of this specification; see <xref target="USNIST.FIPS.206"/> for additional details.</t>
      <t>All the usual caveats for PQC and side-channel resistance apply.</t>
      <ul spacing="normal">
        <li>
          <t>Implementations <bcp14>MUST</bcp14> ensure that <tt>alg</tt> matches the intended algorithm variant.</t>
        </li>
        <li>
          <t>Private implementations of sampling (Gaussian, etc.) must be constant-time to prevent leakage.</t>
        </li>
        <li>
          <t>Public keys <bcp14>SHOULD</bcp14> be validated before use (e.g., against encoding constraints).</t>
        </li>
        <li>
          <t>Nonces, random values, blinding factors (if used) <bcp14>MUST</bcp14> originate from a secure source of randomness.</t>
        </li>
      </ul>
      <section anchor="validating-public-keys">
        <name>Validating Public Keys</name>
        <t>TODO</t>
      </section>
      <section anchor="side-channel-attacks">
        <name>Side-Channel Attacks</name>
        <t>Implementers should follow best practices to mitigate timing, cache, and power side channels, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Using constant-time arithmetic</t>
          </li>
          <li>
            <t>Maintaining uniform memory access patterns</t>
          </li>
          <li>
            <t>Avoiding data-dependent branching or memory indexing</t>
          </li>
        </ul>
      </section>
      <section anchor="randomness-considerations">
        <name>Randomness Considerations</name>
        <t>All required randomness (e.g. for signature generation) <bcp14>MUST</bcp14> be derived from a cryptographically secure, high-entropy source.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-cose-algorithms">
        <name>New COSE Algorithms</name>
        <t>IANA is requested to add the following entries to the COSE Algorithms Registry.
The following completed registration templates are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>
        <section anchor="fn-dsa-512">
          <name>FN-DSA-512</name>
          <ul spacing="normal">
            <li>
              <t>Name: FN-DSA-512</t>
            </li>
            <li>
              <t>Value: TBD1 (requested assignment -54)</t>
            </li>
            <li>
              <t>Description: CBOR Object Signing Algorithm for FALCON512</t>
            </li>
            <li>
              <t>Capabilities: <tt>[kty]</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: RFC XXXX</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
        <section anchor="fn-dsa-1024">
          <name>FN-DSA-1024</name>
          <ul spacing="normal">
            <li>
              <t>Name: FN-DSA-1024</t>
            </li>
            <li>
              <t>Value: TBD2 (requested assignment -55)</t>
            </li>
            <li>
              <t>Description: CBOR Object Signing Algorithm for FALCON1024</t>
            </li>
            <li>
              <t>Capabilities: <tt>[kty]</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: RFC XXXX</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="new-jose-algorithms">
        <name>New JOSE Algorithms</name>
        <t>IANA is requested to add the following entries to the JSON Web Signature and Encryption Algorithms Registry.
The following completed registration templates are provided as described in <xref target="RFC7518"/>.</t>
        <section anchor="fn-dsa-512-1">
          <name>FN-DSA-512</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: FN-DSA-512</t>
            </li>
            <li>
              <t>Algorithm Description: FN-DSA-512 as described in US NIST FIPS 206.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): RFC XXXX</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): <xref target="USNIST.FIPS.206"/></t>
            </li>
          </ul>
        </section>
        <section anchor="fn-dsa-1024-1">
          <name>FN-DSA-1024</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: FN-DSA-1024</t>
            </li>
            <li>
              <t>Algorithm Description: FN-DSA-1024 as described in US NIST FIPS 206.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): RFC XXXX</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): <xref target="USNIST.FIPS.206"/></t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-09"/>
        </reference>
        <reference anchor="USNIST.FIPS.206" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>Fast Fourier Transform over NTRU-Lattice-Based Digital Signature Algorithm</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="USNIST.FIPS.204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="USNIST.FIPS.205" target="https://doi.org/10.6028/NIST.FIPS.205">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GPV08" target="https://doi.org/10.1145/1374376.1374407">
          <front>
            <title>Trapdoors for Hard Lattices and New Cryptographic Constructions</title>
            <author initials="C." surname="Gentry" fullname="Craig Gentry">
              <organization/>
            </author>
            <author initials="C." surname="Peikert" fullname="Chris Peikert">
              <organization/>
            </author>
            <author initials="V." surname="Vaikuntanathan" fullname="Vinod Vaikuntanathan">
              <organization/>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC '08), pp. 197–206" value=""/>
        </reference>
        <reference anchor="DP16" target="https://doi.org/10.1145/2930889.2930923">
          <front>
            <title>Fast Fourier Orthogonalization</title>
            <author initials="L." surname="Ducas" fullname="Léo Ducas">
              <organization/>
            </author>
            <author initials="T." surname="Prest" fullname="Thomas Prest">
              <organization/>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="Proceedings of the 2016 ACM International Symposium on Symbolic and Algebraic Computation (ISSAC '16), pp. 191–198" value=""/>
        </reference>
      </references>
    </references>
    <?line 278?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="jose">
        <name>JOSE</name>
        <section anchor="key-pair">
          <name>Key Pair</name>
          <figure anchor="FN-DSA-512-private-jwk">
            <name>Example FN-DSA-512 Private JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "FN-DSA-512",
  "pub": "V53SIdVF...uvw2nuCQ",
  "priv": "V53SIdVF...cDKLbsBY"
}
]]></sourcecode>
          </figure>
          <figure anchor="FN-DSA-512-public-jwk">
            <name>Example FN-DSA-512 Public JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "FN-DSA-512",
  "pub": "V53SIdVF...uvw2nuCQ"
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="json-web-signature">
          <name>JSON Web Signature</name>
          <figure anchor="FN-DSA-512-jose-jws">
            <name>Example FN-DSA-512 Decoded Protected Header for a JSON Web Signature</name>
            <artwork><![CDATA[
{
  "kid: "clpwZ...RWYU9CUF",
  "alg": "FN-DSA-512",
  "typ": "JWT"
}
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <section anchor="key-pair-1">
          <name>Key Pair</name>
          <figure anchor="FN-DSA-512-private-cose-key">
            <name>Example FN-DSA-512 Private COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{
  / kty AKP        / 1: 7,
  / alg FN-DSA-512 / 3: -54,
  / public key     / -1: h'7803c0f9...3f6e2c70',
  / private key    / -2: h'7803c0f9...3bba7abd'
}
]]></sourcecode>
          </figure>
          <figure anchor="FN-DSA-512-public-cose-key">
            <name>Example FN-DSA-512 Public COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{
  / kty AKP         / 1: 7,
  / alg FN-DSA-512  / 3: -54,
  / public key      / -1: h'7803c0f9...3f6e2c70',
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="cose-sign1">
          <name>COSE Sign1</name>
          <figure anchor="FN-DSA-512-cose-sign-1-diagnostic">
            <name>Example FN-DSA-512 COSE Sign1</name>
            <sourcecode type="cbor-diag"><![CDATA[
18([
  <<{
    / alg FN-DSA-512 / 1: -54,
  }>>,
  / unprotected / {},
  / payload / h'66616b65',
  / signature / h'53e855e8...0f263549'
])
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Converted to markdown</t>
        </li>
        <li>
          <t>Applied feedback from IESG Evaluation on ML-DSA</t>
        </li>
        <li>
          <t>Revised references</t>
        </li>
        <li>
          <t>Revised abstract</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Added Acknowledgements</t>
        </li>
        <li>
          <t>Added Document History</t>
        </li>
        <li>
          <t>Updated test vectors</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to especially thank David Balenson for careful review of approaches taken in this document. We would also like to thank Michael B. Jones for guidance in authoring.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Rafael Misoczki">
        <organization>Google</organization>
        <address>
          <email>rafaelmisoczki@google.com</email>
        </address>
      </contact>
      <contact fullname="Michael Osborne">
        <organization>IBM</organization>
        <address>
          <email>osb@zurich.ibm.com</email>
        </address>
      </contact>
      <contact fullname="Christine Cloostermans">
        <organization>NXP</organization>
        <address>
          <email>christine.cloostermans@nxp.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
