<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="ML-DSA &amp; SLH-DSA Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using ML-DSA and SLH-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="14"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 75?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It adds ML-DSA and SLH-DSA capabilities to IKEv2 while preserving existing IKEv2 operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> are quantum-resistant digital signature schemes standardized by the US National Institute of Standards and Technology (NIST) PQC project. This document specifies the use of the ML-DSA and SLH-DSA algorithms in IKEv2.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm. For security level 1, SHA-256 (<xref target="FIPS180"/>) is used. For security levels 3 and 5, SHA-512 (<xref target="FIPS180"/>) is used. SHAKE256 (<xref target="FIPS202"/>) is applicable for all security levels. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="signature-algorithm-use-and-hashing-in-ikev2-with-ml-dsa-and-slh-dsa">
      <name>Signature Algorithm Use and Hashing in IKEv2 with ML-DSA and SLH-DSA</name>
      <t>For integrating ML-DSA and SLH-DSA into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
      <t>The implementation <bcp14>MUST</bcp14> send a SIGNATURE_HASH_ALGORITHMS notify with an "Identity" (5) hash function.
ML-DSA and SLH-DSA are only defined with the "Identity" hash and <bcp14>MUST NOT</bcp14> be sent to a receiver that has not indicated support for the "Identity" hash.</t>
      <t>When generating a signature with ML-DSA or SLH-DSA, the IKEv2 implementation would take the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically send it to the identity hash (which leaves it unchanged), and then pass it into the ML-DSA or SLH-DSA signer as the message to be signed (with no context string).
The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
      <t>When verifying a signature with ML-DSA or SLH-DSA, the IKEv2 implementation would take the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically send it to the identity hash (which leaves it unchanged), and then pass it into the ML-DSA or SLH-DSA signer as the message to be verified (with no context string).</t>
      <section anchor="implementation-alternatives-for-ml-dsa">
        <name>Implementation Alternatives for ML-DSA</name>
        <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the crypto library to generate the full signature; this works for SLH-DSA as well.</t>
        <t>The second approach involves using the ExternalMu-ML-DSA API defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. In this method, the implementation calls the ExternalMU-ML-DSA.Prehash API with the SignedOctets string and the ML-DSA public key, generating an hash. This
hash is then passed to the cryptographic library to execute the ExternalMU-ML-DSA.Sign API, which takes the hash and the ML-DSA private key to produce the signature.</t>
        <t>These methods are equivalent, and so either may be used.</t>
      </section>
      <section anchor="discussion-of-ml-dsa-and-slh-dsa-and-prehashing">
        <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
        <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2, not just the method proposed above.</t>
        <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply one of a number of hash functions to the message and then perform processing on that hash.
Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
        <t>We see three ways to address this mismatch.</t>
        <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
        <ol spacing="normal" type="1"><li>
            <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
          </li>
          <li>
            <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
          </li>
          <li>
            <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
          </li>
        </ol>
        <t>The second is to note that, while IKEv2 normally acts this way, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
        <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as current, but instead of running ML-DSA or SLH-DSA in prehash mode, we have it sign it in pure mode as if it was the message.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
      </section>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and randomized signing options. By default, ML-DSA uses a non-deterministic approach, where the private random seed rho' is derived pseudorandomly from the signer’s private key, the message, and a 256-bit string, rnd, generated by an approved Random Bit Generator (RBG). In the deterministic version, rnd is instead a constant 256-bit string. Similarly, SLH-DSA can be deterministic or randomized, depending on whether opt_rand is set to a fixed value or a random one. When opt_rand is set to a public seed (from the public key), SLH-DSA produces deterministic signatures, meaning signing the same message twice will result in the same signature.</t>
      <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each IKEv2 session, as it includes session-specific information like nonces, cryptographic parameters, and identifiers. Thus, both ML-DSA and SLH-DSA can utilize their deterministic versions when used within IKEv2. In both cases, the 'context' input parameter for the signature generation algorithm is set to an empty string.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. This document specifies only the use of pure mode for signature-based authentication in IKEv2, where the content is signed directly along with some domain separation information. In pre-hash mode, a digest of the message is signed instead. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-x509-slhdsa"/> discusses pre-hash mode. The data signed to prove the identity of the initiator and responder (as discussed in Section 2.15 of <xref target="RFC7296"/>) typically fits within the memory constraints of the devices involved in the IKEv2 exchange, consisting of nonces, SPIs, and the initial exchange messages, which are manageable in size.</t>
    </section>
    <section anchor="mechanisms-for-signaling-supported-key-pair-types">
      <name>Mechanisms for Signaling Supported Key Pair Types</name>
      <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they possess:</t>
      <ul spacing="normal">
        <li>
          <t>One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the
initiator.  For example, the initiator could indicate in the
Certificate Request payload that it trusts a certificate authority
certificate signed by an ML-DSA or SLH-DSA key. This indication implies 
that the initiator can process ML-DSA or SLH-DSA signatures, which means 
that the responder can use ML-DSA or SLH-DSA keys when authenticating.</t>
        </li>
        <li>
          <t>Another method is to leverage <xref target="I-D.ietf-ipsecme-ikev2-auth-announce"/> that
allows peers to announce their supported authentication methods. It improves
interoperability when IKEv2 partners are configured with multiple
credentials of different type to authenticate each other. The responder includes 
a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message 
containing the PQC digital signature scheme(s) it supports. The initiator includes 
the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or 
in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature 
scheme(s) supported by the initiator, ordered by preference.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-DSA and SLH-DSA are modeled under existentially unforgeable digital signatures with respect to an adaptive chosen message attack (EUF-CMA).</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, and Daniel Van Geest for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-auth-announce">
          <front>
            <title>Announcing Supported Authentication Methods in IKEv2</title>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <date day="18" month="April" year="2024"/>
            <abstract>
              <t>   This specification defines a mechanism that allows the Internet Key
   Exchange version 2 (IKEv2) implementations to indicate the list of
   supported authentication methods to their peers while establishing
   IKEv2 Security Association (SA).  This mechanism improves
   interoperability when IKEv2 partners are configured with multiple
   credentials of different type to authenticate each other.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-auth-announce-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
