<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="07"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 76?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="signature-generation-and-verification">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness included in the signer’s private key. This approach ensures protection against side-channel attacks.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces, cryptographic parameters, and identifiers. Therefore, PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it will be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: pure mode and pre-hash mode. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information.
The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages, which are typically within device memory constraints.
As discussed in <xref target="pre-hash"/>, while pre-hash mode was considered for integration into IKEv2, various practical challenges led to the adoption of pure mode.</t>
        <section anchor="handling-pqc-signatures-in-ikev2">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>For integrating PQC signature algorithms into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
          <t>The implementation <bcp14>MUST</bcp14> send a SIGNATURE_HASH_ALGORITHMS notify with an 'Identity' (5) hash function. PQC signature algorithms that inherently operate on the raw message without preprocessing are only defined with the 'Identity' hash and <bcp14>MUST NOT</bcp14> be used with a receiver that has not indicated support for the 'Identity' hash.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with no context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with no context string, if applicable).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the PQC signature scheme(s) it supports. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm. For security level 1, SHA-256 (<xref target="FIPS180"/>) is used. For security levels 3 and 5, SHA-512 (<xref target="FIPS180"/>) is used. SHAKE256 (<xref target="FIPS202"/>) is applicable for all security levels. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the crypto library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the ExternalMu-ML-DSA API defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. In this method, the implementation calls the ExternalMU-ML-DSA.Prehash API with the SignedOctets string and the ML-DSA public key, generating an hash. This
hash is then passed to the cryptographic library to execute the ExternalMU-ML-DSA.Sign API, which takes the hash and the ML-DSA private key to produce the signature.</t>
      <t>These methods are equivalent, and so either may be used.</t>
    </section>
    <section anchor="pre-hash">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2, not just the method proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply one of a number of hash functions to the message and then perform processing on that hash.
Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally acts this way, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as current, but instead of running ML-DSA or SLH-DSA in prehash mode, we have it sign it in pure mode as if it was the message.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>Both ML-DSA and SLH-DSA can utilize their hedged versions when used within IKEv2. In both cases, the 'context' input parameter for the signature generation algorithm is set to an empty string.</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-x509-slhdsa"/> discusses pre-hash mode.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are modeled under strong unforgeability against an adaptive chosen message attack (SUF-CMA). Examples include ML-DSA and SLH-DSA, which adhere to this security model.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the security of AES-128, AES-192, and AES-256, while others correspond to the security levels of SHA-256 or SHA3-256. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, and Daniel Van Geest for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
