<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="12"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 77?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks. The terms deterministic and hedged  used in this document are in accordance with <xref target="FIPS204"/> and <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>The hedged mode mitigates this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time. This approach ensures protection against side-channel attacks.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces, cryptographic parameters, and identifiers. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints. While pre-hash mode can help in scenarios with memory constraints, the IKEv2 authentication data is generally small, and combined with other practical challenges (discussed in <xref target="pre-hash"/>), this document only specifies pure mode.</t>
        <section anchor="handling-pqc-signatures-in-ikev2">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>For integrating PQC signature algorithms into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
          <t>As specified in <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload (defined in Section 3.7 of <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the PQC signature scheme(s) it supports. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms without requiring software or configuration updates is increasingly important for long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the ExternalMu-ML-DSA API defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. In this method, the implementation calls the ExternalMU-ML-DSA.Prehash API with the SignedOctets string and the ML-DSA public key, generating a hash. This
hash is then passed to the cryptographic library to execute the ExternalMU-ML-DSA.Sign API, which uses the hash and the ML-DSA private key to produce the signature.</t>
      <t>Both methods produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="pre-hash">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2 other than those proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply a hash function to the message and then perform processing on that hash. Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. This not only complicates certificate management but also adds protocol complexity if a peer needs to support both pure and prehashed variants. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally follows the 'hash and then sign' paradigm, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as specified by the pre-hash modes in <xref target="FIPS204"/> and <xref target="FIPS205"/>, but instead of running ML-DSA or SLH-DSA in prehash mode, the hash is signed as if it were the unhashed message, as is done in pure mode.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-x509-slhdsa"/> discusses pre-hash mode.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are modeled under strong unforgeability against an adaptive chosen message attack (SUF-CMA). Examples include ML-DSA and SLH-DSA, which adhere to this security model.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the security of AES-128, AES-192, and AES-256, while others correspond to the security levels of SHA-256 or SHA3-256. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> apply to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Rebecca Guthrie and Daniel Van Geest for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
