<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-03"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="29"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 77?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks. The terms deterministic and hedged  used in this document are in accordance with <xref target="FIPS204"/> and <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>The hedged mode mitigates this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time. This approach ensures protection against side-channel attacks.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces, cryptographic parameters, and identifiers. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints. While pre-hash mode can help in scenarios with memory constraints, the IKEv2 authentication data is generally small, and combined with other practical challenges (discussed in <xref target="pre-hash"/>), this document only specifies pure mode.</t>
        <section anchor="handling-pqc-signatures-in-ikev2">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>For integrating PQC signature algorithms into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
          <t>As specified in <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation as specified in <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload (defined in Section 3.7 of <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the PQC signature scheme(s) it supports. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms without requiring software or configuration updates is increasingly important for long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the ExternalMu-ML-DSA API defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. In this method, the implementation calls the ExternalMU-ML-DSA.Prehash API with the SignedOctets string and the ML-DSA public key, generating a hash. This
hash is then passed to the cryptographic library to execute the ExternalMU-ML-DSA.Sign API, which uses the hash and the ML-DSA private key to produce the signature.</t>
      <t>Both methods produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="pre-hash">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2 other than those proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply a hash function to the message and then perform processing on that hash. Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. This not only complicates certificate management but also adds protocol complexity if a peer needs to support both pure and prehashed variants. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally follows the 'hash and then sign' paradigm, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as specified by the pre-hash modes in <xref target="FIPS204"/> and <xref target="FIPS205"/>, but instead of running ML-DSA or SLH-DSA in prehash mode, the hash is signed as if it were the unhashed message, as is done in pure mode.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-x509-slhdsa"/> discusses pre-hash mode.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are modeled under strong unforgeability against an adaptive chosen message attack (SUF-CMA). Examples include ML-DSA and SLH-DSA, which adhere to this security model.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the security of AES-128, AES-192, and AES-256, while others correspond to the security levels of SHA-256 or SHA3-256. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Rebecca Guthrie and Daniel Van Geest for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1c3ZLbyHW+51N0RhfiuEhKM9LsSrNOvNzRSJpa/YzF0W65
XM5Wk2iSiECARgND0SpV+TVSlYs8Sx7FT5LzndPdaIDkSGsnuYrLtjAg0H36
9Pn5zk9jOBz2qrTKzLk6mqSLXFd1adS4rpYmr9KZrtIiV2mu6G91lVemzE2l
fjRbdflxttT5wqifTGnx0KnqX/14eXt6rGqb5gt1/fuLo56eTktzS2PTX3tG
5ReOenTDLIpye65slfR6STHL9YooSko9r4apqebDdG3NbGWG6Qdzezpc/3k2
1DRaz9bTVWoxf7Vd0xtXlzfPe3m9mpryvJfQsOe9WZFbk9vanquqrE2PqHnU
06XRWLGZ1WVabY96m6L8sCiLek133VxHvQ9mS/eT854aYjn4hynGxbN0kVY6
U4FpuPn61fDZZIyryauXfNm7NXlNVCi1M7pSQvPRzzQ3OPYCT+D+SqdZ8+T3
YMCoKBf4SZezJf20rKq1PX/wAE/iVnprRv6xB7jxYFoWG2se8BgPjnq9nq10
nvyisyKnObfG9tbpufpjVcwGyhZlVZq5pavtyl1UZTqrBmpWrFa0Z3SHdmWl
12si9E+9HphflGAM0aTUvM4y2bKbtKxXOjN2o0v1ziTJlh8gsnSe/oU3/ly9
KT6kmu/PiPnn6gcSJCIMPKT/lGbBT/2oS+Ks/uCeLOq8gohc5Yl72Tg+fSjy
pErL7xf4e0QUH+3S9RPRVG7VZLW1WXG7h6bLVz9dTYbXr95P2tO9q0m8dK6e
m8SU/Gxrbnur8+9NdpvaUVnvmXcyK6pKPc/qZWnKPdNepHZWqMnWVmZl2yPP
5aXvZ3hEltXLi3JFb96yRL17fvH07Okjd/nt49Nvz3u9NJ/Hzzy/up6cPnx8
zkMrr+m4q3BbvS6SOjPDV7oivTTDH7Q1ya5sqwmER5fJkRtHlwtTnSsvhvlt
tq6ndpSnthotitsHuMCdB5jpwZuryc0IVyOac7RO5kqGYQVVc51ZE0g920/q
2TloqAxJllUvtV3+H5B6diepJ08edkjFuwPFNsUwjYEW1Z+8nBwP+D11/f4H
RS8PHw/IIi5qW9HyTs7+UXJ5xC/w9nQ/wS/Hw0eB1HN1bcpVXbF8OibzWuhn
MvqVoaemJDFvayKDJLvOZ3jSRoujiVpLG/3qtc3JbPFfI1zRVpweXNmrbf3w
qVtXWNhPI9yfEtnm1n7YDtTf/vofz1NdDSdLvUpL9XNaLdV4SmaPvMJ4vc6c
T7KqKpTTBV7wcz2ripJsnuNEEDNLI9IiJ1fji3d/uL6hdT58euSp6Kxzs9mM
Uj0rg3Em3XygLW5t1xXefHD29ITk7ek34QLrdcO110ua/uTxKYnekDw3/k/p
KRlrorPXC9QNp0ytbjvclSGjnVjyIUbVVZqlf6FnvBdWnz79Dlbk9Ok3nz+P
1A35e5Ljkl5Xt87DF/NfBQPWZUHepciUrddrsJr8r05SkEIKmzjFtYGjo17v
ZplaOJoaPkfZtZml89QQxWphckMeidaA+VK7UmTmiHgCDrDK5D3Xha2Gf651
XtUrxZwt6Kf1kl7qk/M+3p1R6YxQB4nCymKkQlbHzPC0CyPI7ZWFnpEOZBl5
VZ7aGr1iY5Tms6z2/NH5FkghmsPOlmZl1IamcTDKfCTBBsWd7ZmX5DGAQzAQ
kzFS48QzLCMpTitV1FWW5sSSZbH5SuNtVV9wyTGL9NeZUXrJQRgyWzPyf1Mi
fLXOii3kyh4SrWiZbUYO8BLd3qqlvjU0msmVdSaH5XC6VWzMRKZXaZJkpte7
B2kraZlsZCAgB+RvQH51jyATzyA9BOSUXpTGsFyBC9YhP5UT8qxSWYUn9jtw
ml6swRpsNt43RO40S+2Sx4DaXNMgIyLHL/eX8fubl7S9niLcTvMUo9MYmJX4
uiawYiC5iVmTLaWxsi1Rk5mZEEZz4kUyUmtCYoY08IAeD9SGZHtJYHFLoj2n
R4mr1QaMXRtSRhHdFWkFgzh6b+8wWOeuLjoMrwkP0mNQvEijtiOlLsQ2QCrv
1mq2NomZk9AKL7FAJyaeZ4SyJuPoncEetz72uqr6LMqHHT8emIisX17QsyMl
csN6Z3Ky7FBUdRGbCOgXwdXMEJyr1O+dFbkoVuTjiLH9i3ewIJuizrCJvIMW
ejQs5kNi6lCXVYsPEeMiI1NMbZGZSlxLmrMMGuwT7QH9d2pm2m0/DWDr1Vp8
kp6S1jtpYkuvp2S8SXadQSa0RzZGY2MzyDC55xUrm22ZuNLQGovcy03BIkPR
0TyFFCpau8ksxgy6URWJpg3OC0VRw4KeJkNIY8R2LOInsWhELKNl/bn2orE0
tDGsgiXdTUtRQDK19RpuLWicdSwhG0jOjLQdG4rHaAktw96sZ6Su9//AErd/
AxIDISNBpKHJoMkGkGXQtBkVr8DCTm1Mhi1Us4y2gbk6c5LgtCre6rarWZfp
KgX4xgboisxLmK0060zPxNTBR3QoTgjmU6whLpls2NXwGYd0FOzW6ZpDXpMv
SI2ICvLQXWcpKhZcJWTQey2anpxUUZITFleJ2b/sDcWakrBkEDG6Rf/D23C6
ZbGmOZwYYuumevZhA+UDp2gW+el/3IF9+uQCms+f/z5nFkY4oxF+tV9jlnzR
lUE53k/UG+0k5IqEK61IfKAo3kqJxN8QnMmLrFhsVR/u75j3hvbt38gfjHoK
HpBU6hYksSmgd55hp5mpVgwbvBPyFFYdvX4/uTkayL/qzVu+fnf5+/dX7y6f
4Zqw/qtX4aLnnpi8fPv+1bPmqnnz4u3r15dvnsnLdFe1bvWOXo//QL+AqqO3
1zdXb9+MXx2JfYhlU4syT43IDjm2irndI32clelUZP6Hi+v/+s+Tx7RD/0T+
+/Tk5Cltkfzx5ORb7PiGtkZmK3KyQ/IndqJHsm40vCogGu3rGgJgeacsCVqu
YIhIZ37zR3DmT+fqt9PZ+uTxv7gbWHDrpudZ6ybzbPfOzsvCxD239kwTuNm6
3+F0m97xH1p/e75HN3/7O6iYGp48+d2/9LqGgkwqiS/FeDa45QMGpxout9My
TYZ4OhUxRWzwnLw4ZHxdk0nBaOyHojkGDj8tTbae15nbe4SNuEzSW/I4HbvZ
GJ+eQPFNIebX2PNe72jcmPObyPa2fHgDEY4oqMsPgJd4LiVhEuciKZAgBzeX
eM+y6g4UK5qhfwz5fRhoSC45w4X2Hr1U5CtSctQzhEu3Zt9Tg696hoYiD62h
GXsdOmDMEbs8D09+/XrZJTHSyFJy9wf8IFljsuYeA4aQyrvAL3rIQ34Z5pa0
kqcE4qL53VNDstEpbGgFNvibVs9Ny+FfftRkqkXgdt/c9WgSe7kQjUROvIg4
DvEHIxjYF85hPg8BGHDqHRnrnrjGjq8QlE12qQR3LcRqDxwmjlM8nc63AugA
vRyUw/t1zqMhnI0wfIh5W/aybWNNDv1ix8SoKQpG73D17NiALlcFxRBbTExA
wQdv7OTZ0UD47t1TE47Itx5D7EHntudy5LzbIESX05TwUrndDzW0ba9KDD6S
mYjeNgwgsaajHa9+dCCgsTWRTXpNzCBPc5sWtaVN8bYuImKvqyfI8hVsc8ih
gVUmcerCtO5hzJGzIulOHLbW26zQiXirlkkOjBgRV8NIVywzNFqpxpM3oxMK
K4AWAFJIKadGwlaA5zwlJA7ALm90UxPNclySAorBhl1DExD4WAqzScOLWcpL
hLSQbR+JMISBRIF4MRjiJ8i3X92nezTh516vNbXlqJVIFaxayYJNiniBWCD+
BlmSGezB0iQLWMWCtjTE2+2n8JsE3M3yoB1ECcwcls/hz7wsVhIzEWbUi2bJ
HBeUf/vrv0No0lvEJgSrBkE/UpeGwBbPaQFLVdKrxSoH9iSjivd5+9MVRXQ/
M2hmBSVbQFTSeByApZrjJfCJ4ifkMUjAZCQlZSvPElp3/92bF8fiS3PyFxqu
1tZ2ZtYeX2OXLe3uEAYiN5k33QNsIfGlznSJVes6wyAQE94kecrFMg4KxOwE
VxzXRZr2QjqI8owUIOFFsWx08XmEtn3cKRLOTN+1xy1z/7zmfTwgtCJDOinW
lct/gK68IPLIK+HZgZrSznmtMB/JeFWiGfMCiTzZeJJ0bHk+S+FaRgKpI5FT
iOcWvIHMAkIHHxDCiVNhU10a5/2SWCpcmCySdb8lVy7ajWOyHaFqVGNHvBjQ
hfAOxc2SjV1R+Q12nnyfbNAKnQpR7F+REHLIf3fmuAl9WPV0pZvcmKOT00V7
bCbSaGyH+GEDgkmOLcMrsnci3PDO1t8furzvTIVaFpFga+RfLW0wCRsJeCfs
9hbLSnyQBhsJPHJIgGDFkfYoYQmqZttvCZQBUcRRH8TG5EsW9ZAguZPPkkNf
Fqgl+MzcQTXzG8xGjtTMYKXEGwqmZ9VuyB2nim5jc0tCMIP0lCgj5rYRcXB/
WpCKusWxHEj+6JBX4EhBq/tOTu4TGSj5BF6zaeLwiTEk53Vg11ZrohAF5HxB
k1yYEpmDuxMOrkTAsJ9ZcK6O1uzjWQU5wCQ1Gy4pypd7EoYYQYSDyJT0vCnx
Y/KqG+eBYSN/wYvLGRW73FBCrmKGrCxq5Quxa5bMCu0KeEorBQc4Hx0JKI+N
wZDBGihPrNCf5rdFhpyQ32bWFGOrkMITd+RUe08FxMG6Hj0fFiB1iK/V3AZK
ed9395J3Vqtaq73ZMQQHZ+5CvImzUqejkzMwwEE+l7BHvwapB4N8k3HC0O5o
/+T6yms6J9izkHb3q7OqH65goA2bap9xPvbeiFMT27XLADuFTwg1zjDSqiDY
CoJoV1PojPPs7d2FGUGoi7WRd85JwQpJGe0ZYhAVRzocY3am3vKDHruif2Sd
5GGmjAx53IKR0hrJYIm+loincl52J5Hoaf38+XjQceIcrTQyFgSL8d099ZLm
zXawvm3CoN7zTg3uoKVtEoqy/uC8ahuBXRQ2CTik1jlokxAlYxtI7MLigej2
XXUWNk/WOJQ3uXrxZnzz/t3lLy/Hk5e/jF+9ePvu6ubl6wmMLQCyw+Kh44nE
ZTL+5erN1U0jYJxOTbBpok6wfCSrLA/RkjlD6G1QS1ODy3R4OTbgolhfTScM
Dtt5rbJUzMnpsCCYU3XoiT3iII4yeJnjN2N1JDLJtf4mnDvidhwS3u1Itvvg
FktuIV8aqQu54NE0tqWQyUq9CRbIo2vQSvIzCHq+iwwHIq0Y4f6Vi5rvyyLn
rgdBCSpCMZ9CYeHkwWf7tzojUHJ2LHFC4EcwTmKZGqkUYyP77lYrggefGJlU
lmhth6ltogdE4u3pmU6SbxBZGhIPckcpXBkU0/UiOOGBYjFfDrKehdwnOfZx
qI9l5l+lAoDdJazLimk6OKfUc3zE253QJ1VDOMpWS3NWQ3i31A7hOJYmLV1h
qfS5ER6RyE8r25F/ksmfyYK2MWhDrpv0wBpiS9xmvar0B+dzr7xdmbCnfAvV
sg7cKEfoO29t9j3T1w6qE/ynZZINzoqFczewSwyBXe9B2lpxXzxUZjSQAz1F
ssMWKDke+LgV2QPkSAVHu2H8elGwsy2P79J94vT7zB5Baz4UEKJJFOeRJh2L
KpFRpTCSpTFG966oFWZv0gI/sYZJ2sPhnE5C7bq9jZIY+/9d3IPKxUcc2lH3
66/a057LYnKiMbY1fvKd/FiThYy8Rxrcs3vOlTrCXri98QTPKdhqtkjvOHeG
go+ePIJ3r3Mu7ckAZU0msbgFCySTwuUECpgtW42+GS1GA9f88fTR6VPCO35r
a2xrxoKVUyCGDC+R/SFHYQgZFGd4bD2nVaTivjI0canXN+9tsOJt0lNra0BR
myIk5LJdPSXuIr6XQl2U7nL5Qob/4FQzBZtDMLKwpsm1xK0EUUaktyfmGT5+
7IvrgAENEdC5k8Gjk1M13cJlgaRYr4AVBuTb5OeBq/RSOOzyFsCeCFFCPBVr
vS4L4qr6dvDk7BsZYKQIqS3qlLNBA9USriU3TnBPA6muQgC8qlfqmtjLVJ4+
cVSw8b+6vv1G9Qk+uN18cvrwIXaTFuDDmMws9GyLJx/7LXV1f4kffK/ugAPS
+RxO/Za3E/OdfftNe7rH8XQnJ6enNJ0kOV97qZdn2bgxJp6I0NB+oQ3pWqel
utmujSvJCn7lgL4ZwAkBb/J063jDGTwMykxHRzhHPndGy9jJJuPRQprnvd5Q
IeQWhYRZ+3ONXXSm9ly9zY3PlCNep4BF4vOAaCA6a6wHxHTA9QaZA4Fx3lyi
j10aNVL8QnKxgLneR4NHrf09eOvR6NtuLHgM01qBVS0iOpF/m0DwWCzK1iFS
NObUiCdnDUVWtJe3Qcc/KGlsh/XuX4yPZQjsgQ0IJiRWv9xxuGfzfLfPap2l
bRgZr8BncSIL0qQDfZ2B3mx7wdJgOV7wWpvEW93YcwMsZbK5b/Nq9ryb7GdL
ECz0vtZGdOx1/fprka9xnpOVmLEbQIlSotam7wxyI32ogrTRzQ67j/+QWInn
9IWtoC6JmWW69F1yNujhoXqOZ3hZsAfuptLQRdCyVhib26IWdenZsALyIXGj
bTbs3qGvja767LNoTIfVnPPkpQccFZoAXeZTq8n76+u3724un3F64pfXlzcv
3z5zmLx7DCcKSmUsG/DAgMPA2It3t6tvj6ETvidXSGqkL5DEUO7riHJ1m1YX
ZOlU3rt9Hjo8cvXm5vLd68tnV+ObS/+o26jW4BkngvxSDhV4saRGDLrmApV1
YrazudxTiaY1lwaPHK3IQGLQDOTOvIhAFPOKRIRVdpbCcQM5dIpNrVwHW8PQ
W4AETCRPsRkaiG2iuxdjl89yklhgLjjVl8UGGepuwlsvWHpdNqWpBvl2VhOa
SRvpPNRxEQBOE9NZWvMGilCUQRdkS6Rxj/sVXVWKnkeNcQX+I2sOP4k0IreN
RLlyjp/byuf2PO4NnKKWQuMzDkEMCrAnbZnBIKVRTzAUsN1N5zFC0Nm9u8SD
3eqSUWEg0jVBsoM1Jac7ge7IhSPVRigbeXupPEWdfY3wMT7lIg0aC6JyuUto
tCoKn+6tsmFi9edez/0cl8+4a/KuGnQQMK5c6DLhslHmTi+EPlAmacWNdv5H
q/rpyIxEeKQHT70yuuTUNDPmsiyL0vpB0H/38+WxiwOlidJHdFGGybZJOopP
XGyaExdHtEw+tUGLbHre/Z6KnsanN8TV+ToNpMXXMS0gABu7wnfluhUOHSnP
J6EJhBsTZ1H3txn5XXGFjpqwOe042nMoZJrWIl5gH2Nh3yQkSFAqftIwYXzc
wMpvwDsKydBJZJsubR+Lulo7FEf8coiURkEOWLm4qyVyxY/adXkbEiVBet05
SgCL04F6JAblTPWtMeqG46XTGHKdPBTE9YVWU9p2f04SArGG/RLH57N03e5V
P8HT7vgZbZgdJtD9ZVqvhrEtlFMnd1Y/vMz5eRvR8yrFaKo0pqvR502wFOKm
b86EQe7PJ9+iyaWttT706aitzZZOb/0DcVepgzTWl5dQr+caa+hVRWLAlWui
4y9xAYnDAjyP9rl99msQaIsaDDAhmyVIRtyyy0O1yqlJHXJ3viblQOcojJy2
G6ZZ6+s1Lk//9ZvHTaGFLXslDeV2P//FckQxixyhaVvdk0hmN7DgMwTFHKID
vKFpcHw5GVK0OJCLp6fyOP44RRyaVu0GdsAjCf3IQ/3javCV4rnTy9CST4aD
vGLS90uph8d8UP2ID8ehrxuVUV+63bG95wjs2Ub1J8fhvJYE/HOIU/95uC1b
IU/7J9dlioFYaiXuj8sVFvcHMGFOZMir12nFnJxz26It6nLGKEfKXOgbuSpu
XCHNjqSHuaSQwyEWJmrv7Gvj3WibgIFkDdK/eLGFl/XIgeXTR0gtnQrwqZtK
cwizCXJaDEEJikj02ZnwVEy3xKHttL4c5OHEQ9s5sovBSUvIaV/MxckTTmvs
qoI6kZ56FLf8O1wKoeuzk9Mvvm/JV7D4jNQ44yYjUQE+6/njZUTC6UOkOlqZ
CT0rC/Q0ETe6Shz8E4FFB49sYy1yIfhwmUtnaeIys7R3g7iPtL3Xo6bok8ZF
dWdhvIQiaGXZ5D4fl03riO2om4+ROqqrsMRnk2ARdq35ea/3G38flmcyJBae
tu8937n39HT3uaenO8/RRuw8R/d2x3Pz/ni5Z+L2TTdz9+buk37u7k3/ZHBt
TS+KR2hkVHKzaSBnc1aJhGhbcE4b2UxfDPSJ8SgN29IauD4C/nWaJZYcDA0T
ztqxL6P33H5BGqJzaMEmkfeJksJcAS6mOH58KGT0wehct48vSXnfN0AjAnV4
0nlrhyWz9IOJ0c/Mn4ZTy+0aob5U5V1uhy0VTbKBkWPr1eqVl5qnb9xL57QQ
zWdz0QuBvCmgZlms0nAy0Otl46r9yTRu2ahzzRnPEAzbZklJLQXsyjLMpRCu
arebR+x2Ds/3l/lumTRH5izYBvhb+XyBhE3hRBfDdp/f8YTCWO09+ntPXbWr
N5HlErjgPq7R48Pb8oc/YcbpoE0Rxbq+wUA6rgPEjjGPyINHPWIm0hJF9Ny4
7JTFiyjk+P6BPaUhJ9zt4DpLp9zyHLsllrc6i9b9nYiCZK85veyRg1hGZ7yI
1VCq0DMRuomajuNL10v6uh46sRxfXx063/ElFH7l6jr+nCmH3O3NQeXLtmd+
72YeXZeG1RsUBMe5j3Oeq47ipnIxaBd0MZrIYk9KwTYqmiVf3ADzkUTV8X+X
WhAGUn2gJsdjOKJ2Hz2ISYxaOAWVsj1sSRSiiB+45cydHWs9hVY8N1gE67G7
pUjHNk6S+C6GThchQzA5P8xGqrM5TZLLNh0VGzJKPkvnW4IkNDBrPquDZh/j
UjR8XM9n0tqMdZkEElaHANBe/TGkxtw7++qxrOTPJE50iZt9DcB07SQI5H26
F/qX3EEm62C7jzgtw+KitrHOdz8OsGei6Ixj4TgT6nAIcwsGQ1OCol4Nm/3C
NxzQa+vL04Lv1UZHEZOrkOFkcx/z4mhPyU3f5AZZavl08vGo5/UtHtbhR7om
Q+mTqP2uJh2L2LDVAo9QAfYpfZbfUF8I9WP0XeztudgpRychwSB+hWNEHHR2
0cdeoOfMKbd+3shpI38aLHCm3QzVbSGS1chJY92B107VO837uRfFaHZJQkmf
CRmPNy5H7eQgj2ztHL5wlhmdi+4Vu5uB/gSYYeOC243esnvQSVICAIm1TAmX
VrOlR5y8jFYxUgyXdh2pe0TSR7lrkX+TdDI+cdPiTmQewnG37FuwlqBEspUj
qm5ElIiiswcSuVGc4Bm/yKR+69a0WFZY+EogD71J9PFrWS3tak2AxQm6bH9T
ImmoNYSlT0b8EZebZbxIF0/ZQxZBzna6Q9Saz3EgUonRH6jLXKaw00e06qDG
4BxSyWIjfcKp2xLA6RYf1ILd7Z1GpEaFfa8TEfk+Km9n299ePWuyfyRdbmNa
Vch5+GiFADj3HQd3SiXuCPANnw5cNcUSaYsDRMzcoHE5c6VzkglJrKMPDafv
SGpt83EWftN8BJJDg4h0aCGJZOPWCJbYtfdVu2vvHvTmful9dVUwvX8xJsvF
OfSi2S5UZDlA6zKomc1Hn43yOjgrsNjvJJ8JYYfzSPZwAmqIk6UVvYj8VWMK
deQ3mTBX1W5vdlsh2wBNMCO9anirfUeFbDB/uQteVUJRwRj3Y5CRsx7f5ykI
Iq/YbiL6yu9j52B0Rr3LBMuGEUcrxwpff4u6i2H1QPrGfVHOm7Umy+G/kfGF
mTlJLsY2fK4mboZ0lgqQn0gLQL3zaRJf9JAoxtEyd01OI9hUF+BIC0Lmj/NI
VxGgEtZFXnz7nSI7JcnUMncDTk2o8IudmhopGEGLUKKvIv0KUARlDXcQifcq
GEmWjNh2MKvdDhNFxDTaAmzyBrNupO+bRUYaKdT9uf4QZIU4dv+7lnK3AgFh
f9z95JBTq7XcCnS/40zVlM+mEYjT3GNX1nke4Z1IU9LcUxYdfvBw2kMWCxuQ
VpJ9lZDdyX2oL2s2mgnHSHncMu6/YqLVbVpk2tfmpIEgJdXn2JYVa4kGngpK
RA/4b9EN8JU30tfgUAQ1uLPJfU4y+HBnp+2X5KTIFw7CsEeH0Y+lP3SKB3l2
GdkW6MLrvL3iMCJP4SSeCGxbuihs806zMfYbc7+EMdmo8LUfxSeFsyxlDOxP
L5PJ6W/coUHuEKh2ksktzImj1+QJJWAIUMBZrSl3991T7yUlvetSXYCyx9fK
R2G+7pTSSP3Ax2pxuDAcwHGlNPe8R+Tx6RN32lHar0sxm1qdnn0znKa+WTHq
dhG88k5e+oGeeBGdj/zhhatJ7sWiQUCiigyqzdHBzea4i+he+4Se00eHKhst
GPkTdG1GOWc48KvyeumPRomhRiXbr/YvFOj5k1IE7Nmcc5rWbQcsjO+j/7oD
sv6rT4k7/ypPNuZF2E5SQXb2l9J31OXhT1E5R+88/cg+Hq+4/sqqgUOWK03+
QG2DkY4b+v02ds+Xxp964vRS6GgKBx19sBwaXTeuqo1YOjrXFsXdV3nMiUFr
Tbp1wFLWNGid6tVBrXFcmALA7f4jfzSePxGq1kXlmoFaJwBxRNR2Gmz9cfio
WcYRW3R3NC7z7NHRO89a+S61BsrIN7eC5YwOtvY/fcLZbG51FCe3p3LXqfOG
YyQkF6n+8qH0wZ4W319RDm61r8SZe3xJJ1jG/xWyPp49fDq02RKFXqLlkMX0
x5k3RWSE3BHG5qSeQ83DyP/uEnCHm48LmY6WO5532x/NzwW1LgH0Uu7E8as3
hUPnu3kVZWZaM/I3JJpWgos4NLadDwR0P46F95Gdqt2n1+Dt6Q+S7YUJn6Hy
ny8hSJroNeNRV0EOCQPOgqv+5P3z4cXr8XH0SZHD3wgJUXciPswlCIKeMG2k
Qs+CpO7ru7M7UbuP9rsKx40qpf9aDvLAw7gecuh7Y522WI7AwtQZMgRNFBDl
7u+sqPsQhqNPUFa65kWfidljLHzBErjo5fgRrltJTK62HPwQxdJDe3SSN24L
fCvjqoPUSbt9WlEjWVOtvLPnY2dXBAE1LTXNZjS5bFnhA7+8A90IbZ3d9e5g
+6fJ4Pnn4SfU+wZcd/s8iMt2+36OJBPT7D7y9yzp7r6K1krEVxxQ45Cd/VWN
P85+dR9vWxXJCAbta505aeol3izLIQycFHBJAd+1EjcHcMhCER8+ncnJWgxc
uKMfDEe4C1G7UMGaEmY0KGMTRLgvF/CXQCS7BiFE5YgCU8XwTSJdIHQu79nK
nR4quR+EsGCf3j15qMiYZdxJ0LR+r2X3CoA1BGc8Eg2QZXzESYz72RO1Nbq0
DhDzsl2lRM4XuoCCriQ7x4l+DjRyCCUHkp0DiEjRuHlK2M1GY2sxp1agxkxz
MpC/8ROsotFWUqf31HiGjtkM0INVs/fpXD52YpJ/PuIPGx9xdl/nHziFMqko
qiA+PjPqIi+SBNHgq2Khc03uXP2Ez63nSYkmi2sKPtTPRS1ffhjTXZqW35/j
23DPaJCf+fDTOzM1s5lWLwg4UTwnH9LTeUpG5Cd66IUBJ3xuL2mKFO7otbco
/w0L9DuuL2EAAA==

-->

</rfc>
