<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-05"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="16"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 85?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 91?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC4754"/>,
and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8420"/>.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility, as it does not change the IKEv2 protocol but adds negotiable PQC signature algorithms. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>DER encoded AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. The terms deterministic and hedged  used in this document are in accordance with <xref target="FIPS204"/> and <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode provides some resistance against this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time.
This foils some side channel attack approaches, while adding no additional strength against others.
If protection against side-channel attacks are required, an ML-DSA implementation that implements side-channel resistance should be used.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints. While pre-hash mode can help in scenarios with memory constraints, the IKEv2 authentication data is generally small, and combined with other practical challenges (discussed in <xref target="design"/>), this document only specifies pure mode.</t>
        <section anchor="handsig">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>For integrating PQC signature algorithms into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
          <t>As specified in <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>For additional background on design alternatives that were considered and the rationale for adopting the <xref target="RFC8420"/> approach as the cleanest and most secure method, see <xref target="design"/>.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation as specified in <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload (defined in Section 3.7 of <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the  signature scheme(s) it supports under the Digital Signature authentication method. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms is gaining increased attention for ensuring long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which simplifies implementation compared to schemes requiring discrete Gaussian sampling.</t>
      <t>ML-DSA is instantiated with three parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms such as XMSS <xref target="RFC8391"/> or HSS/LMS <xref target="RFC8554"/>, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the Externalμ-ML-DSA API defined in <xref target="FIPS204"/>. In this method, the implementation calls the External μ pre-hashing mode with the SignedOctets string and the ML-DSA public key, which externalizes the message pre-hashing originally performed inside the signing operation (see Appendix D of <xref target="I-D.ietf-lamps-dilithium-certificates"/>). This hash is then passed to the cryptographic library to execute the Externalμ-ML-DSA.Sign API, which uses the hash and the ML-DSA private key to produce the signature. This document specifies only the use of ML-DSA's External μ mode, and not HashML-DSA.</t>
      <t>Both approaches are considered "pure" mode and produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the External μ pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. <xref target="FIPS204"/> defines both a pure and a pre-hash variant of ML-DSA, but <xref target="I-D.ietf-lamps-dilithium-certificates"/> specifies only the pure variant.</t>
      <t>The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. <xref target="FIPS205"/> defines two signature modes: pure mode and pre-hash mode. <xref target="I-D.ietf-lamps-x509-slhdsa"/> specifies the use of both Pure SLH-DSA and HashSLH-DSA in Public Key Infrastructure X.509 (PKIX) certificates and Certificate Revocation Lists (CRLs).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are generally modeled to achieve strong unforgeability under adaptive chosen-message attacks (SUF-CMA; see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). For example, ML-DSA provides SUF-CMA security. However, some algorithms, such as SLH-DSA, achieve existential unforgeability under chosen-message attacks (EUF-CMA; see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This distinction does not impact IKEv2, as the signed data in each session is unique due to the inclusion of nonces. Consequently, the oracle-based forgery attack scenarios in the EUF-CMA model do not arise in IKEv2.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the NIST post-quantum security categories (Categories 1 through 5) as discussed in <xref target="FIPS204"/> and <xref target="FIPS205"/>. These categories specify target security strengths that correspond approximately to exhaustive key-search resistance for AES-128, AES-192, and AES-256, and collision-search resistance for SHA-256, SHA-384, and SHA-512. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure. ML-DSA does not have a built-in signature limit, allowing for an arbitrary number of signatures to be made with the same key.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Wang Guilin, Rebecca Guthrie, John Mattsson and Daniel Van Geest for the discussion and comments.</t>
      <!-- Start of Appendices -->

</section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="CSOR" target="https://csrc.nist.gov/projects/computer-security-objects-register/algorithm-registration">
          <front>
            <title>Computer Security Objects Register</title>
            <author initials="" surname="NIST" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2024" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC4754">
          <front>
            <title>IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="D. Fu" initials="D." surname="Fu"/>
            <author fullname="J. Solinas" initials="J." surname="Solinas"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE and IKEv2 without introducing any changes to existing IKE operation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4754"/>
          <seriesInfo name="DOI" value="10.17487/RFC4754"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
      </references>
    </references>
    <?line 257?>

<section anchor="design">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2 other than those proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply a hash function to the message and then perform processing on that hash. Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. This not only complicates certificate management but also adds protocol complexity if a peer needs to support both pure and prehashed variants. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally follows the 'hash and then sign' paradigm, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as specified by the pre-hash modes in <xref target="FIPS204"/> and <xref target="FIPS205"/>, but instead of running ML-DSA or SLH-DSA in prehash mode, the hash is signed as if it were the unhashed message, as is done in pure mode.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
      <t>After analysis, the IPsecME working group selected the approach defined in <xref target="RFC8420"/>, the second method discussed above as the most cryptographically secure way to integrate PQC algorithms into IKEv2. The details are specified in <xref target="handsig"/>.</t>
    </section>
    <section anchor="asn1-objects">
      <name>ASN.1 Objects</name>
      <t>This section lists ASN.1 objects for algorithms mentioned in the document in binary form.<br/>
This section is not normative, and these values should only be used as
examples. If the ASN.1 object listed in this section and the ASN.1
object specified by the algorithm differ, then the algorithm
specification must be used.</t>
      <section anchor="ml-dsa-44">
        <name>ML-DSA-44</name>
        <t>id-ml-dsa-44 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-44(17) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-ml-dsa-44, oid = 2.16.840.1.101.3.4.3.17
Length = 13
0000: 300b 0609 6086 4801 6503 0403 11</t>
      </section>
      <section anchor="ml-dsa-65">
        <name>ML-DSA-65</name>
        <t>id-ml-dsa-65 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-65(18) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-ml-dsa-65, oid = 2.16.840.1.101.3.4.3.18
Length = 13
0000: 300b 0609 6086 4801 6503 0403 12</t>
      </section>
      <section anchor="ml-dsa-87">
        <name>ML-DSA-87</name>
        <t>id-ml-dsa-87 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-87(19) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-ml-dsa-87, oid = 2.16.840.1.101.3.4.3.19
Length = 13
0000: 300b 0609 6086 4801 6503 0403 13</t>
      </section>
      <section anchor="slh-dsa-128s-sha2">
        <name>SLH-DSA-128S-SHA2</name>
        <t>id-slh-dsa-sha2-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128s(20) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-128s, oid = 2.16.840.1.101.3.4.3.20
Length = 13
0000: 300b 0609 6086 4801 6503 0403 14</t>
      </section>
      <section anchor="slh-dsa-128f-sha2">
        <name>SLH-DSA-128F-SHA2</name>
        <t>id-slh-dsa-sha2-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128f(21) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-128f, oid = 2.16.840.1.101.3.4.3.21
Length = 13
0000: 300b 0609 6086 4801 6503 0403 15</t>
      </section>
      <section anchor="slh-dsa-192s-sha2">
        <name>SLH-DSA-192S-SHA2</name>
        <t>id-slh-dsa-sha2-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192s(22) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-192s, oid = 2.16.840.1.101.3.4.3.22
Length = 13
0000: 300b 0609 6086 4801 6503 0403 16</t>
      </section>
      <section anchor="slh-dsa-192f-sha2">
        <name>SLH-DSA-192F-SHA2</name>
        <t>id-slh-dsa-sha2-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192f(23) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-192f, oid = 2.16.840.1.101.3.4.3.23
Length = 13
0000: 300b 0609 6086 4801 6503 0403 17</t>
      </section>
      <section anchor="slh-dsa-256s-sha2">
        <name>SLH-DSA-256S-SHA2</name>
        <t>id-slh-dsa-sha2-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256s(24) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-256s, oid = 2.16.840.1.101.3.4.3.24
Length = 13
0000: 300b 0609 6086 4801 6503 0403 18</t>
      </section>
      <section anchor="slh-dsa-256f-sha2">
        <name>SLH-DSA-256F-SHA2</name>
        <t>id-slh-dsa-sha2-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256f(25) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-sha2-256f, oid = 2.16.840.1.101.3.4.3.25
Length = 13
0000: 300b 0609 6086 4801 6503 0403 19</t>
      </section>
      <section anchor="slh-dsa-128s-shake">
        <name>SLH-DSA-128S-SHAKE</name>
        <t>id-slh-dsa-shake-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128s(26) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-128s, oid = 2.16.840.1.101.3.4.3.26
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1a</t>
      </section>
      <section anchor="slh-dsa-128f-shake">
        <name>SLH-DSA-128F-SHAKE</name>
        <t>id-slh-dsa-shake-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128f(27) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-128f, oid = 2.16.840.1.101.3.4.3.27
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1b</t>
      </section>
      <section anchor="slh-dsa-192s-shake">
        <name>SLH-DSA-192S-SHAKE</name>
        <t>id-slh-dsa-shake-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192s(28) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-192s, oid = 2.16.840.1.101.3.4.3.28
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1c</t>
      </section>
      <section anchor="slh-dsa-192f-shake">
        <name>SLH-DSA-192F-SHAKE</name>
        <t>id-slh-dsa-shake-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192f(29) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-192f, oid = 2.16.840.1.101.3.4.3.29
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1d</t>
      </section>
      <section anchor="slh-dsa-256s-shake">
        <name>SLH-DSA-256S-SHAKE</name>
        <t>id-slh-dsa-shake-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256s(30) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-256s, oid = 2.16.840.1.101.3.4.3.30
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1e</t>
      </section>
      <section anchor="slh-dsa-256f-shake">
        <name>SLH-DSA-256F-SHAKE</name>
        <t>id-slh-dsa-shake-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256f(31) }</t>
        <t>Parameters are absent.</t>
        <t>Name = id-slh-dsa-shake-256f, oid = 2.16.840.1.101.3.4.3.31
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1f</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
