<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-shbs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="HSS and XMSS for X.509">Internet X.509 Public Key Infrastructure: Algorithm Identifiers for HSS and XMSS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-shbs-00"/>
    <author initials="K." surname="Bashiri" fullname="Kaveh Bashiri">
      <organization>BSI</organization>
      <address>
        <email>kaveh.bashiri.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Gazdag" fullname="Stefan Gazdag">
      <organization>genua GmbH</organization>
      <address>
        <email>ietf@gazdag.de</email>
      </address>
    </author>
    <author initials="D." surname="Van Geest" fullname="Daniel Van Geest">
      <organization>CryptoNext Security</organization>
      <address>
        <email>daniel.vangeest@cryptonext-security.com</email>
      </address>
    </author>
    <author initials="S." surname="Kousidis" fullname="Stavros Kousidis">
      <organization>BSI</organization>
      <address>
        <email>kousidis.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="03"/>
    <area>sec</area>
    <workgroup>LAMPS - Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 107?>

<t>This document specifies algorithm identifiers and ASN.1 encoding formats for
the Stateful Hash-Based Signature Schemes (S-HBS) Hierarchical Signature System
(HSS), eXtended Merkle Signature Scheme (XMSS), and XMSS^MT, a multi-tree
variant of XMSS. This specification applies to the Internet X.509 Public Key
infrastructure (PKI) when those digital signatures are used in Internet X.509
certificates and certificate revocation lists.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-shbs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        LAMPS Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/x509-hbs/draft-x509-shbs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 116?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateful Hash-Based Signature Schemes (S-HBS) such as HSS, XMSS and XMSS^MT
combine Merkle trees with One Time Signatures (OTS) in order to provide digital
signature schemes that remain secure even when quantum computers become
available. Their theoretic security is well understood and depends only on the
security of the underlying hash function. As such they can serve as an
important building block for quantum computer resistant information and
communication technology.</t>
      <t>The private key of S-HBS is a finite collection of OTS keys, hence only a
limited number of messages can be signed and the private key's state must be
updated and persisted after signing to prevent reuse of OTS keys.  While the
right selection of algorithm parameters would allow a private key to sign a
virtually unbounded number of messages (e.g. 2^60), this is at the cost of a
larger signature size and longer signing time. Due to the statefulness of the
private key and the limited number of signatures that can be created, S-HBS
might not be appropriate for use in interactive protocols. However, in some use
cases the deployment of S-HBS may be appropriate. Such use cases are described
and discussed later in <xref target="use-cases-shbs-x509"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="notation">
      <name>Notation</name>
      <t>The parameter 'n' is the security parameter, given in bytes. In practice this
is typically aligned to the standard output length of the hash function in use,
i.e. either 24, 32 or 64 bytes. The height of a single tree is typically given
by the parameter 'h'. The number of levels of trees is either called 'L' (HSS)
or 'd' (XMSS, XMSS^MT).</t>
      <t>[EDNOTE: Should we delete this section? The parameters are not used in this
document.]</t>
    </section>
    <section anchor="use-cases-shbs-x509">
      <name>Use Cases of S-HBS in X.509</name>
      <t>As many cryptographic algorithms that are considered to be quantum-resistant,
S-HBS have several pros and cons regarding their practical usage. On the
positive side they are considered to be secure against a classical as well as a
quantum adversary, and a secure instantiation of S-HBS may always be built as
long as a cryptographically secure hash function exists. Moreover, S-HBS offer
small public key sizes, and, in comparison to other post-quantum signature
schemes, the S-HBS can offer relatively small signature sizes (for certain
parameter sets). While key generation and signature generation may take longer
than classical alternatives, fast and minimal verification routines can be
built.  The major negative aspect is the statefulness.  Private keys always
have to be handled in a secure manner, S-HBS necessitate a special treatment of
the private key in order to avoid security incidents like signature forgery
<xref target="MCGREW"/>, <xref target="SP800208"/>. Therefore, for S-HBS, a secure environment <bcp14>MUST</bcp14> be used
for key generation and key management.</t>
      <t>Note that, in general, root CAs offer such a secure environment and the number
of issued signatures (including signed certificates and CRLs) is often moderate
due to the fact that many root CAs delegate OCSP services or the signing of
end-entity certificates to other entities (such as subordinate CAs) that use
stateless signature schemes. Therefore, many root CAs should be able to handle
the required state management, and S-HBS offer a viable solution.</t>
      <t>As the above reasoning for root CAs usually does not apply for subordinate CAs,
it is <bcp14>NOT RECOMMENDED</bcp14> for subordinate CAs to use S-HBS for issuing end-entity
certificates. Moreover, S-HBS <bcp14>MUST NOT</bcp14> be used for end-entity certificates.</t>
      <t>However, S-HBS <bcp14>MAY</bcp14> be used for code signing certificates, since they are
suitable and recommended in such non-interactive contexts. For example, see the
recommendations for software and firmware signing in <xref target="CNSA2.0"/>. Some
manufactures use common and well-established key formats like X.509 for their
code signing and update mechanisms. Also there are multi-party IoT ecosystems
where publicly trusted code signing certificates are useful.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>Certificates conforming to <xref target="RFC5280"/> can convey a public key for any public key
algorithm. The certificate indicates the algorithm through an algorithm
identifier. An algorithm identifier consists of an OID and optional parameters.</t>
      <t>In this document, we define new OIDs for identifying the different stateful
hash-based signature algorithms. An additional OID is defined in <xref target="RFC8708"/> and
repeated here for convenience. For all of the OIDs, the parameters <bcp14>MUST</bcp14> be
absent.</t>
      <section anchor="hss-public-keys">
        <name>HSS Public Keys</name>
        <t>The object identifier and public key algorithm identifier for HSS is defined in
<xref target="RFC8708"/>. The definitions are repeated here for reference.</t>
        <t>The object identifier for an HSS public key is <tt>id-alg-hss-lms-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>Note that the <tt>id-alg-hss-lms-hashsig</tt> algorithm identifier is also referred to
as <tt>id-alg-mts-hashsig</tt>. This synonym is based on the terminology used in an
early draft of the document that became <xref target="RFC8554"/>.</t>
        <t>The HSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-HSS-LMS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-hss-lms-hashsig
   KEY HSS-LMS-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The HSS public key is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on the contents and
format of an HSS public key. Note that the single-tree signature scheme LMS is
instantiated as HSS with number of levels being equal to 1.</t>
      </section>
      <section anchor="xmss-public-keys">
        <name>XMSS Public Keys</name>
        <t>The object identifier for an XMSS public key is <tt>id-alg-xmss-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   itu-t(0) identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmss(13) 0 }
]]></artwork>
        <t>The XMSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   KEY XMSS-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS public key is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS public key.</t>
      </section>
      <section anchor="xmssmt-public-keys">
        <name>XMSS^MT Public Keys</name>
        <t>The object identifier for an XMSS^MT public key is <tt>id-alg-xmssmt-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   itu-t(0) identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmssmt(14) 0 }
]]></artwork>
        <t>The XMSS^MT public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   KEY XMSSMT-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS^MT public key is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS^MT public key.</t>
      </section>
    </section>
    <section anchor="key-usage-bits">
      <name>Key Usage Bits</name>
      <t>The intended application for the key is indicated in the keyUsage certificate
extension <xref target="RFC5280"/>. If the keyUsage extension is present in a certificate that
indicates <tt>id-alg-hss-lms-hashsig</tt>, <tt>id-alg-xmss-hashsig</tt>, or
<tt>id-alg-xmssmt-hashsig</tt>, then the following requirements given in this section
<bcp14>MUST</bcp14> be fulfilled.</t>
      <t>If the keyUsage extension is present in a code signing certificate, then it
<bcp14>MUST</bcp14> contain at least one of the following values:</t>
      <artwork><![CDATA[
nonRepudiation; or
digitalSignature.
]]></artwork>
      <t>However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>If the keyUsage extension is present in a certification authority certificate,
then it <bcp14>MUST</bcp14> contain at least one of the following values:</t>
      <artwork><![CDATA[
nonRepudiation; or
digitalSignature; or
keyCertSign; or
cRLSign.
]]></artwork>
      <t>However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>Note that for certificates that indicate <tt>id-alg-hss-lms-hashsig</tt> the above
definitions are more restrictive than the requirement defined in Section 4 of
<xref target="RFC8708"/>.</t>
    </section>
    <section anchor="signature-algorithms">
      <name>Signature Algorithms</name>
      <t>This section identifies OIDs for signing using HSS, XMSS, and XMSS^MT. When
these algorithm identifiers appear in the algorithm field as an
AlgorithmIdentifier, the encoding <bcp14>MUST</bcp14> omit the parameters field. That is, the
AlgorithmIdentifier <bcp14>SHALL</bcp14> be a SEQUENCE of one component, one of the OIDs
defined in the following subsections.</t>
      <t>The data to be signed is prepared for signing. For the algorithms used in this
document, the data is signed directly by the signature algorithm, the data is
not hashed before processing. Then, a private key operation is performed to
generate the signature value.</t>
      <t>[EDNOTE: Should we delete the preceding paragraph?]</t>
      <t>For HSS, the signature value is described in section 6.4 of <xref target="RFC8554"/>. For XMSS
and XMSS^MT the signature values are described in sections B.2 and C.2 of
<xref target="RFC8391"/>, respectively. The octet string representing the signature is encoded
directly in the OCTET STRING without adding any additional ASN.1 wrapping. For
the Certificate and CertificateList structures, the signature value is wrapped
in the "signatureValue" OCTET STRING field.</t>
      <section anchor="hss-signature-algorithm">
        <name>HSS Signature Algorithm</name>
        <t>The HSS public key OID is also used to specify that an HSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the HSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>The HSS signature is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on the contents and
format of an HSS signature.</t>
      </section>
      <section anchor="xmss-signature-algorithm">
        <name>XMSS Signature Algorithm</name>
        <t>The XMSS public key OID is also used to specify that an XMSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the XMSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   itu-t(0) identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmss(13) 0 }
]]></artwork>
        <t>The XMSS signature is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
      <section anchor="xmssmt-signature-algorithm">
        <name>XMSS^MT Signature Algorithm</name>
        <t>The XMSS^MT public key OID is also used to specify that an XMSS^MT signature
was generated on the full message, i.e. the message was not hashed before being
processed by the XMSS^MT signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   itu-t(0) identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmssmt(14) 0 }
]]></artwork>
        <t>The XMSS^MT signature is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS^MT signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
    </section>
    <section anchor="key-generation">
      <name>Key Generation</name>
      <t>The key generation for XMSS and XMSS^MT <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/></t>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>For reference purposes, the ASN.1 syntax is presented as an ASN.1 module here.
This ASN.1 Module builds upon the conventions established in <xref target="RFC5911"/>.</t>
      <artwork><![CDATA[
--
-- ASN.1 Module
--

<CODE STARTS>

Hashsigs-pkix-0 -- TBD - IANA assigned module OID

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS
  PUBLIC-KEY, SIGNATURE-ALGORITHM
  FROM AlgorithmInformation-2009
    {iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0) id-mod-algorithmInformation-02(58)};

--
-- Object Identifiers
--

-- id-alg-hss-lms-hashsig is defined in [RFC8708]

id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= { iso(1)
   member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }

id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= { itu-t(0)
   identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmss(13) 0 }

id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= { itu-t(0)
   identified-organization(4) etsi(0) reserved(127)
   etsi-identified-organization(0) isara(15) algorithms(1)
   asymmetric(1) xmssmt(14) 0 }

--
-- Signature Algorithms and Public Keys
--

-- sa-HSS-LMS-HashSig is defined in [RFC8708]

sa-HSS-LMS-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-hss-lms-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-HSS-LMS-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-hss-lms-hashsig } }

sa-XMSS-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmss-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSS-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmss-hashsig } }

sa-XMSSMT-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSSMT-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmssmt-hashsig } }

-- pk-HSS-LMS-HashSig is defined in [RFC8708]

pk-HSS-LMS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-hss-lms-hashsig
   KEY HSS-LMS-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

HSS-LMS-HashSig-PublicKey ::= OCTET STRING

pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   KEY XMSS-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

XMSS-HashSig-PublicKey ::= OCTET STRING

pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   KEY XMSSMT-HashSig-PublicKey
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

XMSSMT-HashSig-PublicKey ::= OCTET STRING

END

<CODE ENDS>
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements of <xref target="SP800208"/> <bcp14>MUST</bcp14> be taken into account.</t>
      <t>For S-HBS it is crucial to stress the importance of a correct state management.
If an attacker were able to obtain signatures for two different messages
created using the same OTS key, then it would become computationally feasible
for that attacker to create forgeries <xref target="BH16"/>. As noted in <xref target="MCGREW"/> and
<xref target="ETSI-TR-103-692"/>, extreme care needs to be taken in order to avoid the risk
that an OTS key will be reused accidentally.  This is a new requirement that
most developers will not be familiar with and requires careful handling.</t>
      <t>Various strategies for a correct state management can be applied:</t>
      <ul spacing="normal">
        <li>
          <t>Implement a track record of all signatures generated by a key pair associated
to a S-HBS instance. This track record may be stored outside the
device which is used to generate the signature. Check the track record to
prevent OTS key reuse before a new signature is released. Drop the new
signature and hit your PANIC button if you spot OTS key reuse.</t>
        </li>
        <li>
          <t>Use a S-HBS instance only for a moderate number of signatures such
that it is always practical to keep a consistent track record and be able to
unambiguously trace back all generated signatures.</t>
        </li>
        <li>
          <t>Apply the state reservation strategy described in Section 5 of <xref target="MCGREW"/>, where
upcoming states are reserved in advance by the signer. In this way the number of
state synchronisations between nonvolatile and volatile memory is reduced.</t>
        </li>
      </ul>
    </section>
    <section anchor="backup-and-restore-management">
      <name>Backup and Restore Management</name>
      <t>Certificate Authorities have high demands in order to ensure the availability
of signature generation throughout the validity period of signing key pairs.</t>
      <t>Usual backup and restore strategies when using a stateless signature scheme
(e.g. SLH-DSA) are to duplicate private keying material and to operate
redundant signing devices or to store and safeguard a copy of the private
keying material such that it can be used to set up a new signing device in case
of technical difficulties.</t>
      <t>For S-HBS such straightforward backup and restore strategies will lead to OTS
reuse with high probability as a correct state management is not guaranteed.
Strategies for maintaining availability and keeping a correct state are
described in Section 7 of <xref target="SP800208"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a module OID from the "SMI for PKIX Module
Identifier" registry for the ASN.1 module in Section 6.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5911">
          <front>
            <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5911"/>
          <seriesInfo name="DOI" value="10.17487/RFC5911"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC8708">
          <front>
            <title>Use of the HSS/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies the conventions for using the Hierarchical Signature System (HSS) / Leighton-Micali Signature (LMS) hash-based signature algorithm with the Cryptographic Message Syntax (CMS). In addition, the algorithm identifier and public key syntax are provided. The HSS/LMS algorithm is one form of hash-based digital signature; it is described in RFC 8554.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8708"/>
          <seriesInfo name="DOI" value="10.17487/RFC8708"/>
        </reference>
        <reference anchor="SP800208" target="https://doi.org/10.6028/NIST.SP.800-208">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2020" month="October" day="29"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3279">
          <front>
            <title>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="L. Bassham" initials="L." surname="Bassham"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI). Digital signatures are used to sign certificates and certificate revocation list (CRLs). Certificates include the public key of the named subject. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3279"/>
          <seriesInfo name="DOI" value="10.17487/RFC3279"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="MCGREW" target="https://tubiblio.ulb.tu-darmstadt.de/id/eprint/101633">
          <front>
            <title>State Management for Hash-Based Signatures</title>
            <author initials="D." surname="McGrew">
              <organization/>
            </author>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <author initials="S." surname="Fluhrer">
              <organization/>
            </author>
            <author initials="S." surname="Gazdag">
              <organization/>
            </author>
            <author initials="D." surname="Butin">
              <organization/>
            </author>
            <author initials="J." surname="Buchmann">
              <organization/>
            </author>
            <date year="2016" month="November" day="02"/>
          </front>
        </reference>
        <reference anchor="BH16" target="https://eprint.iacr.org/2016/1042.pdf">
          <front>
            <title>Oops, I did it again – Security of One-Time Signatures under Two-Message Attacks.</title>
            <author initials="L." surname="Bruinderink">
              <organization/>
            </author>
            <author initials="S." surname="Hülsing">
              <organization/>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="CNSA2.0" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
          <front>
            <title>Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) Cybersecurity Advisory (CSA)</title>
            <author initials="" surname="National Security Agency (NSA)">
              <organization/>
            </author>
            <date year="2022" month="September" day="07"/>
          </front>
        </reference>
        <reference anchor="ETSI-TR-103-692" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103692/01.01.01_60/tr_103692v010101p.pdf">
          <front>
            <title>State management for stateful authentication mechanisms</title>
            <author initials="" surname="European Telecommunications Standards Institute (ETSI)">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 566?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks for Russ Housley and Panos Kampanakis for helpful suggestions.</t>
      <t>This document uses a lot of text from similar documents <xref target="SP800208"/>,
(<xref target="RFC3279"/> and <xref target="RFC8410"/>) as well as <xref target="RFC8708"/>. Thanks go to the authors of
those documents. "Copying always makes things easier and less error prone" -
<xref target="RFC8411"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
