<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-shbs-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="HSS and XMSS for X.509">Internet X.509 Public Key Infrastructure: Algorithm Identifiers for HSS and XMSS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-shbs-01"/>
    <author initials="K." surname="Bashiri" fullname="Kaveh Bashiri">
      <organization>BSI</organization>
      <address>
        <email>kaveh.bashiri.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Gazdag" fullname="Stefan Gazdag">
      <organization>genua GmbH</organization>
      <address>
        <email>ietf@gazdag.de</email>
      </address>
    </author>
    <author initials="D." surname="Van Geest" fullname="Daniel Van Geest">
      <organization>CryptoNext Security</organization>
      <address>
        <email>daniel.vangeest@cryptonext-security.com</email>
      </address>
    </author>
    <author initials="S." surname="Kousidis" fullname="Stavros Kousidis">
      <organization>BSI</organization>
      <address>
        <email>kousidis.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="04"/>
    <area>sec</area>
    <workgroup>LAMPS - Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 118?>

<t>This document specifies algorithm identifiers and ASN.1 encoding formats for
the Stateful Hash-Based Signature Schemes (S-HBS) Hierarchical Signature System
(HSS), eXtended Merkle Signature Scheme (XMSS), and XMSS^MT, a multi-tree
variant of XMSS. This specification applies to the Internet X.509 Public Key
infrastructure (PKI) when those digital signatures are used in Internet X.509
certificates and certificate revocation lists.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-shbs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        LAMPS Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/x509-hbs/draft-x509-shbs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 127?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateful Hash-Based Signature Schemes (S-HBS) such as HSS, XMSS and XMSS^MT
combine Merkle trees with One Time Signatures (OTS) in order to provide digital
signature schemes that remain secure even when quantum computers become
available. Their theoretic security is well understood and depends only on the
security of the underlying hash function. As such they can serve as an
important building block for quantum computer resistant information and
communication technology.</t>
      <t>The private key of S-HBS is a finite collection of OTS keys, hence only a
limited number of messages can be signed and the private key's state must be
updated and persisted after signing to prevent reuse of OTS keys.  While the
right selection of algorithm parameters would allow a private key to sign a
virtually unbounded number of messages (e.g. 2^60), this is at the cost of a
larger signature size and longer signing time. Due to the statefulness of the
private key and the limited number of signatures that can be created, S-HBS
might not be appropriate for use in interactive protocols. However, in some use
cases the deployment of S-HBS may be appropriate. Such use cases are described
and discussed later in <xref target="use-cases-shbs-x509"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-cases-shbs-x509">
      <name>Use Cases of S-HBS in X.509</name>
      <t>As many cryptographic algorithms that are considered to be quantum-resistant,
S-HBS have several pros and cons regarding their practical usage. On the
positive side they are considered to be secure against a classical as well as a
quantum adversary, and a secure instantiation of S-HBS may always be built as
long as a cryptographically secure hash function exists. Moreover, S-HBS offer
small public key sizes, and, in comparison to other post-quantum signature
schemes, the S-HBS can offer relatively small signature sizes (for certain
parameter sets). While key generation and signature generation may take longer
than classical alternatives, fast and minimal verification routines can be
built.  The major negative aspect is the statefulness.  Private keys always
have to be handled in a secure manner, S-HBS necessitate a special treatment of
the private key in order to avoid security incidents like signature forgery
<xref target="MCGREW"/>, <xref target="SP800208"/>. Therefore, for S-HBS, a secure environment <bcp14>MUST</bcp14> be used
for key generation and key management.</t>
      <t>Note that, in general, root CAs offer such a secure environment and the number
of issued signatures (including signed certificates and CRLs) is often moderate
due to the fact that many root CAs delegate OCSP services or the signing of
end-entity certificates to other entities (such as subordinate CAs) that use
stateless signature schemes. Therefore, many root CAs should be able to handle
the required state management, and S-HBS offer a viable solution.</t>
      <t>As the above reasoning for root CAs usually does not apply for subordinate CAs,
it is <bcp14>NOT RECOMMENDED</bcp14> for subordinate CAs to use S-HBS for issuing end-entity
certificates. Moreover, S-HBS <bcp14>MUST NOT</bcp14> be used for end-entity certificates.</t>
      <t>However, S-HBS <bcp14>MAY</bcp14> be used for code signing certificates, since they are
suitable and recommended in such non-interactive contexts. For example, see the
recommendations for software and firmware signing in <xref target="CNSA2.0"/>. Some
manufactures use common and well-established key formats like X.509 for their
code signing and update mechanisms. Also there are multi-party IoT ecosystems
where publicly trusted code signing certificates are useful.</t>
    </section>
    <section anchor="algorithm-identifiers-and-parameters">
      <name>Algorithm Identifiers and Parameters</name>
      <t>In this document, we define new OIDs for identifying the different stateful
hash-based signature algorithms. An additional OID is defined in <xref target="I-D.draft-ietf-lamps-rfc8708bis"/> and
repeated here for convenience. For all of the OIDs, the parameters <bcp14>MUST</bcp14> be
absent.</t>
      <section anchor="hss-algorithm-identifier">
        <name>HSS Algorithm Identifier</name>
        <t>The object identifier and public key algorithm identifier for HSS is defined in
<xref target="I-D.draft-ietf-lamps-rfc8708bis"/>. The definitions are repeated here for reference.</t>
        <t>The object identifier for an HSS public key is <tt>id-alg-hss-lms-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>Note that the <tt>id-alg-hss-lms-hashsig</tt> algorithm identifier is also referred to
as <tt>id-alg-mts-hashsig</tt>. This synonym is based on the terminology used in an
early draft of the document that became <xref target="RFC8554"/>.</t>
        <t>The public key and signature values identify the hash function and the height used in the
HSS/LMS tree. <xref target="RFC8554"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-LMS"/> permits the registration of additional identifiers in the future.</t>
      </section>
      <section anchor="xmss-algorithm-identifier">
        <name>XMSS Algorithm Identifier</name>
        <t>The object identifier for an XMSS public key is <tt>id-alg-xmss-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The public key and signature values identify the hash function and the height used in the
XMSS tree. <xref target="RFC8391"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-XMSS"/> permits the registration of additional identifiers in the future.</t>
      </section>
      <section anchor="xmssmt-algorithm-identifier">
        <name>XMSS^MT Algorithm Identifier</name>
        <t>The object identifier for an XMSS^MT public key is <tt>id-alg-xmssmt-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The public key and signature values identify the hash function and the height used in the
XMSS^MT tree. <xref target="RFC8391"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-XMSS"/> permits the registration of additional identifiers in the future.</t>
      </section>
    </section>
    <section anchor="public-key-identifiers">
      <name>Public Key Identifiers</name>
      <t>Certificates conforming to <xref target="RFC5280"/> can convey a public key for any public key
algorithm. The certificate indicates the algorithm through an algorithm
identifier. An algorithm identifier consists of an OID and optional parameters.</t>
      <t><xref target="RFC8554"/> and <xref target="RFC8391"/> define the raw octet string encodings of the public
keys used in this document. When used in a SubjectPublicKeyInfo type, the
subjectPublicKey BIT STRING contains the raw octet string encodings of the
public keys.</t>
      <t>This document defines ASN.1 OCTET STRING types for encoding the public keys
when not used in a SubjectPublicKeyInfo. The OCTET STRING is mapped to a
subjectPublicKey (a value of type BIT STRING) as follows: the most significant
bit of the OCTET STRING value becomes the most significant bit of the BIT
STRING value, and so on; the least significant bit of the OCTET STRING
becomes the least significant bit of the BIT STRING.</t>
      <section anchor="hss-public-keys">
        <name>HSS Public Keys</name>
        <t>The HSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-HSS-LMS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-hss-lms-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The HSS public key is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8554"/> defines the raw octet string encoding of an HSS public key using the
<tt>hss_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on
the contents and format of an HSS public key. Note that the single-tree signature
scheme LMS is instantiated as HSS with number of levels being equal to 1.</t>
      </section>
      <section anchor="xmss-public-keys">
        <name>XMSS Public Keys</name>
        <t>The XMSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS public key is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8391"/> defines the raw octet string encoding of an HSS public key using the
<tt>xmss_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information
on the contents and format of an XMSS public key.</t>
      </section>
      <section anchor="xmssmt-public-keys">
        <name>XMSS^MT Public Keys</name>
        <t>The XMSS^MT public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS^MT public key is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8391"/> defines the raw octet string encoding of an HSS public key using the
<tt>xmssmt_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information
on the contents and format of an XMSS^MT public key.</t>
      </section>
    </section>
    <section anchor="key-usage-bits">
      <name>Key Usage Bits</name>
      <t>The intended application for the key is indicated in the keyUsage certificate
extension <xref target="RFC5280"/>.
When one of the AlgorithmIdentifiers specified in this document appears in the SubjectPublicKeyInfo
field of a certification authority (CA) X.509 certificate <xref target="RFC5280"/>, the
certificate key usage extension <bcp14>MUST</bcp14> contain at least one of the
following values: digitalSignature, nonRepudiation, keyCertSign, or
cRLSign. However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>When one of these AlgorithmIdentifiers appears in the SubjectPublicKeyInfo
field of an end entity X.509 certificate <xref target="RFC5280"/>, the certificate key usage
extension <bcp14>MUST</bcp14> contain at least one of the following values: digitalSignature
or nonRepudiation. However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>Note that for certificates that indicate <tt>id-alg-hss-lms-hashsig</tt> the above
definitions are more restrictive than the requirement defined in Section 4 of
<xref target="I-D.draft-ietf-lamps-rfc8708bis"/>.</t>
    </section>
    <section anchor="signature-algorithms">
      <name>Signature Algorithms</name>
      <t>This section identifies OIDs for signing using HSS, XMSS, and XMSS^MT. When
these algorithm identifiers appear in the algorithm field as an
AlgorithmIdentifier, the encoding <bcp14>MUST</bcp14> omit the parameters field. That is, the
AlgorithmIdentifier <bcp14>SHALL</bcp14> be a SEQUENCE of one component, one of the OIDs
defined in the following subsections.</t>
      <t>When the signature algorithm identifiers described in this document are used to
create a signature on a message, no digest algorithm is applied to the message
before signing.  That is, the full data to be signed is signed rather than
a digest of the data.</t>
      <t>For HSS, the signature value is described in section 6.4 of <xref target="RFC8554"/>. For XMSS
and XMSS^MT the signature values are described in sections B.2 and C.2 of
<xref target="RFC8391"/>, respectively. The octet string representing the signature is encoded
directly in the OCTET STRING without adding any additional ASN.1 wrapping. For
the Certificate and CertificateList structures, the signature value is wrapped
in the "signatureValue" OCTET STRING field.</t>
      <section anchor="hss-signature-algorithm">
        <name>HSS Signature Algorithm</name>
        <t>The HSS public key OID is also used to specify that an HSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the HSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>The HSS signature is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on the contents and
format of an HSS signature.</t>
      </section>
      <section anchor="xmss-signature-algorithm">
        <name>XMSS Signature Algorithm</name>
        <t>The XMSS public key OID is also used to specify that an XMSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the XMSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The XMSS signature is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
      <section anchor="xmssmt-signature-algorithm">
        <name>XMSS^MT Signature Algorithm</name>
        <t>The XMSS^MT public key OID is also used to specify that an XMSS^MT signature
was generated on the full message, i.e. the message was not hashed before being
processed by the XMSS^MT signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The XMSS^MT signature is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS^MT signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
    </section>
    <section anchor="key-generation">
      <name>Key Generation</name>
      <t>The key generation for XMSS and XMSS^MT <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/></t>
    </section>
    <section anchor="sec-asn1">
      <name>ASN.1 Module</name>
      <t>For reference purposes, the ASN.1 syntax is presented as an ASN.1 module here.
This ASN.1 Module builds upon the conventions established in <xref target="RFC5911"/>.</t>
      <artwork><![CDATA[
X509-SHBS-2024 -- TBD - IANA assigned module OID
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0) id-mod-x509-shbs-01(TBD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS
  PUBLIC-KEY, SIGNATURE-ALGORITHM
    FROM AlgorithmInformation-2009  -- RFC 5911 [CMSASN1]
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-algorithmInformation-02(58) }

  sa-HSS-LMS-HashSig, pk-HSS-LMS-HashSig
    FROM MTS-HashSig-2013
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
        id-smime(16) id-mod(0) id-mod-mts-hashsig-2013(64) };

--
-- Object Identifiers
--

-- id-alg-hss-lms-hashsig is defined in [RFC8708]

id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   TBD }

id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   TBD }

--
-- Signature Algorithms and Public Keys
--

-- sa-HSS-LMS-HashSig is defined in [RFC8708]

sa-XMSS-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmss-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSS-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmss-hashsig } }

sa-XMSSMT-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSSMT-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmssmt-hashsig } }

-- pk-HSS-LMS-HashSig is defined in [RFC8708]

pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

--
-- Public Key (pk-) Algorithms
--
PublicKeys PUBLIC-KEY ::= {
   -- This expands PublicKeys from RFC 5912
   pk-HSS-LMS-HashSig |
   pk-XMSS-HashSig |
   pk-XMSSMT-HashSig,
   ...
}

--
-- Signature Algorithms (sa-)
--
SignatureAlgs SIGNATURE-ALGORITHM ::= {
   -- This expands SignatureAlgorithms from RFC 5912
   sa-HSS-LMS-HashSig |
   sa-XMSS-HashSig |
   sa-XMSSMT-HashSig,
   ...
}

END
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements of <xref target="SP800208"/> <bcp14>MUST</bcp14> be taken into account.</t>
      <t>For S-HBS it is crucial to stress the importance of a correct state management.
If an attacker were able to obtain signatures for two different messages
created using the same OTS key, then it would become computationally feasible
for that attacker to create forgeries <xref target="BH16"/>. As noted in <xref target="MCGREW"/> and
<xref target="ETSI-TR-103-692"/>, extreme care needs to be taken in order to avoid the risk
that an OTS key will be reused accidentally.  This is a new requirement that
most developers will not be familiar with and requires careful handling.</t>
      <t>Various strategies for a correct state management can be applied:</t>
      <ul spacing="normal">
        <li>
          <t>Implement a track record of all signatures generated by a key pair associated
to a S-HBS instance. This track record may be stored outside the
device which is used to generate the signature. Check the track record to
prevent OTS key reuse before a new signature is released. Drop the new
signature and hit your PANIC button if you spot OTS key reuse.</t>
        </li>
        <li>
          <t>Use a S-HBS instance only for a moderate number of signatures such
that it is always practical to keep a consistent track record and be able to
unambiguously trace back all generated signatures.</t>
        </li>
        <li>
          <t>Apply the state reservation strategy described in Section 5 of <xref target="MCGREW"/>, where
upcoming states are reserved in advance by the signer. In this way the number of
state synchronisations between nonvolatile and volatile memory is reduced.</t>
        </li>
      </ul>
    </section>
    <section anchor="backup-and-restore-management">
      <name>Backup and Restore Management</name>
      <t>Certificate Authorities have high demands in order to ensure the availability
of signature generation throughout the validity period of signing key pairs.</t>
      <t>Usual backup and restore strategies when using a stateless signature scheme
(e.g. SLH-DSA) are to duplicate private keying material and to operate
redundant signing devices or to store and safeguard a copy of the private
keying material such that it can be used to set up a new signing device in case
of technical difficulties.</t>
      <t>For S-HBS such straightforward backup and restore strategies will lead to OTS
reuse with high probability as a correct state management is not guaranteed.
Strategies for maintaining availability and keeping a correct state are
described in Section 7 of <xref target="SP800208"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a module OID from the "SMI for PKIX Module
Identifier" registry for the ASN.1 module in <xref target="sec-asn1"/>.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5911">
          <front>
            <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5911"/>
          <seriesInfo name="DOI" value="10.17487/RFC5911"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="SP800208" target="https://doi.org/10.6028/NIST.SP.800-208">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2020" month="October" day="29"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.draft-ietf-lamps-rfc8708bis">
          <front>
            <title>Use of the HSS/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="30" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies the conventions for using the Hierarchical
   Signature System (HSS) / Leighton-Micali Signature (LMS) hash-based
   signature algorithm with the Cryptographic Message Syntax (CMS).  In
   addition, the algorithm identifier and public key syntax are
   provided.  The HSS/LMS algorithm is one form of hash-based digital
   signature; it is described in RFC 8554.  This document obsoletes RFC
   8708.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc8708bis-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3279">
          <front>
            <title>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="L. Bassham" initials="L." surname="Bassham"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI). Digital signatures are used to sign certificates and certificate revocation list (CRLs). Certificates include the public key of the named subject. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3279"/>
          <seriesInfo name="DOI" value="10.17487/RFC3279"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="MCGREW" target="https://tubiblio.ulb.tu-darmstadt.de/id/eprint/101633">
          <front>
            <title>State Management for Hash-Based Signatures</title>
            <author initials="D." surname="McGrew">
              <organization/>
            </author>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <author initials="S." surname="Fluhrer">
              <organization/>
            </author>
            <author initials="S." surname="Gazdag">
              <organization/>
            </author>
            <author initials="D." surname="Butin">
              <organization/>
            </author>
            <author initials="J." surname="Buchmann">
              <organization/>
            </author>
            <date year="2016" month="November" day="02"/>
          </front>
        </reference>
        <reference anchor="BH16" target="https://eprint.iacr.org/2016/1042.pdf">
          <front>
            <title>Oops, I did it again – Security of One-Time Signatures under Two-Message Attacks.</title>
            <author initials="L." surname="Bruinderink">
              <organization/>
            </author>
            <author initials="S." surname="Hülsing">
              <organization/>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="CNSA2.0" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
          <front>
            <title>Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) Cybersecurity Advisory (CSA)</title>
            <author initials="" surname="National Security Agency (NSA)">
              <organization/>
            </author>
            <date year="2022" month="September" day="07"/>
          </front>
        </reference>
        <reference anchor="ETSI-TR-103-692" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103692/01.01.01_60/tr_103692v010101p.pdf">
          <front>
            <title>State management for stateful authentication mechanisms</title>
            <author initials="" surname="European Telecommunications Standards Institute (ETSI)">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA-LMS" target="https://www.iana.org/assignments/leighton-micali-signatures/">
          <front>
            <title>Leighton-Micali Signatures (LMS)</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-XMSS" target="https://iana.org/assignments/xmss-extended-hash-based-signatures/">
          <front>
            <title>XMSS: Extended Hash-Based Signatures</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 577?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks for Russ Housley and Panos Kampanakis for helpful suggestions.</t>
      <t>This document uses a lot of text from similar documents <xref target="SP800208"/>,
(<xref target="RFC3279"/> and <xref target="RFC8410"/>) as well as <xref target="I-D.draft-ietf-lamps-rfc8708bis"/>. Thanks go to the authors of
those documents. "Copying always makes things easier and less error prone" -
<xref target="RFC8411"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
