<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hbs-state-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="HBS: State and Backup">Hash-based Signatures: State and Backup Management</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-02"/>
    <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
      <organization>PQShield</organization>
      <address>
        <postal>
          <country>The Netherlands</country>
        </postal>
        <email>thom@thomwiggers.nl</email>
      </address>
    </author>
    <author initials="K." surname="Bashiri" fullname="Kaveh Bashiri">
      <organization>BSI</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>kaveh.bashiri.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Kölbl" fullname="Stefan Kölbl">
      <organization>Google</organization>
      <address>
        <postal>
          <country>Switzerland</country>
        </postal>
        <email>kste@google.com</email>
      </address>
    </author>
    <author initials="J." surname="Goodman" fullname="Jim Goodman">
      <organization>Crypto4A Technologies</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>jimg@crypto4a.com</email>
      </address>
    </author>
    <author initials="S." surname="Kousidis" fullname="Stavros Kousidis">
      <organization>BSI</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>kousidis.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="December" day="16"/>
    <area>Security</area>
    <workgroup>Post-Quantum Use In Protocols</workgroup>
    <keyword>stateful hash-based signatures</keyword>
    <keyword>XMSS</keyword>
    <keyword>LMS</keyword>
    <keyword>state management</keyword>
    <abstract>
      <?line 164?>

<t>Stateful Hash-Based Signature Schemes (Stateful HBS) such as LMS, HSS, XMSS and
XMSS<sup>MT</sup> combine Merkle trees with One-Time Signatures (OTS) to
provide signatures that are resistant against attacks using large-scale quantum
computers. Unlike conventional stateless digital signature schemes, Stateful HBS have
a state to keep track of which OTS keys have been used, as double-signing with
the same OTS key allows forgeries.</t>
      <t>This document provides guidance and catalogs security considerations for the
operational and technical aspects of deploying systems that rely on Stateful HBS.
Management of the state of the Stateful HBS, including any handling of redundant key
material, is a sensitive topic. This document describes some approaches to handle the
associated challenges. It also describes the challenges that need to be resolved
before certain approaches should be considered.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://hbs-guidance.github.io/draft-hbs-state/draft-ietf-pquip-hbs-state.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-pquip-hbs-state/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/hbs-guidance/draft-hbs-state"/>.</t>
    </note>
  </front>
  <middle>
    <?line 180?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateful Hash-Based Signature Schemes (Stateful HBS) such as LMS, HSS, XMSS and
XMSS<sup>MT</sup> combine Merkle trees with One-Time Signatures (OTS) in order
to provide digital signature schemes that remain secure even when large-scale
quantum computers become available. The theoretic security of Stateful HBS is
well understood and depends only on the security of the underlying hash
function. As such, Stateful HBS can serve as an important building block for
quantum-resistant information and communication technology. Stateful HBS are
specified in <xref target="RFC8391"/>, <xref target="RFC8554"/>, and NIST <xref target="SP-800-208"/>.</t>
      <t>The private key of an Stateful HBS is a finite collection of OTS keys and an
associated data structure which keeps track of which OTS keys have been used.
This data structure is typically a simple counter and often called an index; we
refer to it as the <strong>state</strong> of the private key. Each Stateful HBS private key can be
used to sign a finite number of messages, and the state must be updated with
each generated signature.</t>
      <t>One must not reuse any OTS key that is part of an Stateful HBS private key. If
an attacker is able to obtain signatures for two different messages created
using the same OTS key, it is computationally feasible for that attacker to
create forgeries <xref target="BH16"/> <xref target="Fluhrer23"/>. As noted in
<xref target="MCGREW"/> and <xref target="ETSI-TR-103-692"/>, extreme care should be taken in order to avoid
the risk that an OTS key will be reused accidentally. Whereas <xref target="MCGREW"/>
identifies the fundamental failure modes of Stateful HBS and
proposes architectural strategies such as a reservation approach, and
<xref target="ETSI-TR-103-692"/> provides a broad analysis of state management challenges and
risks, this document complements both by cataloging concrete operational
patterns in <xref target="pot-sol"/> and by addressing backup and recovery considerations
<xref target="alt-backup-mgmt"/> not covered in prior work.</t>
      <t>In particular, the challenges below highlight why careful state and backup
management are essential in Stateful HBS:</t>
      <ul spacing="normal">
        <li>
          <t>Implementers must ensure that each creation of a signature updates the state
correctly.</t>
        </li>
        <li>
          <t>If the Stateful HBS private key is distributed to multiple signers at the same time,
implementers must ensure that they never use the same OTS key. This may
require synchronization between all signers.</t>
        </li>
        <li>
          <t>Additional operational complexity arises when part of the available OTS signatures are allocated to different devices (partial state transfer), or when state from different devices needs merging; these introduce risks of overlap, failure, and require careful coordination.</t>
        </li>
        <li>
          <t>If key backups are required, implementers must ensure that any backup
mechanism can not lead to re-using a previously used OTS key.</t>
        </li>
      </ul>
      <t>The following sections present, recall, and discuss various strategies for a
correct state and backup management for Stateful HBS.</t>
      <section anchor="when-are-stateful-hbs-appropriate">
        <name>When are Stateful HBS Appropriate?</name>
        <t>The issues with state management described above, as well as (for most parameter
sets) the limited number of signatures, lead to new requirements that most
developers will not be familiar with and that require careful handling in
practice: Stateful HBS are not general-purpose signature schemes. Most
applications, especially those that may produce unrestricted numbers of
signatures, should use <em>stateless</em> hash-based signature schemes like SLH-DSA
<xref target="FIPS205"/>, which use the same security assumptions, or schemes based on other
assumptions, such as ML-DSA <xref target="FIPS204"/>, instead. However, if run time, implementation
size, or signature or key sizes of stateless alternatives are prohibitive, and the
specific use case allows a very tight control of the signing environment, using
Stateful HBS may be an appropriate solution. It seems likely that in many
scenarios, this will only be possible when using purpose-designed hardware, such
as hardware-security modules.</t>
      </section>
    </section>
    <section anchor="specific-terminology-in-the-context-of-stateful-hbs">
      <name>Specific Terminology in the Context of Stateful HBS</name>
      <t>In this section we specify certain notions which are important in the
context of Stateful HBS.</t>
      <section anchor="private-key-components">
        <name>Private Key Components</name>
        <t>This section describes the two conceptual components that make up the private
key material used in Stateful HBS.</t>
        <dl>
          <dt>private key</dt>
          <dd>
            <t>the static, long-lived secret(s) from which OTS private keys are derived.
This material is stateless: given the scheme parameters, it deterministically
defines the set of OTS private keys but does not change over time.</t>
          </dd>
          <dt>state</dt>
          <dd>
            <t>the dynamically updated data structure that records which OTS key indices
have been consumed (often a monotone counter). This material is mutable and
must change on every successful signature.</t>
          </dd>
        </dl>
        <t>Conceptually, the private key and the state are distinct and should be handled
accordingly: the private key is a static secret, while the state is mutable,
evolves with each signature, and must be maintained with integrity and correctness. In some
implementations, these two components may be packaged together and not directly
separable; in such cases, this document’s guidance applies to the combined
artifact.</t>
      </section>
      <section anchor="state-management">
        <name>State Management</name>
        <t>In this document, <em>state management</em> refers to the handling and implementation
of the state of the private key.</t>
        <t>This includes mechanisms, which aim:</t>
        <ul spacing="normal">
          <li>
            <t>to securely update the state before the signature is released,</t>
          </li>
          <li>
            <t>to set up Stateful HBS with a split state and/or private key, so that signatures can
be generated from either part without risk of state reuse,</t>
          </li>
          <li>
            <t>to enable partial transfer of unused signature capacity between devices, and optionally merging state fragments without overlap,</t>
          </li>
          <li>
            <t>to enable effective but secure handling of private key and state backup
material,</t>
          </li>
          <li>
            <t>to guarantee the availability of both the private key and its state across
the lifetime of the key.</t>
          </li>
        </ul>
        <t>Note that in particular implementations of Stateful HBS, or in alternative
signature mechanisms, the state and private key might be inseparable. For
example, puncturable schemes <xref target="BSW16"/> represent such an alternative; they are
research-level constructions and are not currently standardized or deployed in
practice. However, even in these scenarios, this document's guidance should
still apply.</t>
      </section>
      <section anchor="backup-management">
        <name>Backup Management</name>
        <t>In order to mitigate failure of, e.g., devices storing key material and to
facilitate other types of disaster recovery, backups of private keys and their
associated states should be considered as part of a security architecture.</t>
        <t>In this document, <em>backup management</em> refers to all mechanisms surrounding the
goal to guarantee the availability of the private key and state, but with
special care to avoid state reuse by rolling back to a state in which
already-used OTS keys are still available.</t>
        <t>These mechanisms include procedures and protocols, which aim:</t>
        <ul spacing="normal">
          <li>
            <t>to securely store this private key and state material outside the in-use
signing device,</t>
          </li>
          <li>
            <t>to import an externally stored private key and state to a newly initiated
signing device,</t>
          </li>
          <li>
            <t>allow practicing with backup recovery and to ensure backups are valid.</t>
          </li>
        </ul>
        <t>Backup management can be viewed as a more specific type of state management; we
make this distinction to clarify the aims of our recommendations.</t>
      </section>
      <section anchor="keymovement">
        <name>Key Export, Key Import and Key Transfer</name>
        <t>As part of state and backup management, we will discuss mechanisms to export,
import or transfer private key and state material. In order to avoid
misunderstandings we now specify these notions more precisely.</t>
        <dl>
          <dt>key export</dt>
          <dd>
            <t>mechanism of exporting secret data, which yields (partial) private
key and state material, from the signing device to external storage. This
external storage may be given in digital or non-digital form.</t>
          </dd>
          <dt>key import</dt>
          <dd>
            <t>mechanism of importing secret data, which loads (partial) private
key and state material, from external storage to the signing device.</t>
          </dd>
          <dt>key transfer</dt>
          <dd>
            <t>a cryptographically protected transfer of ownership of private key and
state material from one signing device to another.</t>
          </dd>
        </dl>
        <t>Systems and architectures relying on key transfer are generally expected to
require fewer operational and manually-executed steps and checks to avoid state
reuse.</t>
        <t>Note that, at times, secure variants of the aforementioned primitives may be
required (e.g., securely importing/exporting the key). In these situations
cryptographic mechanisms should be utilized to provide assurances related to
the confidentiality (e.g., utilizing symmetric/asymmetric encryption
mechanisms) and/or integrity/authenticity (e.g., utilizing digital signatures,
hash functions, and keyed message authentication codes) of the associated
operations.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>An important aspect of the evaluation of various HBS state and
backup management options is to consider the operational costs associated with
the option(s) being evaluated. In the past, a traditional trust infrastructure
solution could utilize straightforward archival procedures to make copies of
the keys, which could then be distributed geographically to ensure their
availability and deliver a sufficiently resilient solution, all the while
enforcing whatever security protocols and procedures were required.
Unfortunately, Stateful HBS introduce an additional
constraint in that they need to ensure the state is never re-used. Hence,
archival procedures used for traditional trust infrastructures have to be
amended/redesigned to be used as viable options.</t>
      <t>One of the most problematic aspects of providing a long-lived resilient
solution is simply managing the physical media on which the keys/state are
stored externally (i.e., outside of the signing device) throughout the course
of their lifetime. Physical media/devices degrade over time, and the more
complex the media/device, the more likely it is to fail at some point in time
(e.g., data stored on a CD vs. data stored on a USB drive vs. data stored in a
Hardware Security Module). Combine that fact with the long lifetimes associated
with Stateful HBS keys (e.g., 10-20+ years) and the
difficulties associated with transferring keys between devices, and one finds
them self with a perplexing set of challenges that needs to be accounted for in
any state selection process of a proper state and backup management solution.
Compounding these complexities is the fact any resilient state management
system should also provide some means to verify the integrity of these
long-lived backups to ensure they will be valid when they are required, and to
ensure the operators know how to execute the necessary recovery procedure(s).</t>
      <t>Similarly, many of the prescribed state management options require a high
degree of operator involvement which means one should consider the costs
associated with training the operator element to ensure processes and procedures
are adhered to and failures caught early and corrected before a catastrophic
loss of security can occur (e.g., accidentally instantiating multiple instances
of a Stateful HBS key/state). Note that training is not a
fixed one-time cost either as long lifetimes will necessitate succession
planning amongst the operator element, and training of each successive generation
of participants. Mechanisms also should be put in place to mitigate the
ever-present insider threat via mechanisms such as M-of-N controls, ensuring
least-privileges amongst participants, and enforcing a segregation of duties to
ensure multiple parties are required to collude to undermine a solution's
security. Note that the segregation of duties must persist across successive
generations to ensure participants do not acquire multiple roles over time,
thereby undermining the intended segregation.</t>
      <t>In addition to the state management, implementers may consider implementing
mechanisms to prevent abrupt signature exhaustion. Implementations may
consider providing a configurable warning threshold, M, which is triggered
when M signatures remain. When the number of available signatures reaches
this threshold, the system should return a 'signatures nearing exhaustion' warning.
This warning condition should require explicit acknowledgment from the user
through a mechanism that cannot be trivially skipped.</t>
      <t>Another important consideration in deploying Stateful HBS is
the selection of an appropriate parameter set. Given the flexibility of these
schemes — such as adjustable tree heights or Winternitz parameters — there
exists a large variety of possible configurations. The availability of these
different configurations offers many trade-offs between signature
generation/verification time, signature size, and key generation time. Hence,
careful attention during the design phase is essential to ensure that the chosen
parameter set aligns optimally with the specific requirements of the intended
use case.</t>
      <t>Lastly, costs associated with any external dependencies required by a
particular solution (e.g., access to a public ledger or transparency log,
providing accurate time references and synchronization mechanisms, access to
attestation facilities, etc.) must be accounted for as well, particularly if a
system is operating in an offline mode that makes delivering these additional
capabilities all the more complicated and expensive.</t>
    </section>
    <section anchor="requirements-for-secure-state-management">
      <name>Requirements for Secure State Management</name>
      <t>A system deploying Stateful HBS should fulfill certain requirements to allow securely
handling the state. The system must ensure that no two signing operations can
ever be issued from the same state. In addition, the generation of a signature
and update of the state should appear to be an <em>atomic transaction</em>. This means
that the system must not release a signature without irrevocably and correctly
updating the state.</t>
      <t>State management systems should satisfy all <em>ACID</em> properties:</t>
      <ul spacing="normal">
        <li>
          <t><em>Atomicity</em>: each operation on the state must be indivisible — such that it
either commits completely or leaves the state unchanged.</t>
        </li>
        <li>
          <t><em>Consistency</em>: the state before and after each update must reflect a valid
progression of available OTS indices, and no invalid or conflicting state is
ever observable.</t>
        </li>
        <li>
          <t><em>Isolation</em>: concurrent or overlapping operations (e.g., from separate
processes or devices) must not interfere in ways that could lead to state
reuse.</t>
        </li>
        <li>
          <t><em>Durability</em>: once a state transition (e.g., before issuing a signature) is
committed, that transition must survive crashes, power loss, or device
failure.</t>
        </li>
      </ul>
      <t>These requirements impose significant restrictions on the underlying technical
approach and a careful implementation of how the state will be updated or
synchronized. The abstraction layers of modern systems can make it particularly
difficult to guarantee that no two versions of the same state are present. The
main concerns here are</t>
      <ul spacing="normal">
        <li>
          <t>how the actual storage for the state is implemented,</t>
        </li>
        <li>
          <t>how it is modified,</t>
        </li>
        <li>
          <t>how an accidental/intentional failure/glitch might affect the state security.</t>
        </li>
      </ul>
      <t>A system may have a version of the private key stored in non-volatile memory
(e.g. a disk) and will load it into volatile memory (e.g. RAM) while processing.
Here, an implementer must ensure that these are always perfectly synchronized
<xref target="MCGREW"/>, meaning that no parts of the system are allowed to read any version of
the key during procedures which load, write or modify keys. This can be
particularly challenging if there are additional abstraction layers present in
the system, like additional caches which may affect reading/writing the state
and its potential existence in multiple locations.</t>
      <t>Cloning is another concern, as it can easily lead to re-using the same state.
This can happen for instance if a process which issues a signing operation is
forked, and no proper synchronization is enforced in the implementation to
guarantee correct state update. Virtual machine (VM) cloning is another
potential security risk here, as both backing up a VM into non-volatile memory
or live cloning of a VM can easily lead to a state re-use <xref target="MCGREW"/>. With users
shifting workloads to cloud service providers, the issue of VM cloning may
become more prevalent.</t>
      <t>Using dedicated cryptographic hardware is recommended to enforce these
requirements, ensure correct behavior and handle the complexity of state
management. In particular, this enables implementing rollback resistant
counters which can be difficult to achieve in a software-only fashion.</t>
      <t>On the verifier side, no state management is required. However, the verifier
needs to trust the signer to not have re-used the state. A verifier may want to
check that no state re-use happened in the past by a signer, before accepting a
signature.</t>
      <t>In practice, this can be done if the verifier has access to all signatures
issued by the signer. As the signatures contain the index of the OTS key used,
detecting if an index was used more than once becomes trivial. In practice,
such a (public) data structure which contains all signatures may already be
present in some use cases (e.g. certificate transparency <xref target="RFC9162"/>) or could
be built. It is worth noting that while trusting the signer to not re-use the
state is a strong assumption, other signature schemes like ECDSA introduce
similar assumptions for the verifier, by requiring the signer to never re-use
the nonce.</t>
    </section>
    <section anchor="pot-sol">
      <name>Potential Solutions</name>
      <t>A variety of potential solutions have been proposed both within the
<xref target="SP-800-208"/> specification, as well as from external sources. This section
describes a number of approaches and their potential advantages/disadvantages.</t>
      <section anchor="multiple-public-keys-sp-800-208">
        <name>Multiple Public Keys (SP-800-208)</name>
        <t><xref target="SP-800-208"/> proposes generating multiple Stateful HBS keypairs and configuring
devices and clients to accept signatures created by any of these keys.</t>
        <t>This negatively impacts one of the advantages of using Stateful HBS by
increasing the public key footprint within the client, which can be problematic
if it has limited public key storage capacity. (Though public keys are typically
equivalently sized to ECDSA rather than larger classical RSA keys often
currently found.) <xref target="SP-800-208"/> addresses storage capacity concerns by suggesting
using a mechanism such as that proposed in <xref target="RFC8649"/> to update the stored
public key by having the current key endorse the next key that is to be
installed. Unfortunately, for many constrained devices the public key is
embedded in immutable ROM or fuses due to security reasons, so it cannot be
updated in this manner.</t>
        <t>The proposal of using multiple Stateful HBS keypairs for a single instance also
generates questions as to how to establish that approach in existing public key
infrastructures. For example, issuing multiple certificates adds the storage
needs of the certificate material to the public key footprint. In order to
alternatively issue multiple public keys encoded inside a single certificate
one would need a standardized format if interoperability is a concern.</t>
      </section>
      <section anchor="nist-dist-multi-tree">
        <name>Distributed Multi-trees (SP-800-208)</name>
        <t><xref target="SP-800-208"/> also proposes creating multiple Stateful HBS keys across multiple
cryptographic modules using a distributed multi-tree approach that is a variant
of the standard hyper-tree based Stateful HBS schemes HSS and XMSS<sup>MT</sup>. In
this approach, trees are instantiated on a root device (HSM<sub>root</sub>), as
well as one or more subordinate devices (HSM<sub>sub{{i}}</sub>), and the root
tree is used to sign the root nodes of the subordinate trees to synthesize a
multi-level Stateful HBS key. The root device is only ever used to sign subordinate
device root nodes, while the subordinate device(s) is(are) used to sign
messages. This is relatively straightforward to do using HSS, and <xref target="SP-800-208"/>
describes the necessary algorithmic modifications when using XMSS<sup>MT</sup>.</t>
        <t>One drawback of this approach is the increased signature size as an additional
OTS needs to be generated, effectively doubling the overall signature size.
Another concern is the single point of failure nature of relying on the root
tree module to sign all of the subordinate trees; if the root tree device fails
then no new subordinate trees can be signed. <xref target="SP-800-208"/> suggested that as
many subordinate trees as possible be generated during the initial root key
generation and subordinate-signing procedure. Unfortunately, this can incur a
large capital expenditure to procure all of the necessary devices, many of
which may not be used for a long period of time, if at all. The subordinate
tree root node signing process must also be carefully managed to ensure top
level trees are only ever used to sign the root nodes of trusted/approved
subordinate trees to ensure that no malicious signing request is accepted,
which would effectively give a rogue entity the ability to generate valid
signatures, thereby undermining the security of the entire system.</t>
        <t><xref target="SP-800-208"/> also suggests combining distributed multi-trees with multiple
root public keys as a means to mitigate some of the concerns regarding having a
single point of failure in the root tree. However, even if a system operator
does everything right, use cases with exceptionally long lifetimes of 10-20+
years (e.g., automotive and aerospace/satellite applications) will require
system operators to rely on devices well beyond their expected lifetimes of
5-10 years, which may constitute an unacceptable business risk.</t>
      </section>
      <section anchor="sectorization">
        <name>Sectorization</name>
        <t>Distributed multi-trees attempt to partition a Stateful HBS signing space
amongst multiple cryptographic modules by breaking up the signing space along
the boundaries of the subordinate trees generated during the multi-tree key
generation process. An alternative approach would be to use only a single tree,
and partition its signature space along some power-of-2 less than the total
number of leaves in the tree (e.g., 2<sup>s</sup> for a tree of height h &gt; s),
creating N = 2<sup>h-s</sup> partitions or sectors, which are instantiated as N
height-s Merkle trees whose root nodes are considered interior nodes of the
overall height-h Merkle tree. Hence, there is no additional OTS required to sign
their root nodes; their values are used as-is in the tree ascent mechanism of
the underlying Stateful HBS scheme, yielding a common public key (i.e., root
node) for all sectors. Care must be taken to ensure that each sector uses the
same root tree identifier (i.e., the "I" value for HSS/LMS and "root" value for
XMSS/XMSS<sup>MT</sup>).</t>
        <t>Each of the N sectors' OTS private key values can be generated pseudo-randomly
from a unique seed value generated from an appropriate source of randomness. The
private keys from different sectors are independent when generated by this
process. This requires that the path information for the root node of each
sector (i.e., all off-path nodes between the sector root node and the top level
node value) be stored with each sector's private key at key generation time
since a sector will not know the seed information required to compute any of the
other sectors' root nodes during the tree ascent phase of a signature generation
operation. During signature generation the signer appends the stored path
information to the path information it computes to ascend from the leaf OTS to
the sector's root node (which it can compute given that it knows its own seed
value).</t>
        <t>Hence, sectorized key generation results in a single public key value and
2<sup>h-s</sup> private key values, each capable of generating 2<sup>s</sup>
signatures, after which the sectorized key is exhausted.</t>
        <t>In addition to avoiding an increased signature size; when unique seeds are
utilized sectorization breaks a given Stateful HBS key/state into multiple independent
fragments that can be managed as independent objects. As a result, system
operators may distribute sectors to multiple cryptographic devices, providing
scalability through parallelization and improved resiliency/availability. This
approach offers isolation between sectors, ensuring that a compromise in one
does not extend to others, thereby supporting damage containment. At the same
time, it simplifies operational robustness by removing the need for
cross-device state coordination, since each sector is restricted to its own
signature space.</t>
      </section>
      <section anchor="keystate-transfer">
        <name>Key/State Transfer</name>
        <t>Stateful HBS key/state transfer between cryptographic modules entails having a means
to migrate one instance of a Stateful HBS key/state on a source device to a separate
destination device, while ensuring that any copy of the key/state is deleted
from the source device.</t>
        <t>This capability may help alleviate the aforementioned concern regarding
operating devices beyond their expected lifetimes by allowing operators to
migrate Stateful HBS key/state to a newer device when the original device begins to
approach its end-of-life. However, it still leaves the operator vulnerable to
having the source device fail before the key/state can be transferred,
effectively causing the loss of the key/state. Hence, it will not be of much
help addressing the single point of failure issue identified for root trees,
but may be useful for managing subordinate trees.</t>
        <t>In addition to complete key/state transfer, a device holding part of the total
available OTS signatures may transfer some unused capacity to another device
(partial state transfer). In more advanced deployments, state fragments from
two devices may be merged to reconstruct or continue signature operations.
These operations carry risk: ensuring no overlap in used indices, ensuring
atomicity of transfer/merge operations, managing consistency, possible
conflicts, and durability of state across devices. Such approaches require
robust synchronization, auditability, and appropriate backup mechanisms to
avoid double-signing or loss of capacity.</t>
        <t>A more elaborate variant of key transfer, going beyond what <xref target="SP-800-208"/>
allows, can be found described in <xref target="alt-backup-mgmt"/> where key transfer is
accomplished using a two-step export and import process with hash-based
transfer validation to yield a more robust transfer mechanism.</t>
      </section>
      <section anchor="key-rotation">
        <name>Key Rotation</name>
        <t>Key rotation, such as that defined in <xref target="RFC8649"/>, would generate new Stateful HBS
keys on an as-needed basis, and provide a means to transition the system on to
using this new Stateful HBS key, while generating the next key in the chain in
preparation of a future rotation/update. However, this just shifts the problem
to the PKI and certificate handling.</t>
        <t>Key rotation is not foolproof since in most use cases it will require
redundancy to ensure there is at least one Stateful HBS signing key available to
attest to newly generated keys. In addition, for many applications the device
keys cannot be updated due to engineering constraints or security reasons.</t>
      </section>
      <section anchor="variable-length-signature-chains">
        <name>Variable-length Signature Chains</name>
        <t>A variant of the key rotation approach is to have an available signing
tree endorse a new subordinate tree when it is about to become exhausted (e.g.,
use its final OTS to sign the root node of a new subordinate tree, creating a
{n+1}-layer multi-tree from an {n}-layer multi-tree). This process can in
theory be repeated as many times as necessary. However, this entails having a
multi-tree scheme with a variable number of levels, and hence, variable length
signatures. Such dynamically extensible constructions are research-class and
are not currently standardized or deployed.</t>
        <t>In addition to departing quite significantly from the current Stateful HBS
specifications and <xref target="SP-800-208"/>, this approach has a number of significant
challenges on both the engineering and operational fronts. Firstly, the
variable length nature of the signature can lead to variable length
verification of signatures, which may cause significant issues for use cases
with strict time constraints (e.g., secure booting of a semiconductor device).
From an operational perspective, the ability of a subordinate tree to sign
either messages or new subordinate trees leads to severe security implications
as the rigor around authorizing those two types of operations will vary
dramatically, leading to either a much more onerous message signing operation,
or a much more risky subordinate tree signing operation. This may put the
system operator in an untenable situation where no users are satisfied with the
resulting solution, and hence, should not be considered as a viable solution.</t>
      </section>
      <section anchor="pre-assigning-states">
        <name>Pre-assigning States</name>
        <t>In some applications, individual one-time signatures (or states) can be
pre-assigned to the to-be-signed objects. This may for example be possible if
the signed objects are monotonically increasingly numbered. One example of such
a use case may be software signing. This solution basically externalizes the
state management to the to-be signed messages.</t>
        <t>Expanding on the given example, for software that is released with strictly
increasing, simple single-position version numbers (i.e., versions 1, 2, 3...),
this can be trivially implemented. As versions have a one-to-one correspondence
to a Stateful HBS signing state, operators must ensure that versions can only be
minted a single time. This may require skipping version numbers if a release
process failed, to avoid double-signing.</t>
        <t>This scheme can be adapted to more complicated release schemes: for example,
minor update-releases 1.0 to 1.99 can be accommodated by assigning signatures
1-100 for these version numbers, while release 2.0-2.99 would get signatures
101-200. The assignments must be fixed as the scheme is set up, and operators
should take into account that they are strictly limiting the number of update
releases. In the described solution to state management, one must move up a
major release number after 99 minor releases, even if this would break, e.g.,
semantic versioning conventions.</t>
        <t>A variant of pre-assigning signatures is doing this on the basis of time, which
we describe in the next section.</t>
      </section>
      <section anchor="time-based-state-management">
        <name>Time-based State Management</name>
        <t>As a variant of pre-assigning one-time signatures based on external counters,
it is in theory possible to base the selection of one-time signature indexes on
the current date and time. For example, if a given Stateful HBS instance offers 1024
total signatures, they could be broken up into 8 groups of 128 OTS instances
each, with the first 128 allowed to be used in the first time window, the
second 128 in the second time window, and so on, until the signature space is
effectively exhausted after 8 time windows. Note that a time-based approach to
state management will "waste" any OTS keys that are unused in past time
windows. One must not attempt to use these keys after the time window has gone
by.</t>
        <t>Any time-based approach has a very strict reliance on accurate time-keeping and
synchronization of clocks. In particular, we identify that at least the
following engineering-related challenges need to be considered:</t>
        <ul spacing="normal">
          <li>
            <t>Signing devices must have accurate timekeeping (which is a very challenging
engineering problem <xref target="TIMEFALSEHOODS"/>).</t>
          </li>
          <li>
            <t>Time on signing devices must not be allowed to ever move backwards, as this
can cause double-signing.</t>
          </li>
          <li>
            <t>Within time windows, signers must track the number of signatures produced to
ensure it does not exceed the number allowed within the window.</t>
          </li>
          <li>
            <t>Signing devices must still operate consistently with the requirements of
state keeping for Stateful HBS: the signature index within a time window should
still appear to be updated atomically, and signatures must not be released
before state changes have been recorded.</t>
          </li>
          <li>
            <t>A system should be robust against exhaustion of the number of signatures
available in a time window, as in this case it is required to wait until the
next time window starts before new messages can be signed.</t>
          </li>
          <li>
            <t>Time on signing devices should not be allowed to be moved forward maliciously
or accidentally, which would allow for a simple denial-of-service attack by
skipping over portions of the signature space.</t>
          </li>
          <li>
            <t>If a signing device needs to be replaced, the replacement device must be set
up with its time in sync with or ahead of the device it is to replace. This
implies the current time on signing devices should be continuously recorded.</t>
          </li>
          <li>
            <t>Rate limiting may need to be considered, as exhausting the available
signatures in a given time window may otherwise be easy.</t>
          </li>
          <li>
            <t>It may be necessary for signers to keep a separate clock for time-based state
management, and one for not necessarily monotonically increasing "wall-time",
e.g., if signed artifacts are expected to be time-stamped with real-world time.</t>
          </li>
        </ul>
        <t>If these concerns can not be sufficiently addressed, time-based state
management as described in this paragraph should not be used. Note that this
list of concerns is not exhaustive, and other, unmentioned, concerns may also
be relevant to the security of a time-based solution.</t>
        <t>Time-based systems can be backed up by simply recording the private keys and
the configuration of the time windows. In case of loss of a signing device, a
time-based state management system can be recovered by using this information
to bring online a new device in the next time window. This approach may also be
used as a recovery mechanism in the case of (suspected) state consistency
problems during a time window. However, the operator must not allow new
signatures to be produced before the new time window starts, unless they know
the exact state at which the previous device became unavailable and are able to
set up the new device accordingly. Waiting until the start of the next time
window avoids double signing, as the OTS keys assigned to future time windows
are guaranteed to have not yet been used. However, this might incur significant
downtime of the signing systems. Downtime may be avoided by forcibly moving the
signing device to the next time window by incrementing its clock; however, this
induced clock drift will then need to be accounted for in the future. If clock
drift is to be avoided, this approach should account for availability
considerations.</t>
      </section>
      <section anchor="interval-based-approaches">
        <name>Interval-based Approaches</name>
        <t>The State Reservation Strategy described in section 5 of <xref target="MCGREW"/> provides
another means of managing the state by allowing users to reserve intervals of
the signing space, marking the interval's associated OTS keys as being used in
the overall HBS state, which is then written back to non-volatile memory prior
to their usage. The OTS keys within the reservation interval are then consumed
as-needed, without having to update the state again until they have all been
consumed and additional OTS keys are required. Note that the reserved OTS keys
are kept in dynamic memory so they will be lost if the signing device loses
power or is reset, resulting in a reduction in the number of usable signatures
for a given HBS instantiation.</t>
        <t>Over provisioning can be used to ensure a sufficient number of signatures can
be provided in the presence of unexpected losses due to power loss or resets.
Over provisioning will cause a minor increase between 2% and 12% on signature
length as the MTS validation paths increase to accommodate the increased Merkle
tree height. However, reservation eliminates the need to update the state
after each OTS key is used, minimizing the likelihood of state reuse due to
state update failures and coherency issues.</t>
        <t>Multiple signing devices can in theory utilize reservation intervals to
carve out portions of signing space so that a single S-HBS key can be shared
amongst multiple devices, leading to potential performance and
disaster-recovery benefits. However, great care must be taken to manage the
reservations to ensure there is no overlap or repeated reservation of a
given interval, either in part or in whole.</t>
      </section>
    </section>
    <section anchor="alt-backup-mgmt">
      <name>Backup Management Beyond NIST SP-800-208</name>
      <t>In this section, an alternative backup mechanism for Stateful HBS is presented in a
generic form, which makes the strategy applicable for both multi-tree instances
XMSS<sup>MT</sup> and HSS.  However, following the same arguments as in
<xref target="sectorization"/>, with minor modifications, the presented strategy is also
applicable for single-tree instances such as XMSS and LMS.</t>
      <t>The strategy presented in this section builds upon the multi-tree variant
approach from <xref target="SP-800-208"/>, and aims to mitigate its limitations described in
<xref target="nist-dist-multi-tree"/>.  Thus, it is assumed that already a top-level Merkle
tree (for signing the root-nodes of sub-trees) and several bottom-level Merkle
trees (for signing messages) are initiated.  These bottom-level trees may be
implemented on different hardware modules in order to obtain redundancy and
improve availability.  Let R be the number of these already initiated
bottom-level trees.  Let h<sub>0</sub> be the height of the top-level-tree.  It
is assumed that R + 1 is strictly smaller than 2<sup>h<sub>0</sub></sup>, the
number of leaves of the top-level tree.</t>
      <t>In this new strategy, after the completed key generation procedure from the
multi-tree variant approach from <xref target="SP-800-208"/>, further bottom-level trees are
generated, one by one, in one of the hardware modules.  These new  bottom-level
trees are each generated from a different seed, which is chosen uniformly at
random.  For the sake of clarity, let us introduce some notation:</t>
      <ul spacing="normal">
        <li>
          <t>S denotes the number of these newly generated bottom-level trees.  Note that
at most 2<sup>h<sub>0</sub></sup> - R new bottom-level trees can be
generated, i.e. S is lower or equal to 2<sup>h<sub>0</sub></sup> - R.  In the
following we suppose that S is <em>strictly smaller</em> than
2<sup>h<sub>0</sub></sup> - R.</t>
        </li>
        <li>
          <t>I<sub>new</sub> denotes the set of indices that belong to these newly
generated bottom-level trees, i.e. I<sub>new</sub> = {R, R+1, ..., R+S-1}.
I<sub>new</sub> is zero-indexed here.</t>
        </li>
      </ul>
      <t>For each new bottom-level tree, after it has been generated, the following
steps must be performed:</t>
      <ul spacing="normal">
        <li>
          <t>sign the corresponding root node with an unused OTS key from the top-level
tree,</t>
        </li>
        <li>
          <t>securely <em>key export</em> (as described in <xref target="keymovement"/>) the seed, which was
used to generate the bottom-level tree,</t>
        </li>
        <li>
          <t>export the signature of the root node, the corresponding OTS key index and
finally the hash of the seed, using appropriate domain separation (i.e.
ensuring there is no domain overlap with the hashes in the Stateful HBS scheme, and
the hash of the seed includes the public key and leaf index to mitigate
multi-target attacks),</t>
        </li>
        <li>
          <t>irreversibly delete the seed and the bottom-level tree from the hardware
module.</t>
        </li>
      </ul>
      <t>The newly generated bottom-level trees (i.e. those bottom-level trees, whose
indices belong to I<sub>new</sub>) are only used in order to guarantee
availability in the <em>worst-case scenario</em>, where at the same time both</t>
      <ul spacing="normal">
        <li>
          <t>none of the R bottom-level Merkle trees (which were generated according to
the multi-tree variant approach from <xref target="SP-800-208"/>) are available for signing
messages and</t>
        </li>
        <li>
          <t>the top-level Merkle tree (which is used for signing the root-nodes of
sub-trees) is also not available anymore.</t>
        </li>
      </ul>
      <t>This scenario may, for example, happen if all hardware modules are broken at
the same time.</t>
      <t>As soon as this worst-case scenario occurs, the newly generated bottom-level
trees (i.e. those bottom-level trees, whose indices belong to I<sub>new</sub>)
need to be initiated in order to ensure availability. In order to do this the
following steps must be performed:</t>
      <ul spacing="normal">
        <li>
          <t>initiate a new hardware module</t>
        </li>
        <li>
          <t>securely <em>key import</em> (as decribed in <xref target="keymovement"/>) the first unused seed
into this hardware module</t>
        </li>
        <li>
          <t>generate the bottom-level tree corresponding to the seed</t>
        </li>
        <li>
          <t>irreversibly delete the seed from the backup medium</t>
        </li>
        <li>
          <t>perform a correctness check by letting the hardware module output the hash of
the seed</t>
        </li>
      </ul>
      <t>Now this bottom-level tree can be used to sign messages. As soon as no more OTS
on the bottom-level tree are available or as soon as the hardware module is
broken, the above steps with a new seed from the backup medium can be repeated.</t>
      <t>Note that the resulting signatures generated from these backed up seeds do not
require any special processing on the verifier side. The signature stored
alongside the backed up seed, and the signature generated from the bottom-level
trees created from the backed up seed can be combined to match the format of a
signature over the complete tree.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations are given throughout this document. Further security
considerations, which are not already covered in this document, are given in
<xref target="SP-800-208"/>, <xref target="MCGREW"/>, <xref target="FIPS205"/>, <xref target="RFC8391"/> and <xref target="RFC8554"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="MCGREW" target="https://eprint.iacr.org/2016/357.pdf">
        <front>
          <title>State Management for Hash-Based Signatures</title>
          <author initials="D." surname="McGrew">
            <organization/>
          </author>
          <author initials="P." surname="Kampanakis">
            <organization/>
          </author>
          <author initials="S." surname="Fluhrer">
            <organization/>
          </author>
          <author initials="S." surname="Gazdag">
            <organization/>
          </author>
          <author initials="D." surname="Butin">
            <organization/>
          </author>
          <author initials="J." surname="Buchmann">
            <organization/>
          </author>
          <date year="2016" month="November" day="02"/>
        </front>
        <seriesInfo name="Security Standardization Research 2016" value=""/>
      </reference>
      <reference anchor="SP-800-208" target="https://doi.org/10.6028/NIST.SP.800-208">
        <front>
          <title>NIST SP 800-208: Recommendation for Stateful Hash-Based Signature Schemes</title>
          <author initials="D." surname="Cooper" fullname="David Cooper">
            <organization/>
          </author>
          <author initials="D." surname="Apon" fullname="David Apon">
            <organization/>
          </author>
          <author initials="Q." surname="Dang" fullname="Quynh Dang">
            <organization/>
          </author>
          <author initials="M." surname="Davidson" fullname="Michael Davidson">
            <organization/>
          </author>
          <author initials="M." surname="Dworkin" fullname="Morris Dworkin">
            <organization/>
          </author>
          <author initials="C." surname="Miller" fullname="Carl Miller">
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
        <seriesInfo name="NIST Special Publication" value=""/>
      </reference>
      <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
        <front>
          <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
          <author initials="" surname="National Institute of Standards and Technology">
            <organization/>
          </author>
          <date year="2024" month="August" day="13"/>
        </front>
        <seriesInfo name="Federal Information Processing Standards" value=""/>
      </reference>
      <reference anchor="FIPS205" target="https://doi.org/10.6028/NIST.FIPS.205">
        <front>
          <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
          <author initials="" surname="National Institute of Standards and Technology">
            <organization/>
          </author>
          <date year="2024" month="August" day="13"/>
        </front>
        <seriesInfo name="Federal Information Processing Standards" value=""/>
      </reference>
      <reference anchor="BH16" target="https://eprint.iacr.org/2016/1042.pdf">
        <front>
          <title>Oops, I did it again – Security of One-Time Signatures under Two-Message Attacks.</title>
          <author initials="L." surname="Bruinderink">
            <organization/>
          </author>
          <author initials="A." surname="Hülsing">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Fluhrer23">
        <front>
          <title>Oops, I did it again revisited; another look at reusing one-time signatures</title>
          <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="ETSI-TR-103-692" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103692/01.01.01_60/tr_103692v010101p.pdf">
        <front>
          <title>State management for stateful authentication mechanisms</title>
          <author initials="" surname="European Telecommunications Standards Institute (ETSI)">
            <organization/>
          </author>
          <date year="2021" month="November"/>
        </front>
      </reference>
      <reference anchor="BSW16" target="https://link.springer.com/chapter/10.1007/978-3-662-49896-5_28">
        <front>
          <title>New Negative Results on Differing-Inputs Obfuscation</title>
          <author initials="M." surname="Bellare">
            <organization/>
          </author>
          <author initials="I." surname="Stepanovss">
            <organization/>
          </author>
          <author initials="B." surname="Waters">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="HBSX509" target="https://www.ietf.org/archive/id/draft-gazdag-x509-hash-sigs-02.html">
        <front>
          <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for Hash-based Signatures</title>
          <author initials="K." surname="Bashiri">
            <organization/>
          </author>
          <author initials="S." surname="Fluhrer">
            <organization/>
          </author>
          <author initials="S." surname="Gazdag">
            <organization/>
          </author>
          <author initials="D." surname="Van Geest">
            <organization/>
          </author>
          <author initials="S." surname="Kousidis">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TIMEFALSEHOODS" target="https://gist.github.com/timvisee/fcda9bbdff88d45cc9061606b4b923ca">
        <front>
          <title>Falsehoods programmers believe about time</title>
          <author initials="T." surname="Visée">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC8391">
        <front>
          <title>XMSS: eXtended Merkle Signature Scheme</title>
          <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
          <author fullname="D. Butin" initials="D." surname="Butin"/>
          <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
          <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
          <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8391"/>
        <seriesInfo name="DOI" value="10.17487/RFC8391"/>
      </reference>
      <reference anchor="RFC8554">
        <front>
          <title>Leighton-Micali Hash-Based Signatures</title>
          <author fullname="D. McGrew" initials="D." surname="McGrew"/>
          <author fullname="M. Curcio" initials="M." surname="Curcio"/>
          <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8554"/>
        <seriesInfo name="DOI" value="10.17487/RFC8554"/>
      </reference>
      <reference anchor="RFC9162">
        <front>
          <title>Certificate Transparency Version 2.0</title>
          <author fullname="B. Laurie" initials="B." surname="Laurie"/>
          <author fullname="E. Messeri" initials="E." surname="Messeri"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <date month="December" year="2021"/>
          <abstract>
            <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
            <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
            <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9162"/>
        <seriesInfo name="DOI" value="10.17487/RFC9162"/>
      </reference>
      <reference anchor="RFC8649">
        <front>
          <title>Hash Of Root Key Certificate Extension</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="August" year="2019"/>
          <abstract>
            <t>This document specifies the Hash Of Root Key certificate extension. This certificate extension is carried in the self-signed certificate for a trust anchor, which is often called a Root Certification Authority (CA) certificate. This certificate extension unambiguously identifies the next public key that will be used at some point in the future as the next Root CA certificate, eventually replacing the current one.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8649"/>
        <seriesInfo name="DOI" value="10.17487/RFC8649"/>
      </reference>
      <reference anchor="RFC8411">
        <front>
          <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="R. Andrews" initials="R." surname="Andrews"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8411"/>
        <seriesInfo name="DOI" value="10.17487/RFC8411"/>
      </reference>
    </references>
    <?line 915?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions at the 2nd Oxford Post-Quantum
Cryptography Summit 2023.</t>
      <t>We gratefully acknowledge Melissa Azouaoui for her input to this document.</t>
      <t>The abstract and the introduction are based on the introduction in <xref target="HBSX509"/>.
Thanks go to the authors of this document. "Copying always makes things easier
and less error-prone" - <xref target="RFC8411"/>.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>
          <t>Jeff Andersen (Google)</t>
        </li>
        <li>
          <t>Bruno Couillard (Crypto4A Technologies)</t>
        </li>
        <li>
          <t>Stefan-Lukas Gazdag (genua GmbH)</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
