<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-00"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="May" day="24"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatiblity, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
  </front>
  <middle>
    <?line 138?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk
of store and decrypt attacks, where data encrypted today using
traditional algorithms could be decrypted in the future by an attacker
with a Cryptographically-Relevant Quantum Computer (CRQC). While
traditional authentication is only at risk once a CRQC exists, it is
important to consider the transition to post-quantum authentication
before this point.  This is particularly relevant for systems where
algorithm turn-over is complex or takes a long time (e.g., long-lived
systems with hardware roots of trust), or where future checks on past
authenticity play a role (e.g., digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms
means that less cryptanalysis of such algorithms is available than
for long-established counterparts, such as RSA and elliptic-curve based
solutions for confidentiality and authenticity. This has drawn attention
to hybrid cryptographic schemes, which combine both traditional
and post-quantum (or more generally next-generation) algorithms in one
cryptographic scheme. These may offer increased assurance for implementers,
namely that as long as the security of one of the two component algorithms of
the hybrid scheme holds, the confidentiality or authenticity offered by
that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case
and security threat model. Conservative users may not have complete trust
in the post-quantum algorithms or implementations available,
while also recognizing a need to start post-quantum transition. For such
users, hybridization can support near-term transition while also avoiding
trusting solo post-quantum algorithms too early. On the other hand, hybrid
schemes, particularly for authentication, may introduce significant complexity
into a system or a migration process, so might not be the right choice for all.
For cases where hybridization is determined to be advantageous, a decision on
how to hybridize needs to be made. With many options available, this document
is intended to provide context on some of the trade-offs and nuances to consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and
in an initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of
the hybrid/dual signatures and the risk of downgrade/stripping attacks.
There are also a range of requirements and properties that may be required
from hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of
different hybrid signature scheme designs and different security goals
for them. It is intended as a resource for designers and implementers of
hybrid signature schemes to help them decide what properties they do and
do not require from their scheme. It does not attempt to answer the
question of whether or not a hybrid scheme is desirable for, or should be
used in a given case. It also intentionally does not propose concrete hybrid
signature combiners or instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a
final version of this document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>01: Significant fleshing out after feedback from IETF 118.</t>
          </li>
          <li>
            <t>00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperatbility of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
migration, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future migration to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Process <xref target="NIST_PQC_FAQ"/>.
Thus, if and when further information on caveats and implementation issues
come to light, it is less likely that a "break" will be catastrophic.
Instead, such vulnerabilities and issues may represent a weakening of
security - which may in turn be offset if a hybrid approach
has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity
to a protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term committment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptograpthic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompassess more specific concepts of hybrid signature
security, such as 'hybrid unforgability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication is not simply provided by the sender
to the receiver through correct verification of the digital
signature(s), but potentially through further investigation on the
receiver side that may extend well beyond traditional signature
verification behavior. For instance, this can intuitively be seen in
cases of a message containing a context note on hybrid authentication,
that is then signed by all component algorithms/the hybrid signature
scheme. If an adversary removes one component signature but not the
other, then artifacts in the message itself point to the possible
existence of hybrid signature such as a label stating “this message must
be hybrid signed”. This might be a counter measure against stripping
attacks if the verifier expects a hybrid signature scheme to have this
property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional
signature security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input
a hybrid signature (and message) and output a valid component signature
(and potentially different message) that will verify correctly. In other
words, separation of the hybrid signature into component signatures
implies that the component signature will fail verification (of the
component signature scheme) entirely. Therefore, authentication is
provided by the sender to the receiver through correct verification of
the digital signature(s), as in traditional signature security
experiments. It is not dependent on other components, such as message
content checking, or protocol level aspects, such as public key
provenance. As an illustrative example distinguishing WNS from SNS,
consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and
<tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m'
= (hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with
the hybrid artifact embedded in the message instead of the signature,
could be correctly verified. The separation would be identifiable
through further investigation but the signature verification itself
would not fail. Thus, this case shows WNS (assuming the verification
algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on
the public key certificate chains to explicitly define hybrid use of the
public key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without
<tt>Sigma_2.pk</tt>. This implies pushing the hybrid artifacts into the
protocol and system level and a dependency on the security of other
verification algorithms (namely those in the certificate chain). This
further requires that security analysis of a hybrid digital signature
requires analysis of the key provenance, i.e., not simply that a valid
public key is used but how its hybridization and hybrid artifacts have
been managed throughout the entire chain. External dependencies such as
this may imply hybrid artifacts lie outside the scope of the signature
algorithm itself. SNS may potentially be achieveable based on
dependencies at the system level.</t>
          <!--
However, since those artifacts are outside the security definition
scope for a digital signature, namely definitions such EUF-CMA, we do
not include them in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component
signatures needed to achieve a successful verification present in the
hybrid signature, but also that verification of both component
algorithms occurs simultaneously. Namely, "missing" information needs to
be computed by the verifier so they cannot “quit” the verification
process before both component signatures are verified. SV mimics
traditional digital signatures guarantees, essentially ensuring that the
hybrid digital signature behaves as a single algorithm vs. two separate
component stages. Alternatively phrased, under an SV guarantee it is not
possible for an unerring verifier to initiate termination of the hybrid
verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
          <!--

What the sender is assured of is that one of two cases occurred: either
1) the receiver ignored the digital signatures or 2) the receiver
initiated verification of the digital signatures (resulting in either
successful or failed verification). WNS complicates this situation,
resulting in six cases instead of two: 1) the receiver ignored the
digital signatures, 2) the receiver verified the full hybrid combination
(with success or failure); 3) the receiver initiated verification of the
hybrid digital signatures, but terminated once the standard component
succeeded or failed; 4) the receiver initiated verification of the
hybrid digital signatures, but terminated once the post-quantum
component succeeded or failed; 5) the receiver initiated verification of
the standard signature only (with success or failure), and 6) the
receiver initiated verification of the post-quantum signature only (with
success or failure). It may initially appear that (3) and (5) (resp. (4)
and (6)) are similar, however (3) and (4) are precisely the cases
eliminated by SNS, i.e. that the verifier does not take as input the
hybrid digital signatures, instead only attempting verification on one
component. SNS thus improves the situation to only four options. Still,
the verifier can still terminate upon correctly checking only one
component signature without actually verifying both parts. One could
argue that a receiver who has checked the accuracy of their
implementation should be assured that both components are verifying.
This misconstrues the original intent though, which is to correctly
mirror traditional digital signatures properties in hybrid digital
signatures; ideally, the sender should be assured that there are only
two options: 1) ignore the digital signatures or 2) verify the digital
signatures (resulting in either failure or full
verification). Simultaneous Verification addresses this property.

-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined,
based on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be
made that is generalizable to all such signatures. Such generality can
also result in simplified constructions whereas more tailored hybrid
variants might be more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other
cryptographic components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature
constructions are expected to be as performant as possible. For most
hybrid signatures this means that the computation time should only
minimally exceed the sum of the component signature computation time. It
is noted that performance of any variety may come at the cost of other
properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>,
hybrid signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts
are used), public keys, and the hybrid signature.  For the hybrid
signature, size should no more than minimally exceed the signature size
of the two component signatures. In some cases, it may be possible for a
hybrid signature to be smaller than the concatenationation of the two
component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>, duplicated information should
be avoided when possible. This might concern repeated information in
hybrid certificates or in the communication of component certificates in
additional to hybrid certificates (for example to achieve
backwards/forwards-compatibility), or sending multiple public keys or
signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to
detect the change during verification. An example of this includes
simple concatenation of signatures without any artifacts used. Nested
signatures (where a message is signed by one component algorithm and
then the message-signature combination is signed by the second component
algorithm) may also fall into this category, dependent on whether the
inner or outer signature is stripped off without any artifacts
remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message, signature,
or at the protocol level, etc.). This may enable the verifier to detect
if a component signature is stripped away from a hybrid signature, but
that detectability depends highly on the type of artifact and
permissions.  For instance, if a message contains a label artifact "This
message must be signed with a hybrid signature" then the system must be
allowed to analyze the message contents for possible artifacts. Whether
a hybrid signature offers (Weak/Strong) Non-Separability might also
depend on the implementation and policy of the protocol or application
the hybrid signature is used in on the verifier side. Such policies may
be further ambiguous to the sender, meaning that the type of
authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting
a new message as the message/inner signature combination and verify only
the outer signature.  In this case, the inner signature-tag is an
artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the
actual message, the certificate, or in other non-signature components,
this notion more closely ties to traditional algorithm security notions
(such as EUF-CMA) where security is dependent on the internal construct
of the signature algorithm and its verification. In this type, the
verifier can detect artifacts on an algorithmic level during
verification. For example, the signature itself may encode the
information that a hybrid signature scheme is used. Examples of this
type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but also only
when the verifier has verified both signatures. Moreover, no information
is leaked to the receiver during the verification process on the
possibile validity/invalidity of the component signatures until both
verify (or fail to verify). This construct most closely mirrors
traditional digital signatures where, assuming that the verifier does
verify a signature at all, the result is either a positive verification
of a the full signature or a failure if the signature is not valid. For
hybrid signatures, a <tt>full signature</tt> implies the hybridization of both
component algorithms, and therefore the strongest non-separability
notion enforces an all-or-nothing approach to verification. Examples of
algorithms providing this type of security can be found in
<xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--

Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.

-->

</section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping
attacks. This, however, depends strongly on where such evidence resides
(e.g., in the message, the signature, or somewhere on the protocol level
instead of at the algorithmic level). Even commonly discussed hybrid
approaches, such as concatenation, are not inherently tied to one type
of security (e.g., WNS or SNS). This can lead to ambiguities when
comparing different approaches and assumptions about security or lack
thereof. Thus in this section we cover artifact locations and also walk
through a high-level comparison of a few hybrid categories to show how
artifact location can differ within a given approach.  Artifact location
is tied to non-separability notions above; thus the selection of a given
security guarantee and general hybrid approach must also include finer
grained selection of artifact placement.</t>
      <!--

In this section we exemplify the difference in non-separability guarantees
depending on the artifact location for three types of hybridization, namely
concatenation, nesting, and 'fused' hybrid explained next.

-->

<!--

While the above discussion about the non-separability spectrum covers a spectrum
of security guarantees and existence of artifacts are linked to achieving those,
this (sub-)section covers some specific examples of artifact placement.

-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within
the message to the signature algorithm to the protocol level and even
into policy, as shown in <xref target="tab-artifact-location"/>.  For example, one
artifact location could be in the message to be signed, e.g., containing
a label artifact.  Depending on the hybrid type, it might be possible to
strip this away. For example, a quantum attacker could strip away the
quantum-secure signature of a concatenated dual signature, and (being
able to forge, e.g., ECDSA signatures) remove the label artifact from
the message as well. So, for many applications and threat models, adding
an artificat in the message might not prevent stripping attacks.
Another artifact location could be in the public key certificates as
described in <xref target="I-D.ounsworth-pq-composite-sigs"/>. In yet another case,
artifacts may be present through the fused hybrid method, thus making
them part of the signature at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent
on system policy, then cryptographic analysis must necessarily be
reliant on specific policies and it may not be possible to describe a
scheme's security in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in
different locations even within a single, common approach. We look at
the following categories of approaches: concatenation, nesting, and
fusion.  This is to illustrate that a given approach does not inherently
imply a specific non-separability notion and that there are subtleties
to the selection decision, since hybrid artifacts are related to
non-separability guarantees.  Additionally, this comparison highlights
how artifacts placement can be identical in two different hybrid
approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation,
nesting, and fusion) for clarity in description, before showing how each
one may have artifacts in different locations in
<xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component
algorithms <tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is
calculated as a concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID,
m)</tt>.</t>
          </li>
        </ul>
        <!--

WNS may be a goal of a concatenation approach.  NB: I took it out
because I don't see a reason why there shouldn't been a policy or
protocol artificat making concatenation SNS.

-->

<ul spacing="normal">
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in
a layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
        </ul>
        <!--

WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted
in a stripping attack) may be goals of a nesting approach.

-->

<ul spacing="normal">
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly
separated to form one or more valid component constructs. For example,
if both signature schemes are signatures schemes constructed through the
Fiat-Shamir transform, the component signatures would include responses
r_1 and r_2 and challenges c_1 and c_2, where c_1 and c_2 are hashes
computed over the respective commitments comm_1 and comm_2 (and the
message).  A fused hybrid signature could consist of the component
responses, r_1 and r_2 and and a challenge c that is computed as a hash
over both commitments, i.e., c = Hash(comm_1,comm_2,message).  As such,
c does not belong to either of the component signatures but rather both,
meaning that the signatures are 'entangled'.</t>
          </li>
        </ul>
        <!--

SNS and potentially SV are goals of a true hybrid approach.

-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type
of combiner, there are in fact several possible artifact locations
depending on implementation choices. Artifacts help to support detection
in the case of stripping attacks, which means that different artifact
locations imply different overall system implementation considerations
to be able to achieve such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as
there are no prescribed artifacts and therefore non-separability is not
achieved.  However, as can be seen, this does not imply that every
implementation using concatenation fails to achieve
non-separability. Thus, it is advisable for implementors to be
transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable
as the authenticity of the message relies on the validity of the
signature, and the artifact location means that the signature in turn
relies on the authentic content of the message (the artifact
label). This creates a risk of circular dependency. Alternative
approaches such as cases 3 and 4 solve this circular dependency by
provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may
be similar among some approaches. For instance, case 3 and case 6 both
contain artifacts in the certificate. Naturally these examples are
high-level and further specification on concrete schemes in the
categories are needed before prescribing non-separability guarantees to
each, but this does indicate how there could be a strong similarity
between such guarantees.  Such comparisons allow for a systematic
decision process, where security is compared and identified and, if
schemes are similar in the desired security goal, then decisions between
schemes can be based on performance and implementation ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire
chain must then also use a similar combiner if a straightforward
security argument is to be made. Other cases, such as 8, 9, 10, and 11
put artifacts within the signature itself, meaning that these bear the
closest resemblance to traditional schemes where message authenticity is
dependent on signature validity.</t>
        <!--

The artifact placements in nesting combiners may be surprisingly similar
to those in concatenation option cases 2, 3, and 4. Namely, if `sig_2 =
Sigma_2.Sign(hybridAlgID, (m, sig_1))`, then the "message" `(m, sig_1)`
input into `Sigma_2.Sign` actually contains the artifact and acts as a
label.  Unless an additional label is provided within $m$ itself,
$sig_1$ does not therefore contain an artifact. Where the artifact is
located is necessarily dependent upon the threat model; guessing which
algorithm is more at risk from a stripping attack and choosing the order
of nesting accordingly may change the location of an artifact.

Under a fused combiner, artifacts of hybridization are present within
the signature. This can be coupled with artifacts in the message, such
as through use of a label, and/or artifacts in the certificate if keys
are also provisioned in a combined certificate.

-->

</section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the
case of FIPS approval considerations as well as NIST, which has provided
basic guidance on hybrid signature use. NIST provides the following
guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to
approved (or even existing) signature schemes. Such a new, singular
algorithm relies on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security
of the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm
implementation in a black-box way. It may potentially change the
specifics of the other component algorithm implementations. As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
blackbox way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA,
the adversary 'wins' the security experiment if it can produce a new
message such that a message-signature pair <tt>(m, sig)</tt> with it correctly
verifies. This traditional security notion is challenged under a hybrid
construct.</t>
      <t>The most straightforward comparison would be for the adversary to
attempt to produce a new message <tt>m'</tt> that a message-hybrid signature
pair <tt>(m', sig_h)</tt> correctly verifies.  However, such a guarantee
depends on the signature being strongly non-separable. Otherwise, in
practical terms a security experiment must capture the case that an
existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of traditional
security analysis and represent considerations that would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used
in security protocols. It is an informational document and does not
directly affect any other Internet draft. The security considerations
for any specific implementation or incorporation of a hybrid scheme
should be discussed in the relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS.</name>
        <t>There is an inherent mutual exclusion between backwards compatibility
and SNS.  While WNS allows for a valid separation under leftover
artifacts, SNS will ensure verification failure if a receiver attempts
separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability.</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process
hybrid signatures, all differences between the legacy signature format
and the hybrid signature format must be allowed to be ignored, including
skipping verification of signatures additional to the classical
signature. As such, if a system does skip an component signature,
security does not rely on the security of all component signatures. Note
that this mutual exclusion occurs at the verification stage, as a hybrid
signature that is verified by a system that can process both component
schemes can provide hybrid unforgeability even if another (legacy)
system, processing the same hybrid signature, loses that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval.</name>
        <t>It seems that the more simultaneous verification is enforced by the
hybrid design, the higher is the need-for-approval as simultaneous
verification algorithms fuse (or 'entangle') the verification of the
component algorithms such that verification operations from the
different component schemes depend on each other in some way. For
example, concatenation of signatures in a black-box way without any
artefacts is, e.g., FIPS-approved, but the component signatures are
usually verified separately and no 'simultaneous verification' is
enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="5" month="April" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="9" month="May" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19/Y4cRbbn//EUsWak7vZWVbuNgaHZQbfxB/QFG0ObQXe5
iM6qjOrK66zMIjOr2zXAaJ5ipZXuSvsg96/dN5kn2fMZH5lZbXsYZrXSMhqw
qyojI06cON/nF9Pp1HRFV7pT+9lu3hS5bYurKuu2jbPtxi26ZrtuTTafN+76
1BauW043P26LzXRFv56G3+T1osrWME7eZMtuOvJTHTg8NL13z+RZBw/dv3f/
wfTee9P7D8wCPriqmx28rlrWxhSb5tTCz9vu/r17H967b1663U3d5Kf2vOpc
U7lu+ghfaUzbZVX+Q1bWFYy4c63ZFKf2u65eTGxbN13jli38abfGP3wPP9/O
10XbFnX1YreBJ84fv3hiTLbtVnVzaqydwv8tTKI9tc9m9pOiyl1JH/E6nxVV
Fn9aN1dZVfwp62DAU3sBU5nXr86+ou/cOivKU1vBI7M5PfJPLf8g+3G2qNfp
2z6Z2c+y0kXv+qQpui4Ln6bvepZdZ6V9XrfdVZPlW6CfvVis6rqM3z2nIWYr
GOKfqk07c/k2feujmX1YV1VdlrvozY9c0eTADMlXb7DUnJ+DxfFzt633ycw+
aop2Ab+L3vykrBtXLVz6Xfrqbz6HxeMfYf0Pd3PX2Au32MJKd/ahq2DH4ykt
y3qW/1O1aBezq/p6tn0JvAUc1qxhhGuHO/7Zv3zy9fmjzx8/PaXnuqy5ct2p
XXXdpj09Ps7rYgbvPz65Nzu5d++D4w8/+P303em9d+9N77/33sm96Qc/nNzn
B5MT9bnb2cfVItu025Ima5+6xQpW0a5bC1SxZ8ByMNsCOV9+/gp/cMXTDxyJ
/0zlv6OcuZ87Bw/+MzwI9B0++c/Z4setK4vK9X7QG+DpzD6BjVnBL3sjPM2a
Rf+73sPA4p/WQJPyGo5p+jTwelYNvu09D8x60bl5UWa9px/V26sya5Nv4bwD
G3ZA4lM6JdOvtlnVbdf2YbPbdDUcms1qZzeb2f1770/v33+fHmpdU7gWGUQp
/+jL81P72r1XeXby4fTeB8Yz1cX5p+NM5TZNUXWzIls0xFzw5AfHD96/FzPS
iyar2gJZp6iubFfbzMoSpl/DHFHudfb5dl4WC2Kf82rZZC3IzAXK29+Qib4B
SeWarFv1Hvwm3wF/p98N2efp4vPsausG3NPBcbjpfftr9t9vyQegYpItefQY
/vXsTTfm/rvHD+6/G2/MmX1Wg7SFIy1n/cJrT5DAbi3sGxNfFzJK+HGyJ4/E
ymGfevA6FTkUF3w+fTQjjdyVrerj3KFGPk2+ZoW9+bHTH4GCXRcgwOurnf9l
va1aUMDdCn44BWG+qYE3Her31v9m7hYvXTO9goXDMZpWcJr9D2VoJAr9/umX
Fw/PThOyVqjbmzoHBkZ5CRzvjywMs+3gGEzsl69AeOf2mwqkd9OizH/euHZI
8QHzPJ/Zz7Ndn++er4qyLDbxV73nvp7ZL7Jlma3X/We/znbrGiR57+sRlq/b
RZ9lnxbAKqWLvtP9u/fB9OQESfTs/OLFD8+/evjDk7Ovxrl10TaLGaiUDnXb
8fOm/jewsdrjDYq7H0VWLCJxd7zMfmxjmu8XjPDOUaKiLj4N+ve8amGoLR6H
JRw/UGxZk7OCewH6jpnIHuJSjlIuvQ+SUk7m108ePvjwwYfAF2Y6ndpsDlIs
W4Bt92JVtBZszO0axDhYF+2iKeautQs47G2xRN2JnAKvZr62V3VW8ttbMQkM
KIG2yFEmwU9bC9xjmRdtXlwVHawhMn75+E5g5xblNke5u2nqemmYjzMQLjDk
xAJnT1u3yRr5BGcA4svSzyqcqx+ztVfAqZXNzKpnak/sPFu8vEF6HcOs6A80
Asx0zu+RR65cBfOnjwytrVhvS6C1q7ethWPgKTEz5hFo4C3ZtzwpICAc25cW
/gt2Vb1tsiswN+BsrbLNBuaFBw1mjmawff7VN+fPDdpNuPIS+Mpuflz8EwoJ
FIaw9frzT4vus+0cdCydbrDb7c0KGNqixs2A7fFHhnyCU6PMCsRebedoCB7n
aiAev4XfwMyxLvIcBJ55JxUWP71TRH/9xZxXoDlhb5fAPK3OuvMaFQmwbYlp
48NisxKcEJgn2GhgxMDegx9RA0etQLmUePjKnZ07JhusYQmMVeF7aLd4o/FF
m7rjzy1YsS8NvKUFIjlizNzRibSg8GD7gdduVg6+gnOR4Q7hd7RBebaDKcJG
GJh2Xsh5iyYIm1nmMBsdEZ4q+PXLLXHzfAcvlPe4xtzAY2BDRKccuAb2AKyJ
0l2jMZGKW7CrDx9+/dXDo5n9FqSkS+cRrFckZ4E0BtpkHa0Y/gImPLwLHrfu
FTASnqkOfmYKOCENmS6wBXo2R3Yn3ZbkbWbulkhNYu5NjfraWhIV+Pesgd+B
zd3AdBpdGZ76dtd2DuhG9DaekBZoVU1rOEb4OJ6/0r1CVu+yl3B6MwueJZhf
xdrZQze7mk3og2kJm50bPybSdgUnGE6xsyAyupaOHzqwRxMcjXdZdgbEDGw9
MtEGLDbjl4eiZFPCxmcwRulfOBBU9GjpruAzlY7t0QzlpcM1k2tjK3dTgWbE
eayzCoRwVoIk316tQHwB+5Xl0T7eN2uX0RmG7SxxCOKvDPZ91xY0YLuFwx4f
FiDUNciNbF7ivmSVQYoToRwYqiDO2hXwJ7Aseu+4R+iU0yCt/frijE6GQ00M
VJiC5Ib5z7MWKVyX2yC5e2eOHoupN2M+wOMKkuWGuB+/A6ZBkcfidBGfgCDz
VYKt5+gFzWvY0YjjSfAm9DqE+ayRD0U8A79V7lU35b/iU0epPIFNc2bs5Thr
B9JonaEmWSIngiBwuH6gTwsyG48Trr9A7sTtBttnYtCSgLfSPqGAQkbNSPZ6
9YebBa9VBdXd1JGSimYHOg6/Vx1F07KrusyBMKzZUsLDXBKupWnDdOc7Q9OR
EWAvQJ2QTnA5MOi3KwcPNfg4MiG/Thx7/DGqcRwmd6Cbci+4UVQvgBwm1uzw
DdCogz0Ak5nCGOC9XTPvwwNNS/Sk12TXTk525/hQmkIl9bj0j2ktloNn8Im5
QXkIP29rOG6L+qoq/oQaMwMGYOUKPN906eBBvIELjeIIuN/QPCc9OixAarfb
DcpJGDBryB6PxWP0+uy6LnJWErAqnAQcmL70DMvq6to6FI0z+yUToKb9gBOb
6zSMPxGJLF3GW04TnRCBVe86Ek9kigBriRxFAwx+gL4ri0piHFDiV3xC0Lxa
gITBWB1+uupow+aO5tbQB4tVXQj7wyGbGSQeMoNI8jEmYgeGtwLGynJUAmD4
gL00gdeDwizYQqrMqr6xXjQUf3K0ha08uM5yOJzfonAnEVpv+qzASkiFsEEd
hDGHnN8Nq7uGU0NmEYgGZOe2XofTCOLFTeHosMlabfGct7FihCPzWbI8lGxk
gJR1/RLFA+u2l+D/uyTa9J0Pa30/wdGR4YGvCrGLWgenhR4dUS7feVf5+xkZ
A1nD64HXmOQ1fdZFS3wwnpo4uOTYWjWwJcRCQGn3Cs08fgvK7JbsAxLCrXgV
diCBvSQDWQiUb7dzcGoafFDcAXzCH2Obbx1+lxpoPTM+koLH+TYlC47GbIkW
Dqy0vqkw9uqOwV8pNhsSAWzVzVAVo8HX6Dm1DYb28LHGgaHb0JR4TOCSjYOT
5kTlCknkd7lZNvXa9r2HdqJqHMcU3QUbjOy+WBXumpkDDbFZ35Eio5iNCKB7
CcKZpq6nhGeVF230CVAmL0jGV91gLirtmer6uP7ay2tyzsgwACquZ/YcDcJw
XjI0tmBh4KPIcefxUJInG4kfwHz2zILOD7jWG3oLnXU4gTdI2ITQcGLymk4G
/AdJKfS2RG74vmi8eoaZ5jU8RRQH7lxviD1BIN+w8Wp+3ALLygm4SZVc1tOq
qubIVoJlknnYrsSaR5VAhnwm/gSKOpoB8RFRiy2SchcmhSurWxI0YDh0zoty
TxyxaxpWbRVFDwvRbDhbVy+BT955x37trlk4AsugZ2fMx/buXXDR7eMcXb2D
lsJfp3fv2ucl2ihAuDWYzywJYbNFrhc1ncQNBSi9dMhgtGWBHgSFbyIvVbkT
ZjG1905OKaqm6mQJZugKmbTeAiGW6JssQU6jA837Rf7rycnv+el7mCZiQSev
4bW9CIEt8BijMNcvYJrgZpQlqANyWPBlmmri7BadF9nK6FHz3RsF0r4nHpbH
B+IaLG6fHDgEmX1kv9sfvfse6eoq4p/WdR156zWGGEhttMgh4K1WV1s4uqC+
gPsLEBNr8GfsAraMnJGKqV4I/9RtW8B4wGjg9nq1D5LbUwUlX+6WpEB42w7G
rYyDiTkYd1kPSBPZA+XFAwyNAefBHtGb0MyjwEH6mgWeWVIa7gCXjt4JvJwY
a4qkTH6Apj8+70jlfSexpe+JMS56sgJjuQMpVvgB7HWRsUNNJEAzy5LV6aJF
UdLQXn7udp+66vDITj+2h5uXYNC8PLrE8eFozkm/AE8taOeDgxCGmVBwjMW4
fE/OJ6+S1eYO9xkHuNy8vGTXB88bnHc2vfhbGuiyfXk544nhmg9bmNCa5wY/
HZtYIEOYnvhEEnokbxjl9QbP4Mib6a0yL5DDLXCfvVxfsvmBY8DhhWdxWeFt
l/BHneofaZVMveJKZzyn2caGQ0Q2IZnOTtKLPMO9tJsMZ5BOm2koU4+mPS86
ezm/hDfkNBUY8zJbLByog8P5H06OLlG4XjYOw7A0Bnx6Dz9ley+8E7VbRCJi
zmEqXnj0ScR9byhs6DgxF0f6R0eGcYTX2cy9Awvfll0xDUGRfbFRMontdoMK
2JI7qV5wcCuHz0YeyGw2uyMBJVsgkWqQ5hUJpzaySr3RsNk2qNlIq6uGJisp
9nJpmH4EVqwBOM4USVBfEqM0GhfxRgoMkDrm6Hav2dqfkOtOGp3djkSdt+K2
zJGq6xq8T8znTixHbubkHzmyO7IuBIuvM8x3dt7BbcGTlwFhGOLFluMjZAIP
V4WGZbIsGkHXhmP4BWgUiUZKRXZYJG6jQ3OD4x4yIJJFLYpoQB+4wQPwxbeP
j2YWtUwmegJDzWBWYmCglIgM0oZiSkUVeZW8kQWFUjvMXcImvyWPk2YTvZFE
Y5A70W0+2GMmHpAR5LI8mOSsRtOYgOwGfjyq0+xhMXNA3OdfHb/YZxe3R7wu
pg+ZccKqoAW9ZdQC+WHe+1x3ihH5Rfm8WlhNS64lxilbu23Vnm53VV3t1nSm
hBT+9B/MfNQ0WOtoTb35HkSeHU2siN6N7wGnDqV2anDiantniDiKuOEOj0jy
aEOZzd7BDKIkC2Yt+Y1Y1UGSvboC4YLCvm5wEmE7/FvI/Bd3qcMokqcXP5x1
9RpeVs9RksPfSO87qwkBW8JmlbM79oVEYCg+RtF6z5T8uVIGBhhu2qjYR2U3
YKSCo3qsiVTWhe3s83Y7qs5n9qxVhmhxniy5YMNwdqm3C7xBUSr3KkO3a0LJ
yKBR0h8j6e6ALkAxLNogDVVnuE9r+IPovDv2uzi5+T1HxCKpg8FPfA62ZI6+
RUpUJrRnupiwfv503iTeDVo7nA1Me2UNmTIjh+O4Twbcoode/B76b468en44
TPolYrpb3crFJPuKOaW3NTyxV2FH8W3k1XWBUlRUJBtnb352YYcPzqurxuVF
b2lBQmgsYiBQiC7P0nB3bBQHo+VWTwZluBGuqvaO5s2U8AmbfUhedF92rjM3
4OajS+w2Zb3DSDQcFP4VrgF1W7clp3mOvJT8FgySz3r+Mm/dGmQx/M6rddTn
m4YiRjRFZJxEW/jA5sSuqIyN4kWOZOvCDfNa0RJXDfEqqk/OnML+fFbfOHKO
SLtl/1Y3UbI5D5neokp9aGTysnCtAb1Ga75xcHhQRHL+KcRf4TM2bfZTn7b6
DD2sbNFRmUYmf6GkMgY4cW1q42IwB4MEHKlIYqt4JqNDQpK4wTq9qmXjo1iy
qOjnJyxGCsmK4FhDPvMTalWMs5EjhqF/Es4ayWo1gjBRR4eEKdgzVDlVJ2Ok
wj4dQA91cDz5UTXGONa9qcEI2t3yvIjDo3g5PhJkQQYWsHecdlkW5O/Pd8JS
C1dQylLXgqYpmRFBBmlQkmMfT5mJlW0l+703iPbTO2v/wC/GfMIp17y4xiNN
IX0OCERlF7eVVvj8L9UQob/GCRMMYyPBb1a7/c/SWUxiZobC6MTl7BK2pNw4
SM+MmDVXnBilNBYeEbEMo3mGLHBL1mR2BbzI5xUZ9/YYDHCvAZN4Dab8nzii
2Do6aHBwz+GQ5Gwt0sBsD2ONLtup8VYMApkwY5AXtGvv2Lt3H/pUyt27xuyX
uRqfLmBz8QyW5PN6dyc29oGeRvwudd0w6Y2J23Ezt52l1gCy78A1fPrF9NHF
mT3MZi9n2cw+/PpfLl6cfXExfYRuz6rYgjtPR15zGKZ1JQf9yeOTML+mEoDT
0UZQX5GOFb+HozFcY4L0nr6s6pvKPgHrcnqxytZAAEqWkT0oyRQqi+w54Twc
MqaRVB7KTDzD7MGTq4MLZmsjI3nH74JRMToLp25BQ+bOYPyugnPuq4vR8/Im
iIhnCdeW6HdQVoyH46zB0cx8Ubx0N0XLFB4630+yEhZjKXivm+ZnmG/RgzHj
lt+TbYNiHrd7QtKj8hUowvVIzb4SICucfNUuSIav4ddzdGSA3T51Ty8uxI7E
YhKSDCEYTuew3QHb1Rhjwie8P+k9fMnrh+RtltcbDPIbYeiGZQ+/ZYUVkg3/
huO6Z+w+TDi1dosVsciaBksrVjAQDCFpHJPmeeE1rUST4O2NBsOxUAi0/tpR
9mERcmJ7qnOS6oYZlTgUnN/g6gyQ6y29OC5Eqfng0kngigjOzkzQwJH9BW5t
OUJNWhd/hQZ8x6lQTHRTelD9p7DJtBo0tEgohvmhnAK2SbJSqLRhhzf8HT0L
7pR4XCuwNatJmpLhIHYBIkaduQyrRuq2nXo1qqkxMGExDcsKv3oNTTinRykb
4h5YYMZhk962CSHIGgCGBZJQSQ/a/DP7qa/MCnlp3FJkltFwLFc90Jlm04bW
hBYXjtqfTZwyRt6pWEFmC6p3ARb9conH3kUsOv5W3kBR7jkuXtxmoJ5U3xhf
0TKhkyMiObIfHftqSWnnc06z990uw1uBZhcsh7ICSxYUiRijmgRe6nDXLe86
lkiSgVviMRVtz9VDJQg1X6Zi78zBuXt5h/25OW5Yh1XrNfpFM3POQRlhz+tt
iVSiuJkSXZgMjXqwxEFbkigDJYuEpxDO0njZMo1cAJRx24ZsRUy5w4kic1O0
L9gSTQ3S3PgMO/o8FHXpMc0+Cz7iAjPPSuScnGVry5qHTGbWgGnJQgeKcIkH
sU30MQY2SUmEI4Tr13qLNklG75NiItnTN0rVBXJm5TwLYXpuP3NqDKKvlMzb
qn0bq33zN6l9G9S++RVq30Zq3/xtat+K2je/Su2/kXZOGW9MNZvXqmb7JqrZ
vF412zdTzWzAvgAZjKYrHiUtkLqt2DM6UrAWKnYycckz+fCkl6jako6klHOA
213kOfJY0BtMvaIBFcddM+yIh7ISIXTewArbeGZaz9DVVJydHiKw8ql2/69/
+e+gkGHyXHZDfQ3fY9JJtBkInrLcYkV7x0fW6JHdUx4Gry2z3am9LO1/trn9
2P54qRU0pRzChNvKYolV0hkohFwPKZWrhqLXlNxmD7lZp/+YjCGltpmNa26o
NhhUEQjyfEfJ6FfAMcCHSZ0oeWT1BkNTWjwEP+QWN3rT54+fkltotE4PJfP8
usCqdvQH2abBkHIDAmkhJWiVZ7A+DaPozUeWayMnUisnhdVSIAbMQXFdIAXV
ZU+Bz6ZSRT0FWwSZWKuzeRI6w9a5tRaVkUFYlnD24Rt1q+OiSFgb5QYOwkvW
dV4sd+k7MMboAz3ArFRn7suV416ESrsu/Hew7Qvn/2roUfAeUf4sMop4cxmh
f4DOOWw3ln6jjo86xiZaGb0AS1CYRcqTQBxwCRXxhARc1i5rtw0Xq+w4pIpm
q7ITcAcYrwt+TsKImGbA1E/n000bbPTgOnRUYVKGwGV1xp8qfCOZRjnOF/MJ
69jzR3eb7IWwTD+LUN0t01a/SYuUeD5szlVkvvnqO65mhiWbQ7VpcX98+bcd
L//msCKu+2hCaS9VJCaL9anQBCPjRSelbzQ2Bmk5UAQ8JzWHpCsjis7sF/pT
HYEIvaBkRuvNuPjoFOu1y1Ff7BEAophZtp3l6tXgKSJRggYe1vfUTSuBRJMW
sttBIXvbq2SnAA0Vrk+oDKhaoNA22RZfhu1duA9XuF0V2TKe1Y+oxN/tO0sH
BqUOlvXcUPRM7UKQNnBCqytWA8wjvIJJWpHvzWty9OKliD3Fm8XmmZ4fipfA
uLy2QqqFsAqnEjtCC5dZGEr+SaQaPOuyK3ykbbUfZVycxSrR70QS/DIU4vuU
wnA/vUPhuF9MVIOIhgKK1bQWj62bftWgeBJ9bfciroPRylbKCFAMTONusAga
WyQvR1ZQQGJqjObTmwNOj1PAS1hPp0KTvQWeE5XWSiE7PoTbizKRPAIKXwd3
1vdU+VYqSrp7Y0TSbWfJ9qJ18qUOfltUtAgkpB3VQqGietMysAnGc0ncjdRl
iKVLPiwv3eevU348EL9GVLUUNrKPZQ5DrgnE6OJopFnHb7bEk/fNRLY5V+cN
C/462oeRVrdIkkhU3xwQtTjT7LyhOAcBv1KNx+kH5gXig/UG7Daucy86SYjA
m4ZbPE13WDOpI6uFg7gGt7MsM8O19LgaR92pWdvi+eOkpaar0RJ2G+7hGZJG
GCBMSPdoi1bZlRQTH/h+xZycKubAiAW/oV87+Tmw4GfxKPo5h438zLrdJo7b
9wvyWYMnDSBR3cZSk6ziAaHcso+/eTJ9+PQMNfIF/3GCtl1o24hbS6ghSFng
tpIbGdUcgiDewHGWoY94Xo62tuYqLawUhf1uRc5869hdIdeJLSuTElhJc/CR
RBn20sek9BkGsWmnQYFIGYYWJiIjRkXwWFw+mEKJXI05B47GIJ0wVS0dAcro
aL1pS6fjFrxx9o2L5HVLxomHYYGkAiA6gRLCbkHlgoTRbNRoL5AZ2be4IobT
BzVXBGk9E+V8MEOuhXKeYpyTrxxXzqb0Y7rTEcsdMFXJ2RafZ6m3jYmymXMH
SgaOyzeqPIU0I4XUlJdGquoElXSeUsT+kmKgFsWe8OKhQgsXamFf5LtYVQV6
zFq0XjRgL1QLscIjpwr2cXUDJoLY2+p2LLc4pLbmGFeQrNPWD40a95LIQYxi
Na6vjZoEY8K8nh57yGEjcpg9pWV6NNODSUppP3ForHHapD1b/nNl+KJT78rA
ceHAiGT3g2Hqc6LE4HAKN1F84Tm2aHMZRhukqfmGohHUv217/dup2NpXUiQW
o8ksbi1HgkjeqJuiLT6Oy2F5heARSU+yNhKEeErUgFAvRwyAqCwzUuv8c8N5
X2qHLq7HFbAvO8FuLh8UQQOetKyZb4uSPMl5WaPdrgpslbVh9+Bwfv7oCRyo
bgFG95f4IKakyF6F8VAymMrdCGWpck2WB6TRppVJiBCxhC6xVB8X7fsZyVbp
F8LRDENZZC84KHFLiQR7mx2IhOEQdqEQYIDbs4f7y1YsEBGDZ5gc7XdJ3Aif
kSPulkuHBmm0cGyqjfgS465oJdywfWzWtUjwWzenwXgErOyqRDr5wkUJkxfU
Rcb2Vu/FTPGEyt1qy7HFtXPdHrwCf1C+ddlL+6yuphdR0xMllXufAcO3sYrH
lsECe7JSBk4T9nHxDIdIRKbDviTK4Lyj8dV2lo7Vqy28HlwoZ3TtWY7NG+ha
gOyh6AvH0/76l3/nMpC//uV/7DFE/EyMSjNfp1K6JSpmDFYm9oAwK3Vs+WIM
norBWArLcmlJyqUeHQSMeIaZyAOp1thROQg/DhZZUsNBMR4KAKHb20pN1w1B
DODHaKLCG3C3hjtz+O2zi6OIngxmA1QlTBp6IfzCx5wx6Nk1xaJHUBJNkYDg
uAGXZFxnJRU0CjHNsJybnvbSC3fgMBsrPNEA9wSLsQyiAjluq/WtbiyARirG
KTskaBLRfogYbH0JFmcTR2z+iF+8EyPODpcoGRGyvpRGM2iLumkwOph0HPia
qx6rH7a8uoSYOlLIpV2jXXTls2kUBdb3UhrBN/6Bp+AwF+coO7ZDfJnYVghu
SDI94OfsGtQ1czRX2y7UFl1QlKLbFpJknSMJKElp2LwiXaTtCEJ05gVtXK0E
8Gjc7TCaJcFPrRwQRJ+gPRyK4eNbXE4QD8uUV/mst3u9TqQ+7jYSVYIBNI/A
NZI/0RVKvo2QI0JDKKt0E1Lro3EATZrDUQUzFRUUnRoQSWz2yyvW2GI+Txbp
chBXcta9d5ApJIJGU33C0B8io/mJglnQCx5umW1vNyMoakoutMYIZqGqEKwZ
CihKJhFsCwx8hi6FMCDJBDSnkdBiRovM5cPC6Qg9JkKGiURMswRIIZqmjwSp
7OezxLYPNmlL63TVsXSWHkXUZRddgz7pmDbb85U9vEDRyf4i/cQ14mDivEFq
TkJylUM6QykLQ4TZBjU9UFUUR9ZuKTOyRYdowWj9X9RmNBTA0RE55BboIGlC
3b4fiqZE4pMbn3SLsBXjXBpZsAoPkR2CHLX7PErKGo5q1kSQ7zN6aCJLcPlS
cXo49EF7zHvkTR+JHS0pOToQ9GZcutu3lO5mtB6UpDvz8KgQDm4mHsamoOoZ
bWxGNmAcC1xf7XuIQtO6FyfBm2Zmp7A6xcPrpl+HmpEHED0sbW7Y+kfOCEbV
HYUmUO5r7hFdBrV0cu5v3RbcU4v2Aql0YO6JSTB5tKp01FnC1sJ19sPJDFsM
qYPOyEf35aMQ0hjraJBUohSWJ5EYc4nl6D+cUCPgD/ePfAb0kj62f7Dxuw95
9LPy6vwRdg3KXOhR/9P74z/l7JHoSSy8y8jUDs15B+YPduQFFBEjTzvtJPzh
hHsJPXGo3xB/GAOs+Apqt567PA/QTV5HhVBMUr2A+yOusD/XqhKkWiU61OrO
JDXE5nbzRAVwJPzjo8LK0/DIyOJ4uLWmy5MRPfabljjrkEIO2rCR4D8ktSXe
HVjAwtBJLXdHXrcDZ4Lkv8C8B6GZffcaSMLvGbHLY2Rg2IBLuSrahnBm4hpu
TBcReFkdNbBp04vG/1ofQAuDgPUt6WYShvHeq0LQJgrxR8JJgd9oH5YI1M2W
z+UIv7S+9NokRUGS5hcJQa2sKnoW43FAUgPjTbWtPfTIQthXIqw5INSR9PYp
H4lXqqa9DzlFuFHZ3iJv45+Of4/vxU0Kgk3zQ5F9L7kJUpvRpvh4GDIRljOi
q57WQUUt+YHCaDIZLqKEqVyFjFgtJ4MVE9NgZh+/wrQfInEpwYtQA2nYKswo
uV3uhi+DDUfFLz4AKr964wanPj4pdP7YEMFxY2sgZPG4V0D6Q00yM22djTgG
jtZ/+U/TaahCaAsO0FBXkZ8rFdvEc9UdDv36hudPlRDDPZ5IVUb0gFDqsWYe
sG25JiuTyx7oTWtlQVy0IoXPzHT6sVqDn3gkxSeKpPgwjq6jWfjJeGaQw9Bt
L+a2G8Sc/V6Iw69CF+0OsohDn/keT2XCHaBytE0w0lU2zDk3vth5s6Ulm00b
F8TFwD5a/zLTjybvN6mSkKCFL+tG55LEn8NzsQmGcU+f9K20LCEp5TJie2lZ
xC2VXRwfB60D5qEEzQm8iioQzJAKz2pEkduJiiEbPhFeum0fxR4+6gBvHu4X
PcHp8L4VvgD3yuUTI7BBnN6nBl3q6gHZcTxACZtQOiNwA0O+DXdkZvdxo3CX
ytTcsWJzOcYr2u1c2L/wWZEweiooqTmLEw5iETgbNZvUFHerfYVQH+1MSwMY
GYcxzthrgVUbCcQeDWGJLKNRYUnCkz6oKa+QmhexKoBkbBaqbTppZZMxGdMG
IYO+ewtwYU424XvT10oiSBa2N8GvVcl0Hn2tBdYAcRCLM8ehmRBDHKEKqCzH
MEYl62QOYzy1SchGxWfkKM7+nLWe3bWeEBs+kRP2lDmEqtagc/pAtZlPjuqb
PgrZ+KITXFEaRAsY6d+LbKOjBL4xnrfGfESJzqkWZ79jIRGr7gZ7gMJCUBkP
cHB9DpwIv2fVuFiMtmBxqWybSBAviSJu3lIugw6vsLGPZDZ7BKFWC7EruGeS
QauS4GHt6YkWegYqbKHA7wiTKjqCUiOFqTmHdWkFGW/cCk3wnmfkVLKzcHtX
rdSYTHSux0o5MyCsLwXhDC6mr6ocMZfiGlM0pouuw36S1niwIB+LifGI/xiJ
ZYrG7PvSHl788ShK+KBypzYEeNmyaNruDaIxf+wZnT48xcBrkTaMsxPCJ9Si
wVU2WMW0QFZYbsu+YuFKsqSOvq87BNMhGwaN0xxr1G9o6wVYT61NC5uDI3GH
bimpru4k+6A9BkYKGbddCHx45cX4Ej4U9de//DuQqMNkycAD0wMgZb79jHDa
gRncTKD7GmTRok26n0YaN0OobGIxcafGh6vabePr6yPCDjMBFNpm6KEAz+DN
4WuQMYhCo2IoVraEXAdStCTFLcHvzapBs3jCrVZoycBi/DQlwYuJE5/klarj
LdhgNGVPZzIKEGWscwIINhJKS30szFvvZTUpzxiJtfgsFjEa5sipyILf0wsr
8fDE4DBx9M4JeZUMfPNtQM6h5RfcF4pVvJxZpP3QnBqCxXKCAHkVfnQqFoU5
OUqja2RMujzOkfRsgvvpE0Ypl9+WZ4nHOAxpW8zN8jwiUvrFJgMieDU6DbUU
DDtRqaCit5K8SMZti1ey5jgCc1Of2luWPEyRAbv3Fhz8BfwUk4kejjikv80h
R5R4VbokbEz/yL7bf/9tBNx7nFoxdoVdyT8UmALfEBHJzCErfWQf/NYTSYpg
b+Xrj+x7bzoZkywxiBfSFnvJzmUM7x+lGbvbeXePLxVeZEZeREFj7lIrREYy
UAmfyMN3OUdwCOvlqjB7+OCIGmQP3z86IvEs1qEvrQwPPeAfSEql3PnQbmtc
WSj9QY1cUA5kBu6JD+p7aee7mJLUxuv22J8iRocn6MwgRJVwVeoncXSDShvA
9Gwo+8fxEDm03sta1ttGUXnxchiwwCcmmTaBKZOb6VmNpXAIn2q0PVjq45kM
EcELMf2Dv8/IWghqjrDKji1ogwAEToNTnnduVjV5QPRSkQYZilc0V5mDiqbf
kxzqn1RaszmcqOtISe8I9UFSja00wgkRQaNcEQCnAnRQp9okKiiuA23Mumia
urGvUfNRWUjw34ZlIR8FuzTSQXsWF8oxcFsMQc3xRpMsZvF7u8IRH3w0cT+u
UPQ80tEEGW16umS/MZvlecOlSZ2ESjjbauIwlVT4furv80AD+bP+JR82gt/P
fPAncGKoUvVR84nxYHBFteKMILf0EeyS7/Fp02TOkHLmTggwzO70qgk4LOhb
y4feM7lWSUfmC+3InAzKFRP4utC5ye0IhnAGta5AafMnrbIht5u6OSJf82Lr
wTOJjDCSAjvgRrN6RzuA1LBvD6Vwh7p3XMEFTEC6XU04RevzeXv6mTpp7ByA
dOGrEQgNhBK1XJaWMQSzcACMEH8hHlLBGOsYMAvfSVE8u3wBtCTC2uYofgot
FcmDW/FLBnHNlCBUpRaBctPxDLOjCwcCaizX97bdCJZJFLRMMsVbkW3UUiYy
gE46COlizV7Cq4UTEdlu17eUeQ0GRHVqCqUdvTcmLEZBqh11xTiJuVH7up9e
2wXyBuEWcq6Di3nSDea2vODED3aZf9C7muh1Xv0Q8fpNtoxflWxc8OAl8VRJ
N41kH1tM2rEPyRyv11FQx7zmAwy+D+NkYCWFrEvrKz8HHCaQcpFvFLnReGyU
DapaziH2V42zQxA9iCs1ertFLBrOBXifjJ6J1hzPQ90Pe3lDCjMZW5wApcQz
LXuJktWJ9YcweKNzUAZ5yuux+VYhgSIHf8Aot4d5/Bh5EiVgMmKMgPDynEA7
9HZdWsPR7G6w933jBgMVlVIkSv4JgriexfW2igzgsPTkCRgo8w2FARMs/dFh
gmfhgzNmeE1W2jrB0FtoTaAu9+op4kmM7MXWgaTXEDJ1xNvGraLqoSRyqvdQ
cbVs8pUUe3B4goBNIwRr9HK09JFCGIsMrxDx2BUEIpy7q8a59pLLqaOhFb5p
Yq+LdosqkINhP/20LK783VjT/oVkv/wCi/jzn/9sfp7+Pf/52fx89+6zeqzq
6mc8tSFXSGV0v8Xb99Uw/9x/ea+iYhLH7DhMO4l7KJNSGxjt7z7x/QVro1Mf
qOd/3JTszfF+Q/dN50taIPXyIuuaA6MwUmStjAZE/+7L/ut/+w86GD+d2ndu
PUJ8ReIf7lzIDwgvqP8bKpsi6Bm+sETqCttuducXY8wZx9KwoFdljo6WxV2l
2vEyVsweCy5p1eXaUMxpYmOKdElGPi/Xm1AFL9vLBq/EESAUAWAQNKnk9kDE
dozAYLrYNjAMzdRrmIuLREPnENpWgUUYR+cZEMUlAJuHmmH3NU9tVDu8JxJK
lV3dyiVne9r3jXwVeBhPChbqKo5v+WGPyB4gZ2HpsVKkmonLDSZpLZ/e8dER
GEfFt33UBIyR1Lj5raqXy3H6GO6VZZzGZ3JL0IBVkMewCyQwYOyAgYXD3U6j
PQME8PSaPomkOIegPQhnMym9j406ynXyzO3hfklr9sFpcnvRkZoiWPheyeVx
LomwM+eaHjLoOI3pOKTNCWmihtO3PKQeYb1qDFHhQl2z9pH6Qj3kuw1GkKhH
sRVbNvjGxUgNfagT98PcoYqpuEycDjSzqdzQ2J/6HesZXqp25DkjNQp8F01W
7v7kkiJCKSdtFaeWLV2/pYixRFw8Vp9MF7rBIUWOOmZFcTTUFGxD4rmRIiOl
3wg6m9RNaJRU2QE5JKhhM+Y4+Equwt9XGpJdBV7RRa4/vaBgbDAT1VBkIBKu
tqjIpMaHA08pNke862b0art+RTFOqqL7VATwk6EIfH+x4QxTRYIv9Yjj+KQG
v7BL5yWtUYtNwECkttG0IlXapeSvxyx8xgWgV8E7iaGtXF9GDcpfafPSMaeM
vmsxnCK8w1dKNeH2ATRqFY1gn1nBtfYTr+5Mokr5VIrcTmTtoJEjGEVaDfdN
hd1z+P2ofajVw2Ekcf8kq8sx3SDAeuWOE/F4BCkZZXASedA7yKKWdUEKKWuO
txfcEzd+hYCvo+NH24A281gbv3vIGX0K8aZJfZIPCqhbPAbQQEhyXe/2YM8K
eA4YATGJo4sVEekEulNuCLYsUKTp4IPe++h8c0cOq4FFzVV/CciVBEP3dboU
amY85he0ar8YOtJaVFVvqzztTddSAkmQnoX8/Mn7xycfEJ1Ofn988iEQ00ys
r2XO7J0Sizju9KqjU7Hn698DHXEq7UvCspeLsOZFJ4CiBWLeU2JAihvpnkht
GyVvWOuCMdgG+7HO2OntsdBEzuBIYyeqmL3G/SRdjWTc2tD1Q3EESjvcZktI
sonqJnx5BEmgG1Vknh6YCwmllHWXhnTD9VBVHUcmDGFLZi9HxHKuhQWuX8jB
pQ7SfsfqEIsQtbcJRKn+8dbVbUExlOy/iHA9FNcG58IfqWETMAhpw1QecFbl
tdUTxD4R040n5XQWcQtmRjcDToQyHP325YCZpbI57AhJikHIBPTZ6cgUwEfU
dSv6MkWCH0Q6OuTDGDDG/i/TQS+jPtD+FZ7qHY41nUR95UvN/3ina+CfKTKb
Q85ZcOEq0GVaN1NU1nSQBffT752XV5Eoiet2uKCUt0NEZdIELz6aypqRsiUt
xgBhY0/uHZ+cTOzJ/eOTd+E/D45P3puw6Jmw3OEF3793fP+EJtL4Np7XTmVm
nn1yaj+BP3bZxJ5LNwgcm2syA3wgk+CY/aCdXmmycfWGAqMLvoYckQkFpEPO
V7gbKLksgPJdEaL9T++AxvCO9i/9K03nrnJL1EWKlyCyY5EY4FQA1LtswIxc
NoAwfhSqJtYXpMWoTGTQV8knNQIkUoeA2YpdAtG/qJb9HBBOEh3jQ4X/Sp2g
5JRwhLJeOx5IVHbqEpmo4mTfNQYgVx7TpZCU16MGQG2x16JO4ec4W5H47BN/
a4ZmCtlAyTmpzkawiTlaFoh1NAgS9OzCS7esCpimZGRznSNKeSMqDYHJfZNi
mJzccRVB0s+RJUOLSkOIEYxrXS+lkFTvudBbJm+QB1Hoe/+qrAUSTcAIQfHc
ZOVL3/PE6N9TNlMirUuybwlmtgamQ5k1hnWwfQT+bwbvYbuIFqhXO+jFnbpY
BNPrP0YQD0LzQVBJzEDGE/qI6yDYbRF4Pp4tvcUMe2gZQ0+yxj10Y/Yc5SZR
7q/A/HFjrhrGekrfodMOsIMqu86HO+FeOUquasJ9qbeeAE0GawyFgeI4CtgQ
cf2AyAy/g/cuInNG2BMiQ7SxxPQ4XeCI5NrJJZqIB0oSwVYP6Fwkt7RMTrGH
+fqhCJyI+RS/GqzJB2yIJxWWinIG8XGK2ocZ4z1qOE+bbcqiehnXqbLcBRNC
XA3wE+bTI90CeSvDNCoelovs4dHtpFUjeOCAR9sYQDDzydJ4oHDaAnIn3nOM
E+XQKF+3Egcl1AcfcUpCC07S8IpEQlYnz5ijCNSVi6eSGgZ++qnL5lOd1VRn
9csv/UussLZn5Aj7Lsm0B1NyfxSbUXypgI5g+rEdeNmjPisrWBL5U5h11AKC
CELIkEri44QRrJ6nFKB3WWH5mAE/ljE2Ed5ATL+aCsBaHMlJumuBodI7rvh0
HFLA2GiBBYGceVCthwjwHey5o3Dlr+sHuOj+uJiKWSuXolzUjCNKGKAxeqWY
dIhAAmZy7hAeTG4lyMT7x5/2tydcFw/2wjVX/A6u4T6ToMzrd328JZQuFQ1A
fpqiv631lNxovLBBA0IUWDGD2IN6SDFyP4ko5Zq1g8OuGD9rujEHKbumUrPh
naL7bAY45I+lYWWkKVPha4ZtONSlQOVt0qpBo/VvglF/IOotjUN40ZW6Eq9A
OzK5H0ngOnoXpPn5ocKqHJpvIICoydFwNy9FPryg88E/jmzYCFM6huvSrbSZ
CXfl+bBKRdAQWCNaoiVE15EC+d4qjRklrOzP5md79+4XynKJgA/wImy83r1r
6cdIZPzzW2W+bP+tF8oW/+t//tr/wdg+LPJrp/Uw6iF+zT8/46UVrAfo0TCH
DHPlhHZ8DJxxVeu1knsf/RUTfsrC5tdTkf8HM+MoOM6ScpCjmktzj2cDjc1H
ur1jf+lpbc9kD4NRKx5szwGbytlFR8xRakmbJFPrOMoEovkbOJfgabk4GXR7
sO6DNUDQ3t4c5qaNiRYjBrv4W6f3f5HGCOjCkfWNZ8Z7Dad9VyY28AxewEnY
1XqrKQbSPfa+r6dMjPNQ1hy8IcP9bhGq6B4TXRRXUqwaLh4wPtugJnWO9dc0
b66kHHSDZwzhmXEBl7nFah4gdHMIP+w9pbNQQ7Ym3b3AShKpYGwIxoOnEqqw
owOfEoQhbBp86JbYWai3n8Ui31M22sTDdNtMYpfzth3xZRNlppKYJfWG91n6
k9DiI9w+WJHDy1pQSqOkJ5ijJE8wxpZUN4MHTvtFZarTMFUqnMEbP6P5nkbX
NfccDw3R8UUZI11eQ4wUm2KkTEZL5TAFCzuCvaLjACm2D5ASXW6rGCnmtRgp
9vUYKQYxUrxfJKADZDAoWHZ/ZpHfi/Gnc+BkOOOgkhH2Yu4WGVYJn8PBqw7o
QgWqjqfrXsOlD1zBhj+QJmFNHjYR7oU3DNk26k2DIUPIvZlS9QH85LU7mW5k
FNcyf/tG2mgjsQ4OLOYdJRT9SYHt3b+daoT/XXfVHq4nhgY86m1vH2EKOzEO
Exd9gzfGLkJW5nc0zu8C2EyHt1BgsYfYUz00QOUgrm6WS4cYNtizjt+4J5FB
/H9990Aky81ILvQiDp4h6q8ubdxzjO2apcswBaKdiuHKairNEHzkPvaXTyD0
7G4siEizJQm+aJRE0I/9SAHQhPzG0fuT+hC5cVKCtlmjRwIaB9quAeakS+aA
86j1IFy9sJCvFj/c10xs9BFNGBFo+RIx7mnly9tWfcTbddHxDXX4Zx0C/3if
AdVwQeFSVXuWOlRx1hYXQS5P2w2yPcavamL7y2JwHb84u7DapJDCWeGC+Ao6
7dLRuSuCzQIO6Gfwq0Ney4TXMYmnLzcbmkUwUxAcmy+KlmzObamqqPaUULzN
oOKhl7U78MC0B14qXIxJhT/Sz6MjjA1GfRNAj/Hb1vDZv7Xoj0z2d+xbO10P
pcgL/vrm/7ydZ/Hr14V+zdtMj66ODVGfN17bP3pdJzjXZygE33Bdz2oJOhVV
SLfE1d5ypUiApgCvs6V33cfnz/1jr3/XF3/Di4SG78q78MO/67o8QDmPjO96
0FsXycX9733DdfVe9H+BN+zbMT3yPBeavtVJ/sev671/IB++/w/kww/+Px/y
b+/eJcv1LdnwH76u38t+BcvoNet6/iZcN76uDwfviiBwx971K3j+5N7Yu/Zy
4ui6hlw3vq6Tk9vWNXjv/yM8r7HJ/aGSQZAyBFoGKd1hX91u47hFInQ1OFfp
xSmpK0+1+YKGUIdrY7wLphUL2hg9ieJxiNeEk2uxuIPQ23pl0FG+M5l2r5Rv
saqLBcHJBKBIV25i/CZfwWq0O07Qcwd5Ke22j9pioyIJeYGJAlcUkAw/qWkt
ijw2mGrSVmqkE3SeNNXJhdY6Y7DUH+JkTwLGHy5AO1uilHVkQQumrJYOEtql
kr2qKb8labMowplUbw0CnIK9o5hU4AN5TMqsxyjp1boREij+fNdHUGBwq5St
sKStjRsN+9NRWFu5ZSq/LtpMe0X9+HWjlz6T94z3wuMmUpnAkMdmVDrBCDPs
UL6X1DwwIqiEzqNs58wHtStCQnRG6sB7pepJhlRug9KS+bS4MW6+1Y7dYZa0
17gdRUb4Nm2TvsPPxuO296Z0GL/GkJnhq4nk6srMl20timYh7ZSKZZvAOUWB
6VDrRKR9l5b0AC/CEvz7scHsnCGzKSiP/EECuGBQwkj8SsYKEdgkpVvP5U7k
2l/zk4bf/RUuQ+Eo3QkC12KzNfrzeqWjxtl73SUkSd4VADn44/taIdm/IGOI
1YuQYrBTcjEF3s/oa0LwZpIo4cPBeO6Z0NSHB2jxtX5R0xpyUaQP6NwzQo/E
61UE0NVg+5MZGFjDcL4CcerBLkAYU6oQ4/2doF0qVojU5ykdsdpTEtXMC0mu
hPpDwvYIuqfg1LIUhZUujGZotFp4MlJ5z8M4DgWpEOS/YjrcpHE43mTZFmzc
blx0HRYGUCT/ra9ufb7dR+5Y7Hm8jBjJgOaQijqsfkRWlfLymFXlHEe1ohHL
eskPXyPB5c5Qf8Ub1wpI+2CS8/fJ+rigj4O/RFouC065Gc7oxD6Y2PcEYokg
PRD5OmLm6bDYN7o9wsuzqQfFHmJU97hfEG0Nfce1BUR8qogj9BK/ZQFlZcnM
lmE2TTrQQ9kdovxQNq3QW48QuWTG92Yp3oAKp99P7IcTME55zScnZrON2yki
sd/vjRg2K7UIjZdxByLVlbcI1Nq69bzUK86TOwsU4JTv4VTrNNYeRWuSrpIh
qX1M8EWsLHxGkTZdY/kp26DA2zYb4DRCdo+hTD3IeK+1dCP1laQqJ8guJNMD
RCJsjGY6zK2ZDquZDjlqSOA7QoI79jL84tIwqBXxU+8uA4/75Jv7Eo1JcWEp
U85YsYHc+aYqseeAbgjxWyHOdYRNLBv/u/XvdLuNZlUC7JY/Bl7qB8FPrXxS
Du+nBPtJWsfRtfBxDU3YZoLCwqfi+quPQHg6LvPmRq0EqJ/yFIipj1paui37
Fq5kAKSAiPrOGkRkxh5qzfUEnP++YCnj2G20SL3TL5OwfrD3RyK8HuM9akaJ
yhGjDjhfy0ygmttN6Vsx99wgNJF7AVufSJFbAaQkcKL4srfpZWRftDcMQ5W2
fJUgqQAuNNtrhEjJpn0GunYKknV6hnYDnFF74TEqzv3V6m6is9sL0xYZioqQ
15rEAvBXcHLZXgQd09oY1RhHctdZwEtVF+jJ+fMLtm+upUUtAr6REkH877Pz
ixfqHcXw3YhvBVbl1bbI5R6HoU8Jy5zRAKkT48tKjH/60K03MDoZ9TkC2Bjz
sT0jgGhJ5yD5//U7fsW/fh8XS96lyrA4Q6g5wRwGkRZenAX7zNdupF2NYHmI
vLzVRJ2T37+vl2Z/7GsH/aOH7ZHyqH+feDXBLxQhf1dyxjAOTNZbolz1T0ie
VPSfTIHo5nd/NpvdvZTqj48jTrkMt4VTNU+uyIEyahgBx7y8pIWhTJlcXuKq
4huzZdUPQBsGkPZb7xfmgsgWBiIkFQZmEnxqUkBYp7uP9F6G3Z0pDBEMtAGl
VMsdaDofVnfq1Va7OGyRAJLJ2jMYB61b/9IoF8f7HW5LmQfUJ8Kk9xcIfezv
3wzXL7jeYsK4dAfkFdBZ0o0tw+nCKCOenpWdvIyF3nc49A/Pv3r4w5Ozr75n
jS6nAiFm8Na3Nroi7YbgEKqr1gOhDpgacatHty0qh9GGd78kam6SS6vaLAYl
978d22aRPtTLJCXv2oCyY2B7owgN1CaTFMaOz4IkUMJJ6IEt5W671MSmAa5q
L/6zKsg27TP0dc8gWAylccWFId69vOSWaS1vgycvpWQgR2cMlywGt97HlFEo
JwKeYJRrlgHJwRlhmAAlfHh5eTKtt920Xk6r8NO2XnY3OB6c1m3pLi8ZVSl6
XY8I3F2cdaMoHSi6r6iZaEghZN3rwt1gLGCLF42/5Ibay0t0AW6ZEF9vRDe9
NjZehdn/kBy9dntFDYIDQ55ubibWxdM/xdMf5pkgFJKARA0CurJCLMsYM1/i
VnjZd4V9qAJlkXW6Pa9dnYKGbrt6jdbBGl0GPUpe/SPzCfVS1wi5uetI418L
4otyEdfshRJPZjy9Cz4oj2qLurGNWbIHZe1N+qD8Q7ViwireeWLAckYw0FE9
6ji1zZZlq1jcJZig+S4iUmKCMKLVn//OiED0D9dpP4M5+ipjwjnCTwZyznNF
lnZLKVRX7AVjJbYmKDxROUbyG66jtmdKwgvls6fEZ7Sqz2LcabQxOH7djjj0
WsPEV28zFD8w18+3ipg2vWiGDPvQMupVWHrhCIz5DSLRoWeDM6D4qbJUO6Bh
0f7mZIyk5K3kfDig4y3YRX1NwpbmHHsdp/P6Fd40DkP2L5Rl30jwe7sU7j3y
zZKhwWA0lMuNj57G56RrI7w3jHeYDsMXZsr6fztin4Fw3EfldpRrvbNtbxpM
DoEg5iuaiyqKYvQru34ewY4YMOJ+oiVqdh8v//YUExCzgGIWgEh9mb+m5wLY
sD1mlxFE/9SvTX+OyThSr3TzRlkQaM0dpfadUN3JsjxGHlWnx9uyJCk44JhU
k48ISH/DXxyeAAnj5QtiK1A7AfVJFohCNCh5FPwfmtnEgzBGpmTwb6kYL4Fh
qbgB9AoBMsGGXiB2ZCtQXBM21jzP8S3N1HdGKOhF1W6KJkoD6CSP/f4P6zND
oXYRy9yBlE1irIrlEkzW3qX2fo5gM0bN7FnZKUpZyuahvFDsl61KXy91kzOg
+2/kMCAAvNIihX4KJ5SrQKuraIcoHoAZkOQqMum3GLkfiDZV4I+X4ICu+rZJ
2GX0kCkK1zNeBmJxxpweyXc/5W3LN+SN2NLBgu6f9oEE92D+QxnOMWyxazyo
2pvK9JbuhKICUPAG9gmjIH0INiXZRq837SGITJN6gUecnQRGBHE8PYtUvIbZ
ynL/3KziARNFDFHEE+SsF92NMcwzK9iC2nGkyIAmCbNwaTQK4XL0ljvBv8df
SfHsb0co6cqnm8xeRxLPQd3K33KpGYMWftfSnToY0BO4J/vQl05rxHPP7cOs
wILZFsnVHoQU34oQrqk+uAHZdZCmccIdxkjlgg2/Dd/AxMLVA9cFGeZB7yJM
rE1WND6sfnTJ+oFQjvRaAQGwUUciWV4KZUQZN6VHrp5C8EhEDcmZJpSdvosX
5bi8FlP3J1AElQ7fT0Ew7PGy49uAL/vLHgC16uoPOKuwOrq0g6t627iygbcq
JCyNIpDU/VwQg3p6YJIEDVJSTjcForgVeLUThX+zUqDps9GNpkjGIttIdEtq
VuRac6PqDD21lA6XIRPr0ZvEDBhBLtUeloiwgUAnR9orMaASb3eve2Om2dw0
hkzk2dVSyRDuUY1vnh8mLLGyX5GY+0PyTeocunMKqW4w8rmtFJJ/UOnUR+JD
jUxhS0yHwFvooF/oRB6mb/zpHZjiNJ0G2WWUEV9wolEhX9qRy7JSQHg2Vzj7
hoLZUL2cvFr7qPx95XhbeEDYQkQqfSNSSfNQJi9kkzKw6xYMZsr665wQ6BzM
sMmWnV5GreZNWpTEl2rtQotlT6lS9QMwBDhUIRWUdpWbcHFIQMGRPItPQ6R1
DLoiQmO3jwKqB4x+luMDiH5/DF9k/m8sWBhynZtMVo5vwxgCehxFaZaB4acI
mSuXXRcBaTS6OyW6v1BsvTICT/bg1BxSGqBs0T62zl93SJDkoJ24ScPH7bmy
yqQwywSuJPgtBMTmyvqGIOv3XlSKN69xj90LH9aMbh9ZbwlwwL1alNTf6Q26
PXc40l1GOJ61jL5CzWiYuWmlTIP1f3S7OeuC0i07rIcLAAsTalojhFq6Z64H
BBchmUX38ojsb014wevXr3eCVwSXoVVjEYR/HPN9K+Kk9zROGHgvo+YtTNlO
4qur09fjVkqDrkFe53wi4djg/TWaWdDuzX1XahKiIie8UTNSuUzvUs0YztjH
M9XMTYoOJeA3igxXlhFWkC9+4TywvM+fJJZOZt8FE/J9iO8HeFzsc+YL2ybS
u4bpkvalZK3793jFRmVybwGpyBIMLdSsJsqnaK+WlItwYSYJTXwJ7v6IyToJ
Ksnn+fG+5bEb2/dZvXQ3sjOhtGfAXAKsnmAHKsJjR+ls7ljr3cnhk13xTdd+
aT4y6K+QTG+6jIuXNPY8zq/k3SPVJOV5yNt+ZBSlX96gIUS6tmEI70wlMDyt
6PIlOMAJ2mWyejzCyNfew1TrH/2gRJZS8r/mgq49gyG+IsMMKt64vxeNdId0
mIJhyl4P/q0ahGOyFAA/vT0ySqRhAQTFRnzH3sHRcHvFRR5NxQUTPn1k460R
xeOLIB76mc028v2xgk8sgUKuW1E0I+PhYm6Djx860rGIQfnupJiiVYOSkjbB
iZtvw/1CY96hUZHmWVojy+WOI0G1Pdi7xQdYUaN7TBbE2QLv4ixdfsX1T2qq
of2De5xecYXqlW7hXt56rQvnawSsEVGNqULZvyitaVCURqRduVllID7J5udy
G75s7ppLhppivpVUDdbZedhInq04SxMPdw3+IcFHKPK5tuG2vroFXIO1dEbf
1M1Ltb2Aztkp6MBF3XX2SbldNejkPHFl8cp++r//o0IOmdh/rleV/bTBYNWF
A2lgn2LIEb54mr2yz7Mygz/B4s2XirQ0sY/q7RWIXnvRORAd8INPgCdzkC//
1a3nsNr/A+XZZFbX3AAA

-->

</rfc>
