<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-02"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="November" day="05"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 124?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk of
store and decrypt attacks, where data encrypted today using traditional
algorithms could be decrypted in the future by an attacker with a
Cryptographically-Relevant Quantum Computer (CRQC). While traditional
authentication is only at risk once a CRQC exists, it is important to
consider the transition to post-quantum authentication before this point.
This is particularly relevant for systems where algorithm turn-over is
complex or takes a long time (e.g., long-lived systems with hardware roots of
trust), or where future checks on past authenticity play a role (e.g.,
digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms means
that less cryptanalysis of such algorithms is available than for
long-established counterparts, such as RSA and elliptic-curve based solutions
for confidentiality and authenticity. This has drawn attention to hybrid
cryptographic schemes, which combine both traditional and post-quantum (or
more generally next-generation) algorithms in one cryptographic scheme. These
may offer increased assurance for implementers, namely that as long as the
security of one of the two component algorithms of the hybrid scheme holds,
the confidentiality or authenticity offered by that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Conservative users may not have complete trust in the
post-quantum algorithms or implementations available, while also recognizing
a need to start post-quantum transition. For such users, hybridization can
support near-term transition while also avoiding trusting solo post-quantum
algorithms too early. On the other hand, hybrid schemes, particularly for
authentication, may introduce significant complexity into a system or a
transition process, so might not be the right choice for all.  For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and in an
initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their scheme. It does not attempt to answer the question of whether or not a
hybrid scheme is desirable for, or should be used in a given case. It also
intentionally does not propose concrete hybrid signature combiners or
instantiations thereof.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
transition, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future transitions to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Cryptography
Standardization Process <xref target="NIST_PQC_FAQ"/>. Thus, if and when further information
on caveats and implementation issues come to light, it is less likely that a
"break" will be catastrophic. Instead, such vulnerabilities and issues may
represent a weakening of security - which may in turn be offset if a hybrid
approach has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity to a
protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication that is normally assured under
correct verification of digital signature(s), is now potentially also
reliant on further investigation on the receiver side that may extend
well beyond traditional signature verification behavior. For instance,
this can intuitively be seen in cases of a message containing a context
note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one
component signature but not the other, then artifacts in the message
itself point to the possible existence of hybrid signature such as a
label stating “this message must be hybrid signed”. This might be a
counter measure against stripping attacks if the verifier expects a
hybrid signature scheme to have this property. However, it places the
responsibility of signature validity not only on the correct format of
the message, as in a traditional signature security guarantee, but the
precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component signatures
needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs
simultaneously. Namely, "missing" information needs to be computed by the
verifier so they cannot “quit” the verification process before both component
signatures are verified. SV mimics traditional digital signatures guarantees,
essentially ensuring that the hybrid digital signature behaves as a single
algorithm vs. two separate component stages. Alternatively phrased, under an
SV guarantee it is not possible for an unerring verifier to initiate
termination of the hybrid verification upon successful verification of one
component algorithm without also knowing if the other component succeeded or
failed.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example to achieve backwards/forwards-compatibility), or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible
validity/invalidity of the component signatures until both verify (or fail to
verify). This construct most closely mirrors traditional digital signatures
where, assuming that the verifier does verify a signature at all, the result
is either a positive verification of the full signature or a failure if the
signature is not valid. For fused hybrid signatures, a <tt>full signature</tt>
implies the fusion of both component algorithms, and therefore the strongest
non-separability notion enforces an all-or-nothing approach to
verification. Examples of algorithms providing this type of security can be
found in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach.  Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash(comm_1,comm_2,message).  As such, c does not belong to either of the
component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the
adversary 'wins' the security experiment if it can produce a new message such
that a message-signature pair <tt>(m, sig)</tt> correctly verifies. This traditional
security notion is challenged under a hybrid construct.</t>
      <t>The most straightforward comparison would be for the adversary to attempt to
produce a new message <tt>m'</tt> that a message-hybrid signature pair <tt>(m', sig_h)</tt>
correctly verifies.  However, such a guarantee depends on the signature being
strongly non-separable. Otherwise, in practical terms a security experiment
must capture the case that an existing or new message <tt>m</tt> could be verified
with a component signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly
verifies under <tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of
traditional security analysis and represent considerations that would need to
be accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip an component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="10" month="September" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
