<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-05"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="December" day="17"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 120?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 133?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Plans to transition protocols to post-quantum cryptography sometimes focus on
confidentiality, given the potential risk of store and decrypt attacks, where
data encrypted today using traditional algorithms could be decrypted in the
future by an attacker with a sufficiently powerful quantum computer, also
known as a Cryptographically-Relevant Quantum Computer (CRQC).</t>
      <t>It is important to also consider transitions to post-quantum authentication;
delaying such transitions creates risks. For example, attackers may be able
to carry out quantum attacks against RSA-2048 years before the public is
aware of these capabilities. Furthermore, there are applications where
algorithm turn-over is complex or takes a long time. There are also
applications where future checks on past authenticity play a role, such as
long-lived digital signatures on legal documents.</t>
      <t>Still, there have been successful attacks against proposals using
post-quantum cryptography. Sometimes an attack exploits implementation
issues, such as <xref target="KYBERSLASH"/>, which exploits timing variations, or <xref target="HQC_CVE"/>
which exploits implementation bugs. Sometimes an attack works for all
implementations of the specified algorithm. Research has indicated that
implementation-independent attacks published in 2023 or earlier had broken
48% of the proposals in Round 1 of the NIST Post-Quantum Cryptography
Standardization Project, 25% of the proposals not broken in Round 1, and 36%
of the proposals selected by NIST for Round 2 <xref target="QRCSP"/>.</t>
      <t>Such cryptanalysis and security concerns are one reason for to consider
'hybrid' cryptographic algorithms, which combine both traditional and
post-quantum (or more generally a combination of two or more) algorithms. A
core objective of hybrid algorithms is to protect against quantum computers
while at the same time making clear that the change is not reducing
security. A premise of security of these algorithms being that if at least
one of the two component algorithms of the hybrid scheme holds, the
confidentiality or authenticity offered by that scheme is maintained. It
should be noted that the word 'hybrid' has many uses, but this document uses
'hybrid' only in this algorithm sense.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Users may recognize a need to start post-quantum transition,
even while issues such as those described above are a concern. For this,
hybridization can support transition. It should be noted that hybridization
is not necessary for all systems; recommendations on system types or analysis
methods for such determination are out of scope of this document. For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization of digital signatures, where the verification tag may be
expected to attest to both standard and post-quantum components,
is subtle to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, which will be discussed in this draft. Some of these are
mutually exclusive, which highlights the importance of considering use-case
specific requirements.</t>
      <t>This document focuses on explaining a spectrum of different hybrid signature
scheme design categories and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their use case. In scope limitations, it does not attempt to give concrete
recommendations for any use case. It also intentionally does not propose
concrete hybrid signature combiners or instantiations thereof. As with the
data authenticity guarantees provided by any digital signature, the security
guarantees discussed in this document are reliant on correct provisioning of
the keys involved, e.g. entity authentication.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum transition
or use in long-term post-quantum deployment, hence the reference to
post-quantum algorithms through this draft.  However, the majority of the
discussion in this document applies equally well to future transitions to
other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize a
signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within the
digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in the
case of signature stripping.</t>
          </li>
          <li>
            <t>Stripping attack: A stripping attack refers to a case where an adversary
takes a message and hybrid signature pair and attempts to submit (a
potential modification of) the pair to a component algorithm verifier.  A
common example of a stripping attack includes a message and hybrid
signature, comprised of concatenated post-quantum and traditional
signatures, where an adversary simply removes the post-quantum component
signature and submits the message and traditional component signature to a
traditional verifier. Stripping attacks should not be confused with
component message forgery attacks.</t>
          </li>
          <li>
            <t>Component message forgery attacks: A forgery attack refers to a case where
an adversary attempts to forge a (non-hybrid) signature on a message using
the public key associated with a component algorithm. An common example of
such an attack would be a quantum attacker compromising the key associated
with a traditional component algorithm and forging a message and signature
pair.  Message forgery attacks may be formalized with experiments such as
EUF-CMA, while the difference introduced in component message forgery
attacks is that the key is accepted for both hybrid and single algorithm
use. Further discussions on this appear under <xref target="euf-cma-challenges"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at motivations for them. As many of the arguments hold
in general for hybrid algorithms, we again refer to
<xref target="I-D.ietf-tls-hybrid-design"/> that summarizes these well. In addition, we
explicate the motivation for hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (also known as CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, attacks against the next-generation
multivariate schemes Rainbow and GeMSS might raise concerns for
conservative adopters of other algorithms, which could hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks (e.g., component algorithm forgeries).
Thus, even in a relatively simple algorithm subtleties and caveats on
implementation and use can arise over time. Given the complexity of next
generation algorithms, the chance of such discoveries and caveats needs to
be taken into account.</t>
          <t>Of note, some next generation algorithms have received considerable
analysis attention, for example, following attention gathered during the
NIST Post-Quantum Cryptography Standardization Process <xref target="NIST_PQC_FAQ"/>.
Thus, if and when further information on caveats and implementation issues
come to light, it is more likely that vulnerabilities will represent a
weakening of security than a full "break". Such weakening may also be offset
if a hybrid approach has been used.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> has been used to illustrate
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. In terms of risk to data confidentiality
guarantees and therefore key exchange and KEM algorithms, application
of this equation is fairly straightforward. In contrast, it may not be
obvious why there is urgency for an adoption of post-quantum signatures;
namely, while encryption is subject to store-now-decrypt-later attacks,
a parallel notion for authenticity, i.e., 'store-now-modify-later attacks'
may not be readily apparent.</t>
          <t>However, in large systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where the
security assumption for the scheme, e.g. EUF-CMA, is maintained as long as at
least one of the component schemes is EUF-CMA secure without a
prioritisation. We call this notion 'hybrid unforgeability'; it is a specific
type of hybrid authentication. For example, the concatenation combiner in
<xref target="HYBRIDSIG"/> is 'hybrid unforgeable'. As mentioned above, this might be
incompatible with backward-compatibility, where the EUF-CMA security of the
hybrid signature relies solely on the security of one of the component
schemes instead of relying on both, e.g., the dual message combiner using
nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our discussion
below. Note that unlike EUF-CMA security, SUF-CMA security of the hybrid
scheme may rely on SUF-CMA security of both component schemes achieving
SUF-CMA, depending on the hybridization approach.  For instance, this can be
clearly seen under a concatenation combiner where the hybrid signature is
comprised of two distinct component signatures; in that case, if either
component signature does not offer SUF-CMA, the hybrid does not achieve
SUF-CMA.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security assumed
for only one component scheme generally use hybrid techniques for their
'functional transition' pathway support, while fully trusting either the
traditional or post-quantum algorithm. E.g., hybrid signatures may be used as
a transition step for when a system or system-of-systems is comprised of some
verifiers that support traditional signatures only while other verifiers are
upgraded to also support post-quantum signatures. In this example, a system
manager is using hybrid signatures as a 'functional transition' support, but
not yet expecting different security guarantees. As such, EUF-CMA security is
assumed for one component algorithm.</t>
            <t>In contrast, use cases where a hybrid scheme is used with e.g., EUF-CMA
security assumed for both component schemes without prioritisation between
them can use hybrid techniques for both functional transition and security
transition, where it may not be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc. Otherwise, an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that
an adversary cannot simply “remove” one of the component signatures without
evidence left behind. For example, there are artifacts that a carefully
designed verifier may be able to identify, or that are identifiable in later
audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from
potentially creating a valid component digital signature from a hybrid one (a
signature stripping attack), but rather implies that such a digital signature
will contain artifacts of the separation. Thus, authentication that is
normally assured under correct verification of digital signature(s), is now
potentially also reliant on further investigation on the receiver side that
may extend well beyond traditional signature verification behavior. For
instance, this can intuitively be seen in cases of a message containing a
context note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one component
signature but not the other, then artifacts in the message itself point to
the possible existence of hybrid signature such as a label stating, “this
message must be hybrid signed”. This might be a counter measure against
stripping attacks if the verifier expects a hybrid signature scheme to have
this property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation, but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ietf-lamps-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature may
be verified by only verifying one component signature, allowing the scheme to
be used by legacy receivers. In general, this means verifying the traditional
component signature scheme, potentially ignoring the post-quantum signature
entirely. This provides an option to transition sender systems to
post-quantum algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided
a hybrid digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component
signature. Backwards compatibility may be further decomposed to subcategories
where component key provenance is either separate or hybrid so as to support
implementations that cannot recognize (and/or process) hybrid signatures or
keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
post-quantum) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus, the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot use
and/or process hybrid or post-quantum signatures, whereas in forwards
compatibility the system has those capabilities and can choose what to
support (e.g., for efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component signatures
needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs roughly
simultaneously. Namely, "missing" information needs to be computed by the
verifier so that a normally functioning verification algorithm cannot “quit”
the verification process before both component signatures are verified. This
may additionally cover some error-injection and similar attacks, where an
adversary attempts to make an otherwise honest verifier skip component
algorithm verification. SV mimics traditional digital signatures guarantees,
essentially ensuring that the hybrid digital signature behaves as a single
algorithm vs.  two separate component stages. Alternatively phrased, under an
SV guarantee it is not possible for an otherwise honest verifier to initiate
termination of the hybrid verification upon successful verification of one
component algorithm without also knowing if the other component
succeeded. Note that SV does not prevent dishonest verification, such as if a
verifier maliciously implements a customized verification algorithm that is
designed with intention to subvert the hybrid verification process or skips
signature verification altogether.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example, to achieve backwards/forwards-compatibility) or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible validity of the
component signatures until both verify (or verification failure may or may
not be attributable to a specific component algorithm). This construct most
closely mirrors traditional digital signatures where, assuming that the
verifier does verify a signature at all, the result is either a positive
verification of the full signature or a failure if the signature is not
valid. For fused hybrid signatures, a <tt>full signature</tt> implies the fusion of
both component algorithms, and therefore this type of construction has the
potential to achieve the strongest non-separability notion which ensures an
all-or-nothing approach to verification, regardless of adversarial
action. Examples of algorithms providing this type of security can be found
in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus, in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach. Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies, and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash((comm_1, comm_2), Hash2(message)).  As such, c does not belong to either
of the component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making an <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using an <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and next-gen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus, as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Unforgeability properties for hybrid signature schemes are more nuanced than
for single-algorithm schemes.</t>
      <t>Under the traditional EUF-CMA security assumption, an adversary can request
signatures for messages of their choosing and succeeds if they are able to
produce a valid signature for a message that was not part of an earlier
request.  EUF-CMA can be seen as applying to the hybrid signature scheme in
the same way as single-algorithm schemes, but also has several layers of
nuance under a hybrid construct.</t>
      <t>Namely, the most straightforward extension of the traditional EUF-CMA
security game would be that an adversary can request hybrid signatures for
messages of their choosing and succeeds if they are able to produce a valid
hybrid signature for a message that was not part of an earlier
request. However, achieving EUF-CMA security in such a straightforward way
depends on the either component algorithm forgeries, a.k.a. cross-protocol
attacks, being out of scope or the hybrid signature choice being strongly
non-separable.</t>
      <t>Component algorithm forgeries, which can be seen as a type of cross-protocol
attack, affect the type of unforgeability properties offered by a scheme and
are a practical consideration that system designers and managers should be
aware of when selecting among hybrid schemes. Under such a forgery, for
example, an adversary that has access to a hybrid signature can attempt to
separate out one of the component signatures and fraudulently present it to
the component algorithm for verification. This in turn can cause a loss of
EUF-CMA security on the component algorithm, namely if the adversary's
actions result in the component verifier accepting a message that was not
previously signed by that component algorithm.</t>
      <t>The component algorithm forgery verifier target does not need to be the
intended recipient of the hybrid-signed message and may even be in an
entirely different system. This vulnerability is particularly an issue among
concatenated or nested hybrid signature schemes when component
verification. It should be noted that policy enforcement of a hybrid
verification does not mitigate the issue on the intended message recipient:
the component forgery could occur on any system that accepts the component
keys.</t>
      <t>There are a couple approaches to alleviating this issue. One is on
restricting key reuse. As noted in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, prohibiting
hybrid algorithm and composite algorithm signers and verifiers from using the
same keys can help ensure that a component verifier cannot be tricked into
verifying the hybrid signature. One such means for restricting key reuse is
through allowed key use descriptions in certificates. While prohibiting key
reuse reduces the risk of such component forgeries, and is the mitigation
described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, it is still a policy requirement
and not a cryptographic assurance. Component forgery attacks may be possible
if the policy is not followed or is followed inconsistently across all
entities that might verify signatures using those keys. This needs to be
accounted for in any security analysis. Since cryptographic provable security
modeling has not historically accounted for key reuse in this way, it should
not be assumed that systems with existing analyses are robust to this issue.</t>
      <t>Another approach to alleviating the component forgery risk is through hybrid
signature selection, by choosing schemes that provide strong
non-separability. Under this approach ensures that the hybrid signature
cannot be separated into component algorithm signatures that will verify
correctly, thereby preventing the signature separation required for the
component forgery attack to be successful.</t>
      <t>It should be noted that weak non-separability is insufficient for mitigating
risks of component forgeries. As noted in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, in
cases hybrid algorithm selection that provides only weak non-separability key
reuse should be avoided, as mentioned above, to mitigate risks of introducing
EUF-CMA vulnerabilities for component algorithms.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip a component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>D.J. Bernstein, Scott Fluhrer, Felix Günther, John Gray, Serge Mister,
Max Pala, Mike Ounsworth, Douglas Stebila, Falko Strenzke, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HQC_CVE" target="https://nvd.nist.gov/vuln/detail/CVE-2024-54137">
        <front>
          <title>Correctness error in HQC decapsulation</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="December" day="06"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="11" month="December" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-05"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>Bundesdruckerei GmbH</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="KYBERSLASH" target="https://eprint.iacr.org/2024/1049">
        <front>
          <title>KyberSlash: Exploiting secret-dependent division timings in Kyber implementations</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="June" day="30"/>
        </front>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="QRCSP" target="https://cr.yp.to/papers/qrcsp-20231124.pdf">
        <front>
          <title>Quantifying risks in cryptographic selection processes</title>
          <author initials="D." surname="Bernstein" fullname="Daniel J. Bernstein">
            <organization/>
          </author>
          <date year="2023" month="November" day="24"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
