<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-mlkem-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ietf-tls-mlkem">ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-05"/>
    <author fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>kems</keyword>
    <keyword>tls</keyword>
    <abstract>
      <?line 106?>

<t>This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as <tt>NamedGroup</tt>s
and and registers IANA values in the TLS Supported Groups registry for use
in TLS 1.3 to achieve post-quantum (PQ) key establishment.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-mlkem/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/draft-ietf-tls-mlkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 112?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>FIPS 203 (ML-KEM) <xref target="FIPS203"/> is a FIPS standard for post-quantum <xref target="RFC9794"/>
key establishment via lattice-based key establishment mechanism (KEM). Having
a purely post-quantum (not hybrid) key establishment option for TLS 1.3 is
necessary for migrating beyond hybrids and for users that want or need
post-quantum security without hybrids.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="kems">
      <name>Key encapsulation mechanisms</name>
      <t>This document models key establishment as key encapsulation mechanisms
(KEMs), which consist of three algorithms:</t>
      <ul spacing="normal">
        <li>
          <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public encapsulation key <tt>pk</tt> and a secret
decapsulation key <tt>sk</tt>.</t>
        </li>
        <li>
          <t><tt>Encaps(pk) -&gt; (ct, shared_secret)</tt>: A probabilistic encapsulation
algorithm, which takes as input a public encapsulation key <tt>pk</tt> and
outputs a ciphertext <tt>ct</tt> and shared secret <tt>shared_secret</tt>.</t>
        </li>
        <li>
          <t><tt>Decaps(sk, ct) -&gt; shared_secret</tt>: A decapsulation algorithm, which takes as
input a secret decapsulation key <tt>sk</tt> and ciphertext <tt>ct</tt> and outputs
a shared secret <tt>shared_secret</tt>.</t>
        </li>
      </ul>
      <t>ML-KEM-512, ML-KEM-768 and ML-KEM-1024 conform to this interface:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-512 has encapsulation keys of size 800 bytes, expanded decapsulation
keys of 1632 bytes, decapsulation key seeds of size 64 bytes, ciphertext
size of 768 bytes, and shared secrets of size 32 bytes</t>
        </li>
        <li>
          <t>ML-KEM-768 has encapsulation keys of size 1184 bytes, expanded
decapsulation keys of 2400 bytes, decapsulation key seeds of size 64 bytes,
ciphertext size of 1088 bytes, and shared secrets of size 32 bytes</t>
        </li>
        <li>
          <t>ML-KEM-1024 has encapsulation keys of size 1568 bytes, expanded
decapsulation keys of 3168 bytes, decapsulation key seeds of size 64 bytes,
ciphertext size of 1568 bytes, and shared secrets of size 32 bytes</t>
        </li>
      </ul>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>The KEMs are defined as <tt>NamedGroup</tt>s, sent in the <tt>supported_groups</tt>
extension. <xref section="4.2.7" sectionFormat="of" target="RFC8446"/></t>
      <section anchor="negotiation">
        <name>Negotiation</name>
        <t>Each parameter set of ML-KEM is assigned an identifier, registered by IANA in
the TLS Supported Groups registry:</t>
        <artwork><![CDATA[
    enum {

         ...,

          /* ML-KEM Key Establishment Methods */
          mlkem512(0x0200),
          mlkem768(0x0201),
          mlkem1024(0x0202)

         ...,

    } NamedGroup;
]]></artwork>
      </section>
      <section anchor="construction-transmitting">
        <name>Transmitting encapsulation keys and ciphertexts</name>
        <t>The public encapsulation key and ciphertext values are each
directly encoded with fixed lengths as in <xref target="FIPS203"/>.</t>
        <t>In TLS 1.3 a KEM public encapsulation key <tt>pk</tt> or ciphertext <tt>ct</tt> is
represented as a <tt>KeyShareEntry</tt> <xref section="4.2.8" sectionFormat="of" target="RFC8446"/>:</t>
        <artwork><![CDATA[
    struct {
        NamedGroup group;
        opaque key_exchange<1..2^16-1>;
    } KeyShareEntry;
]]></artwork>
        <t>These are transmitted in the <tt>extension_data</tt> fields of
<tt>KeyShareClientHello</tt> and <tt>KeyShareServerHello</tt> extensions:</t>
        <artwork><![CDATA[
    struct {
        KeyShareEntry client_shares<0..2^16-1>;
    } KeyShareClientHello;

    struct {
        KeyShareEntry server_share;
    } KeyShareServerHello;
]]></artwork>
        <t>The <tt>KeyShareClientHello</tt> includes a list of <tt>KeyShareEntry</tt> structs that
represent the key establishment algorithms the client supports. For each
parameter of ML-KEM the client supports, the corresponding <tt>KeyShareEntry</tt>
consists of a <tt>NamedGroup</tt> that indicates the appropriate parameter, and a
<tt>key_exchange</tt> value that is the <tt>pk</tt> output of the <tt>KeyGen</tt> algorithm.</t>
        <t>For the client's share, the <tt>key_exchange</tt> value contains the <tt>pk</tt>
output of the corresponding KEM <tt>NamedGroup</tt>'s <tt>KeyGen</tt> algorithm.</t>
        <t>For the server's share, the <tt>key_exchange</tt> value contains the <tt>ct</tt>
output of the corresponding KEM <tt>NamedGroup</tt>'s <tt>Encaps</tt> algorithm.</t>
        <t>For all parameter sets, the server <bcp14>MUST</bcp14> perform the encapsulation key check
described in Section 7.2 of <xref target="FIPS203"/> on the client's encapsulation key,
and abort with an <tt>illegal_parameter</tt> alert if it fails.</t>
        <t>For all parameter sets, the client <bcp14>MUST</bcp14> check if the ciphertext length
matches the selected parameter set, and abort with an <tt>illegal_parameter</tt>
alert if it fails.</t>
        <t>If ML-KEM decapsulation fails for any other reason, the connection <bcp14>MUST</bcp14> be
aborted with an <tt>internal_error</tt> alert.</t>
      </section>
      <section anchor="construction-shared-secret">
        <name>Shared secret calculation</name>
        <t>The shared secret output from the ML-KEM <tt>Encaps</tt> and <tt>Decaps</tt> algorithms
over the appropriate keypair and ciphertext results in the same shared secret
<tt>shared_secret</tt> as its honest peer, which is inserted into the TLS 1.3 key
schedule in place of the (EC)DHE shared secret, as shown in
<xref target="fig-key-schedule"/>.</t>
        <figure anchor="fig-key-schedule">
          <name>Key schedule for key establishment</name>
          <artwork><![CDATA[
                                    0
                                    |
                                    v
                      PSK ->  HKDF-Extract = Early Secret
                                    |
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
                                    |
                                    v
                              Derive-Secret(., "derived", "")
                                    |
                                    v
             shared_secret -> HKDF-Extract = Handshake Secret
             ^^^^^^^^^^^^^          |
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
                                    |
                                    v
                              Derive-Secret(., "derived", "")
                                    |
                                    v
                         0 -> HKDF-Extract = Master Secret
                                    |
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
                                    +-----> Derive-Secret(...)
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="ind-cca">
        <name>IND-CCA</name>
        <t>The main security property for KEMs is indistinguishability under adaptive
chosen ciphertext attack (IND-CCA), which means that shared secret values
should be indistinguishable from random strings even given the ability to
have other arbitrary ciphertexts decapsulated.  IND-CCA corresponds to
security against an active attacker, and the public key / secret key pair can
be treated as a long-term key or reused. ML-KEM satisfies IND-CCA security in
the random oracle model <xref target="KYBERV"/>.</t>
        <t>TLS 1.3 does not prohibit key re-use; some implementations may use the same
ephemeral public key for more than one key establishment at the cost of
limited forward secrecy. Care must be taken to ensure that keys are only
re-used if the algorithms from which they are derived are designed to be
secure under key-reuse. ML-KEM's IND-CCA security satisfies this requirement
such that the public key/secret key pair can be used long-term or re-used
without compromising the security of the keys. However, it is still
recommended that implementations avoid re-use of any keys (including ML-KEM
keys) to ensure perfect forward secrecy.</t>
        <t>Implementations <bcp14>MUST NOT</bcp14> reuse randomness in the generation of ML-KEM
ciphertexts.</t>
      </section>
      <section anchor="binding-properties">
        <name>Binding properties</name>
        <t>TLS 1.3's key schedule commits to the the ML-KEM encapsulation key and the
ciphertext as the <tt>key_exchange</tt> field as part of the <tt>key_share</tt> extension
are populated with those values are included as part of the handshake
messages, providing resilience against re-encapsulation attacks against KEMs
used for key establishment <xref target="CDM23"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests/registers three new entries to the TLS Named Group (or
Supported Group) registry, according to the procedures in <xref section="6" sectionFormat="of" target="tlsiana"/>.</t>
      <dl>
        <dt>Value:</dt>
        <dd>
          <t>0x0200</t>
        </dd>
        <dt>Description:</dt>
        <dd>
          <t>MLKEM512</t>
        </dd>
        <dt>DTLS-OK:</dt>
        <dd>
          <t>Y</t>
        </dd>
        <dt>Recommended:</dt>
        <dd>
          <t>N</t>
        </dd>
        <dt>Reference:</dt>
        <dd>
          <t>This document</t>
        </dd>
        <dt>Comment:</dt>
        <dd>
          <t>FIPS 203 version of ML-KEM-512</t>
        </dd>
        <dt>Value:</dt>
        <dd>
          <t>0x0201</t>
        </dd>
        <dt>Description:</dt>
        <dd>
          <t>MLKEM768</t>
        </dd>
        <dt>DTLS-OK:</dt>
        <dd>
          <t>Y</t>
        </dd>
        <dt>Recommended:</dt>
        <dd>
          <t>N</t>
        </dd>
        <dt>Reference:</dt>
        <dd>
          <t>This document</t>
        </dd>
        <dt>Comment:</dt>
        <dd>
          <t>FIPS 203 version of ML-KEM-768</t>
        </dd>
        <dt>Value:</dt>
        <dd>
          <t>0x0202</t>
        </dd>
        <dt>Description:</dt>
        <dd>
          <t>MLKEM1024</t>
        </dd>
        <dt>DTLS-OK:</dt>
        <dd>
          <t>Y</t>
        </dd>
        <dt>Recommended:</dt>
        <dd>
          <t>N</t>
        </dd>
        <dt>Reference:</dt>
        <dd>
          <t>This document</t>
        </dd>
        <dt>Comment:</dt>
        <dd>
          <t>FIPS 203 version of ML-KEM-1024</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS203">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="AVIRAM" target="https://mailarchive.ietf.org/arch/msg/tls/F4SVeL2xbGPaPB2GW_GkBbD_a5M/">
          <front>
            <title>[TLS] Combining Secrets in Hybrid Key Exchange in TLS 1.3</title>
            <author initials="" surname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="" surname="Benjamin Dowling">
              <organization/>
            </author>
            <author initials="" surname="Ilan Komargodski">
              <organization/>
            </author>
            <author initials="" surname="Kenny Paterson">
              <organization/>
            </author>
            <author initials="" surname="Eyal Ronen">
              <organization/>
            </author>
            <author initials="" surname="Eylon Yogev">
              <organization/>
            </author>
            <date year="2021" month="September" day="01"/>
          </front>
        </reference>
        <reference anchor="CDM23" target="https://eprint.iacr.org/2023/1933.pdf">
          <front>
            <title>Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols</title>
            <author initials="C." surname="Cremers" fullname="Cas Cremers">
              <organization>CISPA Helmholtz Center for Information Security</organization>
            </author>
            <author initials="A." surname="Dax" fullname="Alexander Dax">
              <organization>CISPA Helmholtz Center for Information Security</organization>
            </author>
            <author initials="N." surname="Medinger" fullname="Niklas Medinger">
              <organization>CISPA Helmholtz Center for Information Security</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="DOWLING">
          <front>
            <title>A Cryptographic Analysis of the TLS 1.3 Handshake Protocol</title>
            <author fullname="Benjamin Dowling" initials="B." surname="Dowling">
              <organization/>
            </author>
            <author fullname="Marc Fischlin" initials="M." surname="Fischlin">
              <organization/>
            </author>
            <author fullname="Felix Günther" initials="F." surname="Günther">
              <organization/>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization/>
            </author>
            <date month="July" year="2021"/>
          </front>
          <seriesInfo name="Journal of Cryptology" value="vol. 34, no. 4"/>
          <seriesInfo name="DOI" value="10.1007/s00145-021-09384-1"/>
          <refcontent>Springer Science and Business Media LLC</refcontent>
        </reference>
        <reference anchor="FO">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author fullname="Eiichiro Fujisaki" initials="E." surname="Fujisaki">
              <organization/>
            </author>
            <author fullname="Tatsuaki Okamoto" initials="T." surname="Okamoto">
              <organization/>
            </author>
            <date month="December" year="2011"/>
          </front>
          <seriesInfo name="Journal of Cryptology" value="vol. 26, no. 1, pp. 80-101"/>
          <seriesInfo name="DOI" value="10.1007/s00145-011-9114-1"/>
          <refcontent>Springer Science and Business Media LLC</refcontent>
        </reference>
        <reference anchor="HHK">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author fullname="Dennis Hofheinz" initials="D." surname="Hofheinz">
              <organization/>
            </author>
            <author fullname="Kathrin Hövelmanns" initials="K." surname="Hövelmanns">
              <organization/>
            </author>
            <author fullname="Eike Kiltz" initials="E." surname="Kiltz">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 341-371"/>
          <seriesInfo name="DOI" value="10.1007/978-3-319-70500-2_12"/>
          <seriesInfo name="ISBN" value="[&quot;9783319704999&quot;, &quot;9783319705002&quot;]"/>
          <refcontent>Springer International Publishing</refcontent>
        </reference>
        <reference anchor="HPKE">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="hybrid">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="KYBERV" target="https://eprint.iacr.org/2024/843.pdf">
          <front>
            <title>Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="https://ieeexplore.ieee.org/iel7/6547086/6547088/06547131.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RACCOON" target="https://raccoon-attack.com/">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="tlsiana">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
      </references>
    </references>
    <?line 392?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Douglas Stebila for consultation on the
draft-ietf-tls-hybrid-design design, and to Scott Fluhrer, Eric Rescorla, and
Rebecca Guthrie for reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1a63LbyLH+j6eYyD9W2gi86Wp614lMUpai64q2t1ypRBoC
Q3JCAIOdAShxHe+znGc5T3a6ewYEQcKRN9mTqlTFVbsi5trd05eve8b3fS+T
WSS6bOvq0r8YXLFbZTL/h5wnWR6zC7FgJxMtRCySjI2VZu8uh6zd2Nvy+Gik
xbzLpMjGfhYZP45mIvYCnomJ0gvoSMbK80IVJDyG9UPNx5lfHe23DjyTj2Jp
jFRJtkhh3Png3amX5PFI6K4XwmpdL1CJEYnJTZdlOhce7LrnzcTiUemw6zGf
wVIG/8LCnse14MDOUAS5ltliy4Nhs4lWeQqt7zRPTKp0xi75QmhWjpqLJIe9
GHt+KGOW1K0fYWWZTNhbnILtMZcRtAMdf0ROG0pPsJnrYArN0yxLTbfZxFHY
JOeiUQxrYkNzpNWjEU2Y38R5E5lN85Fd8HHSrBPhFjCcZ1OlURAwhbFxHkVW
5H0hdagF66kkUVG0oG7YiyfyZ56BxLtsyJNwpJ5OfqA+YekPc53Hgc5Nlkd5
/McJtjYCFXteonQMM+ckqNPz22GntQf73Jw32q3GYatz3Lw+H75rYE8DujwP
lWBlysmH87uTqy5tlnE9EVmXPS+V2ExIJKf7ww/isvM0envLb9903v54/3b2
ZtS/5wdXTbukU+U/g5b+BdiORzLB84Gj0yIzoJLsbDHSMiTFHjwFU55MBDYv
1RqXIa1jnVan7bde+q02NS6lTP9895fBZFDLaxlrFbKTudQ8rh/yRiR/4zFs
1VePERBVP+o84gm7UDHIRoVmJutHXYgkWbBbIFMbldSPGSx4xO5UIr7YH6mE
fVQTMYeOXv+qs9etCPFCiBSF9z5lj6CHLJsKBg4Cpg4zrUBupUmwa4XqZMhD
4BgGaoUSA0YyAb8SHi2MNEyNsdsfcQOtqVaZClRktmr1QaRaJllD8kCTKsB5
7DXbL/f2Gmk4rp7T3vMn1GuwngY3ps2y3RpJj5uNHtgOOs6HtyfsTETxVEXZ
z6wHLhB4RhbPC60GCRYyqN/2pMH6/Glty5NIPIGAYLHVvt9u0+sGuxKhxCNa
2/laziLgd6P3n9obZvdvfrw8v367dAHtVuuoaVqt9v6Bb81n73jfRwM6vakf
1G77L9ttO+bs7KI66OXRsb/n77Vf+ketg1bL79y3Ozju9mLQZXenvZft4xZ8
T8mmwXj8fmPpHW2jHwojJ2gCFx/fDO4+1LueGlXbbx7vl5pW2MQpSgE8KZsL
LccLNI+LBUQqNkilUaFgH7rsioMPS4QfTEUwAzU/v+77vd4JM4WxoG0ESmsR
ZIkwZBQu9oJ3GHCz6OlFmqFRXL7vXXxs79UTLYUQT2mkNLpLIYhwKaKj5uHB
/lHr+ND9PW628Ed7r73BzWUezBbs3VTqTAgIBm8gclI8Q1NHj4iU9vEH0Aqx
dt1iVw2uUMFCAf/UADVnp1yHPNkccNFgbxurDuzupNe7ubmu51TzIFAq8XmW
8WCGkajq7u9sPzuh/i47lQnqN5E/QBHJDD+vENkMQRvkWAaAb/w3MvNvYPFI
GBcD/P7Z9mDnGe7u0LyQws2uqwYIUSazmCc1XINYViJEpQvENVSx0mpuZova
7iuZZfXL4txg+iiSWdUrtsD8ULRgJ0cv95ERsAsJvnjNUvQ4ON7fPxpJAE++
7zM+MhlIJfM8UA3DYhErFoox6LRxiuoftDu7xe+jw+NdErX7boPxMHAyD9fg
ckKCRg/Go4AA/2kxkQaPnZ2fXJ+wOY9yK/1C54Z5iqALDIemGjdDL8gR5UZ4
ZbhmmWJobWIuWIqn+5PDrdu3P+wAKlwwYTI+iqSZIoBtWP5iGYaR8LwX4NYg
koV5gH4Nvl+AigBS4fYTQQyIcY9tW8Z22KdPDvJ8/sxAMJwQEIMdkhD0nOir
UPHpk5P958/eBjFsLjmLQKVlIFxA3BwTC4Qo0gBHSEGDnfE5YgfO0lwL8ENV
rhOVOWdYwz1TKfnvFRQPXHiJCMAJcSffWE40J2sZiYWC87LL2YDuDgDOLpvy
jD1yXFSzRIjQqxCydHUIHFReEGUaKHRAo4C1LV4gB4OqJekbNU4Q5QjtDeQk
74fvtnbtX3Z9Q7/vBj+8P78b9PH38Ozk8nL5w3Mjhmc37y/75a9yZu/m6mpw
3beToZVVmrytq5OPW1aZt25u353fXJ9cblnlhPOGVCYnQUKGgZo3QuQIqpwC
tkSQYzwINoGWI/iAOW96t//7P+190ILfgRp02u2XoDb247h9BDrBHqcisbup
BM7SfoIdLDyepoJrXAWiDQt4KjMemV00KzNVjwmbCnD7nvftn1Eyf+my70ZB
2t5/7RqQ4UpjIbNKI8lss2VjshViTVPNNktpVtrXJF2l9+Rj5buQ+0rjd38A
wCyY3z7+w2sPVQjRu0hALCaPLChZGophn15gOvjZea/locUQniNTYxbcNX5h
PQ8tz+zswvHIYMowFwV3hEE7m0JiDAcE6S6oeWy64F7YA9D2ViTbO8x/zbbT
2S4zs50HwHwYPEd8JGFfMHnaciISoe1+y1V2wU3bnVyvQEeT5kBvsEYjLvGQ
zh4s2Eaj0xSTQrExysweGkjcgBYAsix5QQbkTUGdw3s7u47SyqaYzC5JdYRm
fIZEohdPwda/glpYBbwCDEbeApmCNmfiKWMPQWa5sUQ5loD8VRotJ31ictuA
gIOMuKkOQj6qgvgi3R5bUu42rJegBW411DpeUDbPUe559RF0I4CCniHkRj9D
zoc8zZgHgrSsXIRNQfAbkiZQaeTPgh23Wmy0AC3aZYAWMesIq+wB1cWE9uFe
pxi8KQIDbr5c93C/GFlKBJaiPhiDLLn+jfMsFym2W2EJJz7DUrt9vL/OU53a
04zOfimAr+YJVls554KnNoDpf44pOtHnuDooRfYsV3vtcvC/ytXBrzwqiuAA
yCxsAncbrHx+tiHc1gAgTFrcGG7gQfA76Hsd7nswBei7p+qbefCARJFgVbAB
MRNSTtprv9FpHCFJFET39w8BWCFsuxYTAG7c0ZOUX9A9AIDIUg6oW2A2a0S2
mnCh/WOCSEUKJkMEJmMp9O4SqELPaGHBqky8Z1EqmOcvv/xiq2kJYkBvmWSz
RqOxu/LJmt8WdFA5qhKVrgQgJzjFb5srE6jiB0a/3XoCeN/a2V3vA+uxfe3N
PlRC29nZqSXqMytP6BVxQcKlOmgM2QeiwhoFrnpFs6YQfrYy3WnHF+PDmoN1
yQHqkYBT9EKJOXNEsVqhI6O61Fg+wc9IJJNs6sLQKlIHn3teJgwcVfOZAAWQ
dt3LA07WAnAeKq3VZk6RfojGMoAsYvGwpqbHVTVdUQsrGlCM4gRKqdva86uy
LJPyn3ICxPfCFSu/azcanb+2D/3261fu1Cp0uIMDMRthgWohf4tKydyWxnUP
ySJ/ABGKiDyGt2SqF0ng9UxEkbJBbtkzFHoutOtZrmT+EYcVCllAS9+TozHf
tb7IzwoJr7yvWdgQZXbh9cVWqC5FxOrZlUkQ5SEBr8hhvfXDtpTYRKhUDZJu
DcJcQkQaYPlnzueZBjsFjSMFL91U6aJqZuzaRiwhmVTZWscagZ7DqeTAecX3
2uQNSyQBoUtcC/INrVINTlOUvtLGA+49rOrfg7VKt4idba2GQJDFxaKAwQ8l
72CHyGfJzjfGxhrLTe0mwETGZVLu4lV3qYoApbXKKGzwD8mw6vKryQB/8KvJ
sLh7kwzM7iqxyZ2tJY1RLpcC7iMkCO2bHouqjNXEs3BDR40OUrhatVBJ9QA2
1tu1hZoRXnuRd4Wo+CCjSEx4dL+kFBkB98jkmMmMjbmMzDMMOQ0mhohknEsd
pae1LtyLeQYjjJNDBMzgXcHqmk4xnyPSqyPyfGlYVdxE/VTh4MmCKdhcQ0zn
RiWFtSWJkysxMRIeEVBEISIBMXoCNAitVSGkBgXRYSUtCHgUFBuvhUsLv3w7
0MXLak7hdG+sldUJx06pY+isbXq0onDGU6hR68YOR55yqdcjL6hzHmXLupwB
iVap8NYyG4q7MGGqEvB9oLPoPmyaRcmLEdoGIMpnxDIew/6egeMO84ju4dII
UpzCrrYHvZ3+2aC680oRBPDYp09jOfFhFb9YhSL+L0Uoeu5f66tG/f2rRs2/
MOp2eIH5KTu76J/6gyeqrbLv2YBrgDLDImv/raj4vY//XrO+0HIufLv+NqC8
nf+A6f+aoIt/a5vvsq2QWkKs+m39P1JSsQk887UjPwMzgzEzUXvsf13992sp
+e+5/UaUtGrO7YpjJvhfW/3a6eR+P3XZi3XnbK/svt/CfHfZhkF3AzRvYWZf
PjDAkgNk57ZaijlmccXgB5UeWw9wV642esYA3cobCQx9EIsW5VMFik8h1jqT
SQ67U+UTBuR0Q89DnuLrFS+YKoD4q0HSXkeybbfbskQcC564K5Jq5Lb5rAfB
K49Ce31Q2RdlgVEdMrYQ/gAogC4AaXPYdyLx/xS+HX2Z8qZ8LhxW4XokQV0x
vVrJxUuMI8IGW15Fl4DV4DLlzfQEYW6GYAYUH3Z0PBa5QFYm73hgzYIx/CAY
EfDEG2HOKfgyT45UMvHBfGIaphBW5QbJccDFwMkZyEDN5k25K7g4eSi6qrWF
fEC19kKfwn2BJkIFq+AlGJzyVIJAaEstfNjwFTMKUIyM04heszlNivkC77SW
MMcTIL0Y1Cla5ZSuxpSmtCcBFF2b5WUOKFLG6EUSkm5Bl2aPeDtIogoWDdbD
rDzOYRRKCoJBgkVefN+mXVplyyrwhddCniU/LADzSjJJyuJq2VMsn1DBjTym
++1KW3RZZY9ZOL1Gq6SDKM7hmxr5l0dDNWgtfsqlJul5JqddHdOlqJo1KoGM
EgulKpAaEF9ecUcYqBiOLZameIGwJMPBQRRLg52pRzAIUEhJ+SeYTxR5+D4h
BrqwKGQz07Vj5nMlQ7clpcQA8knM2zbZp/cBJAe8qTU7K0eC+Rcg/42DhFxi
bZPi6s1quFNbeuLhcPTKhc8ywfdW7NXmCm/c8wXnqiQWXZ2Gf2PvqpauE7lG
2O1Q9Uo6UF9cgwHeqgczdUkvVYOwD1KpMqHHMeTOVoo++NaSpSq1DqZ4JgZ+
crV056opGytOCzDkxXgBPcECNLA8l8Q8+CeJOSNkA4VXgtOrcmWdk1kOQHfu
kaLVhhTwGfTMjVzGC1vSrcaV9TtDVHhYwjTLVwv20i8RjyBh8M9iKXs8Icr6
bUWYbSvtrVWJd5ZVYnCnAb6oIVW384H1AA5VC1fALLL4Q3Qm7uEGUe6xDyjc
rse6zNaBoalPBQC64KeOq0sQxkG7g134ruXmgpo/wvddaSvUdk1tY6FR2NRS
EQL09mh8Rn3LVxFgg6aiyD5tt0le+0vkHR0e/zvJo+02yet8iTysl/876bP7
0QuVEag1quhJMEvUYyTCCS5gAFLZh9Ei/H5rzCMjtqhCwJMZqWFf5RN83jfM
BGAETlaA8AhSeed0yA15a++IKy/lXNBw8V6xYaCyjJ1GOeg9ON2BBjd/B+JS
OuI0yLsTIxEEnL3NwTakhXNazKV4BH/2f1myLPdhLgAA

-->

</rfc>
