<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-pqc-app-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="September" day="18"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for device manufacturers, application developers, and service providers. This document highlights the unique characteristics of applications and offers best practices for implementing quantum-ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries, including those equipped with CRQCs. The degree of vulnerability varies depending on the application, the underlying systems, the value of the data being transmitted, and the attractiveness of attacking a particular individual, device, or flow. This document outlines quantum-ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, together with essential supporting protocols (e.g., DNS), can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM). Such algorithms rely on mathematical problems (e.g., lattices) that are believed to be hard for both classical and CRQCs to solve efficiently.</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum-ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality (see Section 7 of <xref target="I-D.ietf-pquip-pqc-engineers"/>), while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking certificate-based authentication mechanisms that rely on traditional algorithms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>As explained in the previous section, data that is only temporarily in transit may nevertheless require protection for many years. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.ietf-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.ietf-tls-mlkem-key-agreement"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include sectors governed by stringent cryptographic standards.</t>
      <t>In practice, applications that rely on TLS typically depend on the underlying TLS library. Upgrading to a library version that supports TLS 1.3 and PQC key exchange extensions is a necessary first step, but it may not be sufficient, as it is not known whether PQC groups are enabled by default across different implementations. Applications that configure protocol versions or cipher suites explicitly <bcp14>MUST</bcp14> update these settings to ensure that hybrid or pure PQC key exchange groups are enabled. Applications that rely on library defaults <bcp14>SHOULD</bcp14> review the library documentation or perform interoperability testing to confirm that PQC groups are negotiated as intended. Operators should also consider potential interoperability issues with legacy peers that do not yet support TLS 1.3 and PQC key exchange extensions.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the important challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets in both TLS and DTLS. This fragmentation increases the risk of packet loss and retransmissions, leading to potential delays. During the TLS handshake, the server will respond to the ClientHello with its public key and ciphertext. If these components also exceed the MTU, the ServerHello message may be fragmented, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon. More generally, middleboxes may also mishandle fragmented IP/UDP packets, which makes this issue particularly significant for DTLS deployments.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="use-of-external-psk-with-traditional-key-exchange-for-data-confidentiality">
      <name>Use of External PSK with Traditional Key Exchange for Data Confidentiality</name>
      <t><xref target="RFC8772"/> provides an alternative approach for ensuring data confidentiality by combining an external pre-shared key (PSK)
with a traditional key exchange mechanism, such as ECDHE. The external PSK is incorporated into the TLS 1.3 key schedule,
where it is mixed with the (EC)DHE-derived secret to strengthen confidentiality.</t>
      <t>While using an external PSK in combination with (EC)DHE can enhance confidentiality, it has the following limitations:</t>
      <ul spacing="normal">
        <li>
          <t>Key Management Complexity: Unlike ephemeral ECDHE keys, external PSKs require secure provisioning and lifecycle management.</t>
        </li>
        <li>
          <t>Limited Forward Secrecy: If an external PSK is static and reused across sessions, its compromise can retroactively expose
past communications if the traditional key exchange is broken by a CRQC.</t>
        </li>
        <li>
          <t>Scalability Challenges: Establishing unique PSKs for many clients can be impractical, especially in large-scale deployments.</t>
        </li>
        <li>
          <t>Impersonation Risk: Because PSKs are symmetric, any party in possession of the PSK can authenticate as either the client or the server. This differs from certificate-based authentication, where compromise of a private key only enables impersonation of the corresponding entity.</t>
        </li>
        <li>
          <t>Quantum Resistance Dependence: While PSKs can provide additional secrecy against quantum threats, they must be
generated using a secure key-management technique. If a weak PSK is used, it may not offer sufficient security against
brute-force attacks.</t>
        </li>
      </ul>
      <t>Despite these limitations, external PSKs can serve as a complementary mechanism in PQC transition strategies, providing additional
confidentiality protection when combined with traditional key exchange.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <section anchor="quantum-ready-authentication">
        <name>Quantum-Ready Authentication</name>
        <t>The quantum-ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
        <t>The quantum-ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      </section>
      <section anchor="post-quantum-x509-certificates">
        <name>Post-Quantum X.509 Certificates</name>
        <t>Post-quantum certificates contain only a PQC public key and are signed using a post-quantum algorithm. They are suitable for deployments capable of fully embracing post-quantum cryptography.</t>
        <ul spacing="normal">
          <li>
            <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.tls-westerbaan-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
          </li>
          <li>
            <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. <xref target="I-D.reddy-tls-slhdsa"/> details how SLH-DSA is used in TLS 1.3 and compares its advantages and disadvantages with ML-DSA in Section 2 of the document.</t>
          </li>
        </ul>
      </section>
      <section anchor="hybrid-composite-x509-certificates">
        <name>Hybrid (Composite) X.509 Certificates</name>
        <t>A composite certificate contains both a traditional public key algorithm (e.g., ECDSA) and a post-quantum algorithm (e.g., ML-DSA) within a single X.509 certificate. This design enables both algorithms to be used in parallel, the traditional component ensures compatibility with existing infrastructure, while the post-quantum component introduces resistance against future quantum attacks.</t>
        <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
      </section>
      <section anchor="transition-considerations">
        <name>Transition Considerations</name>
        <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
        <ul spacing="normal">
          <li>
            <t>Frequency and duration of system upgrades</t>
          </li>
          <li>
            <t>The expected timeline for CRQC availability</t>
          </li>
          <li>
            <t>Operational flexibility to enable or disable algorithms</t>
          </li>
        </ul>
        <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
        <t>Composite certificates enhance resilience during the adoption of PQC by:</t>
        <ul spacing="normal">
          <li>
            <t>Providing defense-in-depth: They maintain security even if one algorithm is compromised.</t>
          </li>
          <li>
            <t>Reducing exposure to unforeseen vulnerabilities: They offer immediate protection against potential weaknesses in PQC algorithms.</t>
          </li>
        </ul>
        <t>However, composite certificates comes with long-term implications. Once the traditional algorithm is no longer considered secure, due to CRQCs, it will have to be deprecated. To complete the transition to a fully quantum-resistant authentication model, it will be necessary to provision a new root CA certificate, that uses only a PQC signature algorithm and public key. This new root CA would issue a hierarchy of intermediate certificates, each also signed using a PQC algorithm and ultimately issue end-entity certificates that likewise contain only PQC public keys and are signed with PQC algorithms. This ensures that the entire certification path from the root of trust to the end-entity is cryptographically resistant to quantum attacks and does not depend on any traditional algorithms.</t>
        <t>Alternatively, a deployment may choose to continue using the same hybrid certificate even after the traditional algorithm has been broken by the advent of a CRQC. While this may simplify operations by avoiding re-provisioning of trust anchors, it introduces a significant risk: the composite signature will no longer achieve Strong Unforgeability (SUF) (Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>), as explained in Section 11.2 of <xref target="I-D.reddy-tls-composite-mldsa"/>.</t>
        <t>In this scenario, a CRQC can forge the broken traditional signature component (s1<em>) over a message (m). That forged component can then be combined with the valid post-quantum component (s2) to produce a new composite signature (m, (s1</em>, s2)) that verifies successfully, thereby violating SUF. This highlights the critical need to retire hybrid certificates containing broken algorithms once CRQCs are available.</t>
      </section>
      <section anchor="deployment-realities">
        <name>Deployment Realities</name>
        <t>Centralized networks, which are characterized by strong administrative control, internal CAs, and close relationships with vendors, are generally well-positioned to manage the overhead of larger PQC keys and signatures. Such networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively. For example, telecom networks fit this model and may be able to transition more quickly than more distributed environments.</t>
        <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      </section>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns: the client includes fingerprints of cached objects in the ClientHello, which are visible to eavesdroppers. These values can be used to correlate independent TLS sessions from the same client, potentially compromising anonymity. While this is not a concern for many industrial IoT scenarios, it may be inacceptable to smart home deployments.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
          <li>
            <t>Trust Anchor Identifiers ({?I-D.ietf-tls-trust-anchor-ids}): This extension allows a client to signal a compact list of trusted root CAs using unique trust anchor identifiers rather than Distinguished Names. This reduces the size of the "certificate_authorities" extension and helps the server select an appropriate certificate chain,
especially when multiple hierarchies are used (e.g., separate traditional and PQ roots). This mechanism can help reduce handshake size and improve efficiency in hybrid or PQC deployments.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify service providers via device management systems or generate logs indicating that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the application developments for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user or record the event in diagnostic logs. This message or record should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. In some environments, such as EAP deployments, supplicants may provide little or no diagnostic feedback to end-users beyond a generic failure message. In such cases, implementers would have to ensure sufficient diagnostic logging or telemetry is available for administrators to diagnose PQC-related interoperability problems. Notifications to end-users may also not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to HNDL attacks if an attacker gains access to the public keys used in the TLS key exchange. If an attacker records a complete set of encrypted DNS messages, including the TLS handshake details, they could store this data today and later use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum-ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support both pure PQC KEMs and PQ/T hybrid KEMs, as described in <xref target="I-D.ietf-hpke-pq"/>. These extensions ensure compatibility with PQC, while allowing deployments to choose between pure PQC KEM or PQ/T KEM.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
        <t>To safeguard against HNDL attacks, ECH deployments <bcp14>MUST</bcp14> incorporate support for either pure PQC KEM or PQ/T hybrid KEM. PQ/T hybrid KEM is generally preferred, as it provides defense-in-depth by combining the strengths of both classical and PQC algorithms, ensuring continued security even if one is later found to be weak. Pure PQ KEMs may be required for deployments subject to regulatory or compliance mandates that necessitate the exclusive use of PQC. In hybrid mode, the public_key field in the HpkeKeyConfig structure accommodates a concatenation of classical and PQC KEM public keys, whereas in pure PQ mode only the PQC KEM public key is included.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The adoption of PQC in TLS-based applications will not be a simple binary decision but rather a gradual transition that  demands a careful evaluation of
trade-offs and deployment considerations. Application providers will need to assess algorithm selection, performance impact,
interoperability, and security requirements tailored to their specific use cases. While the IETF defines cryptographic mechanisms for TLS and
provides guidance on PQC transition strategies, it does not prescribe a one-size-fits-all approach. Instead, this document outlines key
considerations to assist stakeholders in adopting PQC in a way that aligns with their operational and security requirements.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of
maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic
algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory
requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while
ensuring resilience to potential catastrophic vulnerabilities in any single algorithm. This approach allows for a gradual
transition to PQC, preserving the benefits of traditional cryptosystems without requiring their immediate replacement.</t>
      <section anchor="mitm-attacks-with-crqc">
        <name>MITM Attacks with CRQC</name>
        <t>A MITM attack is possible if an adversary possesses a CRQC capable of breaking traditional public-key signatures. The attacker can generate
a forged certificate and create a valid signature, enabling them to impersonate a TLS peer, whether a server or a client. This completely undermines the authentication
guarantees of TLS when relying on traditional certificates.</t>
        <t>To mitigate such attacks, several steps need to be taken:</t>
        <ol spacing="normal" type="1"><li>
            <t>Revocation and Transition: Both clients and servers that use traditional certificates will have to revoke them and migrate to PQC authentication.</t>
          </li>
          <li>
            <t>Client-Side Verification:  Clients should avoid establishing TLS sessions with servers that do not support PQC authentication.</t>
          </li>
          <li>
            <t>PKI Migration: Organizations should transition their PKI to post-quantum-safe certification authorities and discontinue issuing certificates based on traditional cryptographic methods.</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Russ Housley, Loganaden Velvindron, Bas Westerbaan, Richard Sohn, Andrei Popov, Alan DeKok, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="23" month="March" year="2025"/>
            <abstract>
              <t>   This draft defines three hybrid key agreements for TLS 1.3:
   X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which
   combine a post-quantum KEM with an elliptic curve Diffie-Hellman
   (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ecdhe-mlkem-00"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem-key-agreement">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-03"/>
        </reference>
        <reference anchor="RFC8772">
          <front>
            <title>The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP)</title>
            <author fullname="S. Hu" initials="S." surname="Hu"/>
            <author fullname="D. Eastlake" initials="D." surname="Eastlake"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="T. Chua" initials="T." surname="Chua"/>
            <author fullname="D. Huang" initials="D." surname="Huang"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>A Broadband Network Gateway (BNG) in a fixed wireline access network is an Ethernet-centric IP edge router and the aggregation point for subscriber traffic. Control and User Plane Separation (CUPS) for such a BNG improves flexibility and scalability but requires various communication between the User Plane (UP) and the Control Plane (CP). China Mobile, Huawei Technologies, and ZTE have developed a simple CUPS control channel protocol to support such communication: the Simple Control and User Plane Separation Protocol (S-CUSP). S-CUSP is defined in this document.</t>
              <t>This document is not an IETF standard and does not have IETF consensus. S-CUSP is presented here to make its specification conveniently available to the Internet community to enable diagnosis and interoperability.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8772"/>
          <seriesInfo name="DOI" value="10.17487/RFC8772"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory guidelines.  Composite ML-DSA is
   applicable in any application that uses X.509 or PKIX data structures
   that accept ML-DSA, but where the operator wants extra protection
   against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-07"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7V923Ib15LlO76ijvxwSAcAXSxZMqOnz6FJ6oihGy1Qx32i
o8NRADaA3SpUwXUhBTsU0R8xL/M23zKf0l8yuTJz3wpFSe7pebBFgoWqvXPn
PVdmTSaTUWvbwpxk966qpp381OVl222zs3q/a6t1ne82++ydWVTbrSmXeWur
sslWVZ1dv5pN5nljltnpblfYhfzp3iifz2tzg9v9dPaHvkg/mHVV70+ypl2O
RstqUeZbWteyzlftpDbL5X7Stflk9+tiku92k4Kub9pR0823tmnoHu1+R5df
Xlw/H5Xddm7qkxE915yMFnR/UzZdc5K1dWdGtLrvRnltclplvIYsL5e05LyY
XNutyU7pinuj26r+sK6rbkcX0+PvjT6YPX22PBllk4z2iH/O38zwz89m/u6a
P3hx9fIC/17M3lzKdfevsxf7eW1pZzem7GhVWZbcNstk/fd+pgfacp39DX/F
59vcFnLVX61pV9OqXuPjvF5s6ONN2+6ak/v3cRU+sjdm6i67jw/uz+vqtjH3
6fv3741Go6albf6SF1VJT9ubZrSzJ9m/ttVinDVV3dZm1dBP+63+0NZ20Y4z
OceWPqGD2RL9aYn/NhrlXbupatCCVpRlq64o5NSubd1t88I0t3lNNKXD4wto
UXlpf2N6n2Rvqg82588XtqWD/zEv17Sw2vBntVnzVS/zuszb/INeWXVlCy65
LJf6ZaMU+jBto6f+wizz1xLPmNLy77lF2pIY4cU0u24Wm2plSrvmj2XdL/Ky
NE3/b46pX0x+fDcb2Mj7ksheN7SJrFoJXxN/zxbWlAu6249VWU7ebYwtJzNr
1uk+/mbqbV7u453IIqZhEX9dbz9OS9PS8ZUVXd7S405GI1uuwm9ZNruaPHvw
YPLk+7MTvlvmJDsVQ5bCl2Y/OTe1vZGPXhs6x2VDtOG/XBCTzAvbbHDmtI+N
2Zrmnt40r9emPckc45U3xa6bN9PSNu10Xd3cxw/45P5sZxY2L666uRex+28u
Z9fT2dVUF1o/mu6WK7kxC2u2yovGjCakl/A/ojxxYL6gnbN6+lXV0yJWT7va
NODNrDS32WKTF4Up10a0zdLc2IUhGSq7Fd2mq+mYxlkepB5XmKLayeekABpT
81d2dXVjl/QxccrGNuD7jsmxsetNQf/RA9uNybrS/toZPBfrJJI2rV004IO8
r1uq1Yrul81Jb9Ht6Wq70GXa7a4wuDskXzdJOi9f7rOuyde8mpUlxsYJJfdt
N3lL1xjoVX4I6aes6XY7kmXcjL5Isl0VDX242GR5A201FeJu7XJZmNHoGxKm
tq6W3QL3HI2uaVs3trHzwtB5EC1oM9gqXWVqYkNQfFltbUnrLPbQDTvaNi1O
aUe7J3rm/HyicJ4tSB7KdoI/m5o1l20Nn8Y4u92Y2vhrWNEQSWENmuzWtrTk
ZMfuGdPs540paefDmwQ1Hk6/y37//S/vnp89e/z4+0+fxtl5+vEPDx8/xcd0
AOEO884WLZZNOyayrkhOnfk6MtP1dJz99P7yzN3hwYOHnz4dj3X1jecgnDPR
APKZmR3kp86LbMeiMMERmY/EMWDTsV/zRVHYHfFEdtbRDbJzu1pZM3lhioLY
Nzu6ODt/QU9qK2JZElzQrCGmM3jgoqZTYVaAoauFq0gJ6t8W+2l2ulxabIPE
Yz/G5vbZTV5YSF1mclpBRZ/VfyYOW4IPW2vAXGSE1pvsX6ZPHvyQLQyx1EqO
ZpwZpyNwAPQUemp0ePSgqTAStr6GHmSRiB0Luo7WQtahMDfESZn3PYifOuK0
7Ojs3U9nx9lt1RVLMgcl7Tuj59Tgk4iUeUF+A3HKFtKhK2FxmzdVYVqjAmwh
eYscsgJmJr1Jx0IrpVUQ9Ztuu5NT7vAcsm8lNiZMEJ4AfrVELF1GsRehZqWQ
FVAlLPq8CjIHY118WWVkcNe4sKJfLXOXKi5PGdrslDZPWyCFgnvzMdFmLPgq
60DGlpQcnTgxQbfjowuMiy2TRahz0pgdC5fIz+4OxUmMdnQF+obdgVLpfklY
DfFbY9elPLaGjSrdgedr+oW02ZyYhzcgy1gURFAm7ELPUm5N/lfuuLC3FNIg
WwtL1tAjfu1sDerXZleQ/mG1ywuxzaJr4DvSEkgCLyfn7OyQU9jZHbuGpPot
kahuINhYCwgNqwNnLZvB+SGxUMsN6pG6arJNDuVVkE6ie0e7d6L5+tXk5cXr
cTZ79WJyPjuVO9OH9DP+vKBfWZJEm686pv6SVl/tefG2DAdFcvGCjAQ9YuFl
kS5YdnRue1lJt8Cq4E3tQbKyYZrR0uamvTWk9vq001sHXdLt1iA10RAqj50T
Z4VoWaQRVDsXkKkKLo8qt9ns1c2jYzWFG7viy1Z1tc3e0V6JAXpaKgkUSEed
HTsRIZtGJlTUEwsD35P0Vbcwaqbsb+TmZC+qWxKcWggRtouH4cy8eQ+WVi38
mLkmry2RaUl/oS/gFquqKKpbWje5SORXPCTd5040e523vJYTMh9kT4UzQPMV
WbOC1rOEWiVlSiKJh8eSz6pVlQIxNimARVuCe0Tp6ybpi96aq90QmSE2oQtw
6NPsgoIA0UIknF6Y/CpJ4G+6oiSbARNs+3fMVkV+C2UnRtuEh5MZ/gAGo20/
msKV47XNSHpzZskZKH5CVCj3ve2p1NG96GLW8qzdCnh7NZ8W79Lfic/Oa0NS
T6R6EJIRMcsl2aUPpJryxQeiJF8p2mlLH0GDtYiqnH3MS1jz5yQ35mOOfY5V
3FTH4+GihyjWQ/TSWrYbujSyemUG2yjXHTWGfCGm25Ov0hLHU6LKFsETZDF+
JERZBT6Rd1rJFmIWL4DcZ3YW6uzq0ZPv41V8//WrSGjLN4vOp7BE0juWQz5z
lSHMhcNKT/XEgfplFwGiEeneSm0d3/Ri+ejJk4c/wA0iOs5OJ9jCGHYDzN5z
qPEUupOFNjLlja2rkgNDpz8uq+tjNUXkeOR8i8ASLQXW7MPCXnIIXy72eHBR
Nc3ecYZy8HfT7CqwSHZN6zeTt6tV44S3qShM77Gx+bixc0tcRyoAqk0cUez1
LlrEIs4+UON8/6xBBEOykOVLeCjkiDfCqTB6WJRnVZUeoigUwtnVe2GLf2HK
JuZCg4AVmWlaXxAo0oDiXLHqYzrFK9ZDolsVxGtwyiwRPXydfAPdqTdqpEWE
CkTOUxL42ItmNUsGl9U7PQtBBnkucM8Rl5Itose648CddlVrnORFuolWhjiG
DAGcaFh9OKZtS6JP7tYehKPdkoqGsiCWKLqlaFCIC2i229GD2E9h90HchKVZ
14bdIvcoW0C93fCNYMHIGdToAlo02tlYgzIShGLPrume9oKzxefk8XY+nCGD
nZNF5fU4cphl8BpoG7VsjrU8nDTeGL6Q02bJG150JGgw3pb4pcuLsQacHFOs
iPj94LHq2sLC3H42yGPRj6O82AODtSfL430vT3W4vOVklyNm0hOAR1rna6xY
yXvZirZwrhT5PtUtOwkagIUIpm/HEHtQ6E8SIgdGRBGWGI43VSFQuIn4CFHc
clmDkOJTR3pFgjgcbtXRn81iw5Ye225zIgi7e1D+4hjD3PGCpghdyWG+wTKc
e3NuyJSzbDcSgMB2IWPXZPdev59d3xvLv9mbt/zzuwuK595dnOPn2YvTV6/8
DyO9Yvbi7ftX5+Gn8M2zt69fX7w5ly/Tp1ny0eje69N/3BN+uvf26vry7ZvT
V/fE+Y95AhqcznUOL5B0Avk77IU2Izp1chnmsv8fz67+z/9++JhMyZ8o8Hz0
8OEPnz7pL88ePn1Mv1AkXY6VDUhK5VcEeiPiJcN8SmdPjne+s20ObxG+Jh0/
qWMKM4ia3/4rKPNvJ9k/zRe7h4//WT/AhpMPHc2SD5lmh58cfFmIOPDRwGM8
NZPPe5RO13v6j+R3R/fow3/6C0Qwmzx89pd/HoFHksNYkm0EE9ZbW1ZFtSbX
Ehx1d8zRTjac2Z1E3/n0SewER3ldTabUNKJ2omeRQmyhWikiJVcfLKA5cDL/
PQ8/CXHZzYV+XCLXVJIq4HiLHDs6QTaTzrR5v/ckO6Wzb/bbrUFC9667Z5KY
r0rmRDgQSJphQapbWbTIz7GGolioEPAqGe917i0ouXEuQlhwhDBwGamhUr1o
es5H9rZJBYF5nRMoMXFsp+OsSeorf13iRKMS0hIFe910r6KD5iygf+V8YVND
umZbLUmT14YMtlrhL2ZpLvyX+bEXx5CqLCmt/OFDiZX/3PRDb6fqOUbjONzF
+ndG4qc9KicZgrvJjAN7TQFHYSav6KlIkiLCuChJoTRkCDWTjK/aZpsdiWsE
z5aD0jjUQN6kTFMwZDjIodh6u1HII5pjyWtBSc4NmagbT4gN8lswlbzrsFPs
W3IRdF1TFXRKhg4J2XgKafhApBYTH8XPTpzWnW02PtBOUnW9ECjsiAPNibsr
E0W/Q2ecUnTr6cPbolOZsz9AnhYfEcXi0EKBWBOE58MOq+p6kx6g/7P4UmRy
u4JNc5otdEGpY6eGM1T4l5ZVkOfe8q3VVwpLG+aPEOR25byuPphyKjSJSl8k
K2sYnhDpgDpbrG4ScbteFIWaXH+QJbB6WjG16OC3VR0vbehofII53hSUwB1E
Y5oeXjxIf9ri+cFqI5LsinyPzLaG/VldIZovB9OpZ+E3qPCygeeP4Ggmsp/8
HdFBSwJM33tbsjGL/zwjf438qCv1xLKjt2ezq+OMvtEaLeLRYZETCd2BG7Hg
GkQ8HNIwBShe4GDokGEpPLDzDrkuv2myaZIZydmTDPEeh0qxls8HU8UhmYz1
sVuHPfLOuGYckkK/f9PqXz6Je+d+ldxWTY44Ipqq1dKWONMhq8TeftVzv5Ny
0tJyRtdpAI4SaAcryYvnhctk8R9QAMXHug/VXYEwxyqEtvmA7d97kZPRIMZ6
U92Sa2z4wRlpU1Pfy45evDl/dewV+pIEqkRNjuzD0uJg84XLi7kYYHBxnHyY
iY+cPcVjv5x+YPNYSGYczgWdNMxdujsfSvkYlKNdSUyPQwystYcJeTslR0sk
CKWjPLK8a+xGs6QuZUVmBMQgVt/l+6LKaedRVKYxgkgGhRpEsz0d0swlvo6I
747ZSKTB6VJIjNXbFZeSmLr01TT4lPR7xjaV6Mzxs6YTE9EP1jrOFDn3AZdD
AHo6EnqVn+ITnLqphSV3oYZsTPl7/cRhu99pkQRVi9TVUBBF8ijRlHCv0r1W
81Y2xsoSNRGX4zQHVE/DdNkPXdzttGi04IIG/Ui6t41WpxQM5SmpcEAMjc8f
6nH48FtrRJLGxb1JAdVSoR5kbfVCPitGzcKUCCVDaXFLX15wbMnerJxF0zmf
ACay6mrULZGWp38CVXgVbbUkRR64if12OW1hYnJ7kaFSEsxRboe3cANMBjGi
JgG2JncFW3PjNEt4lDzFsv1lfdGVLF5OVTX5ygCPgRgBWRAwu2cYsxRFc2vL
JcXz/czJf/7H/8RqyQ0ykq3xGePCrgxUqDP06dbpe4jca+Yu9jDpixW0klAj
X8J2HeRjALdBMUfz4T7ZAhZAuoElwgYfBGmZiFC9CntQgK72xUFapMMby3nh
ngdN9JZaKH1DyqL8YI7T+pxFjPjcMV2q9cYuUGHO5JII39EnxHpJFyT3BhJb
iLpZKRE95qRfWS9GLoCKc0/jeuOrfOM85+H8pfO0/TpEVolJ6Be6FjEY8Q4d
Nxd9tcpLGyR9xuu5scQdLsakLZfgFlHbmhDjG//nf/yvxiErEIOQDXXHjLix
XOKUGCYyjtxPhFd+JdicGrqpZnNbLdKWVQsvNDJ7ziLRp5+VfL3hOGatPC5o
iFwxJbcdypbGJaWgAOtKsn0cI1CAKgmx+5oM+9JZjZXzVa5UEJ0Xgb9FKVql
VvAaVZ1EbtzfkQ/eu9yspNSJ85I08XwvWpaMuPPAnMoOPpiN7UizIePZK7kN
6oIDN7wB3w15rv2srm2aDqXKPfm7dJRhS1jxKQPGBF1wdHbawPHIa9IvtLVF
QV+vSX/XHTHMfpq94++fJs/jTOImvzGCXsCyiacswEu06kcPsr3JifM1OHBu
TW8lJntnbipd0itSHljMu1cUa1Yr4l9X5OYnSDKWbyuFCpTxp8R6JEo5G3EK
qkQTRPVXuht77px5jZdPt4A7DrnYodQv7JnqArqP8ApOjPfKx0a0cScEmArF
O60tClcf5YjGqaQ0bS68SEwtgjZoWYHz6atb8Bzu3sjhsgx+yYn1Mhiq+Apc
SOwYa3CWmiE3WvJluRJbFHYQXdk26SasrFWmqDmH5hzNafYjcgLOFVBQR7NA
vCh7hBOZK/biM9HBsGVRR5jzC7SbdYdMhLdwd+twJGDTuJMOicOdc3z5rHcm
v3/jT4mCnVMUt2iDLhepCJIbdmw0Ja7kZDLZRvLAtFLarFTJbek2S04R6m2k
BOg+7Ge4ArDGFg4pCHCiCFWkNjpYQ/iULMg1SULtHca4Ep4U5w7rCSSExY0A
PdZIIFXkA+oyNFB1tRhihAoXKlpPaikrOZacrOCeDir7d9Lp0Jl5dKIwkDtW
7Rv1B2/Jf574gBOmatCYsn/Fjj078CitMsBQIAkOrILSWlyoIc1V2N+w0qPz
Y+hhn7xK45KvkaGMc+8pIELvCgwbsxo7QlGexmMfIk/xJMp4pbkp/TCJIUJG
KiYLPQsbvyP5M5aqppxkYwvGvYqTS1EXlpckEhkwWG1tA6/1tEkT7H/ykWpb
NC61LilQQHrYS/An6tBudTXvHJACrBcZw61dq9EVPIkk5pWI40wekGZok10y
Slu9bQe4GFyqWSw3ZrItPpjtp08eeiIV4NevXl68fvr9sxOA25S88Cp9zlIu
S5/sQ0ZJpE7o++k6P5N9nSoEhAJkVPPrh19cgb/yv3kR38kivnv2WBfx8MGj
x59dBV/6+VXgHn9gGUjBw8s6/IYXBfb+PWDLu9uiEuNSwZ2cMj7gCOYFQBQn
OerZuPGnT8rtzYG4ApkGVH72JicD/DdhO0aU9J/o7wY2VE4+caR58vDRODos
jz1wZAP87FAXQCyDz7HzNQ9GBOyYdn3xd2BK2zq8BEsyiaSZ2JJEdkdnNt+r
QvHWoa1NuW437K4NJO5TOIcGhE7MkUi0ZRdhysZfpWVifZCYBnEdQRJn2a7c
XhPqwFjOjeMH8Qk9OCRmG2bUyJpVgsEpLPsaSOixv8LcFXkwEno7LuN8CpHn
LuQmucYXUr9p1Ptmq0sPpEPEiZXif6N5o2Tfq+e+KAqykTjHQdHHA8hyF3Cy
KfNRhAT8LtqPwBa4rLBz8jZoje89BhEhu/vcgRHVlxPkQABsD1oa87FFRgGr
4my8UA43W9kaer81uzG7xM6xqTi4CzkernVLuRV/+1Ci6k3+AKe48bxIzZPP
OC+EgsTPOYWvWb6oK3KRJDXMgpe6MtOkmclnyld23dUBoxtwmGALzv3REi0Y
Ap4drRSQO7b6iu4VqERjGKcTJzL4CWq7qrsk9HBPQ+t0R+zOR/fcZFqVh4tJ
fg9O2l+iFWwNZmsPdWcAA2OuNPRAfUE5gOlRaxmhR/LSrKvW5oJ78EmEafaW
4Vvga4qAkMtIkG5RwHPwYI5CVR4RqS32HCbrnpcVs8HeeA78WgYkkRl98w0t
jMIwcfTOOE2ArGzFemFQu4oEvXBBuaQ9FXHDcBVVC/3gHVKsuTVIUMNery5Z
s7/BGmxDF08rwJdfuOYXlk8UDb6iC4LaGIvzGc9Jsq95qyab1+6EDQLl5Umi
AM6aePneHLqapNyrCBQEJIQPKxQW7ZpCGD10p6sraIjE4SXPi3wJOkqOA697
ruzQEZ2Gaq5DJ8jBFMkJaz7mYHlOD7NJ67vOA5uPbBVDoXFO3twVFs01jiM4
68mhGDJpO05ndIiLaruTRIDkm5nXkSOCbmsZLUluOTh2kp06AOMJuvE6xPoO
fUnR/cLEZ8bbcUkA5IwYGK99OCRktXUp/aiqDc6b0oPOPCtxE9q3nJUGoNUd
21fSgjmLLuCMLxy//KPdkhm8lvIJd3yi767Njl5fvz8eJwBFOCaOiwcOT/ED
qzpfS+7c6XdPYIEusyTxgbrmKjQQ6SG5b4uEKNpVT8yV+xQBDXCrgt/baPkU
NhXGG8igy5amyPfEC+d3ZPTG8WHdIhciyaSly9PGW/ZMEepVAgyJSk+XK4fJ
c6X0RhRtTP/r9/LcGT83pae6R4Gg42zV1awL+JZd6bMDjjSySQfb/wKhpsJK
r7lfbV59NKkaB2WK5DwHDp1RvTs4KrzcJf2CBW3ZM2DtMzeb/MaiZM2aqNpu
oTBfVx5dy90a22gRuBETihZ6uIjLq/vvz68cLzkA0pZOsHHJbrJREZAUshYl
qyHy3LEWOZhKiX4zVxwT+zKsR0d0wqR5EVW61HeLQJ+BhSO8dp3DgyIV8mjK
HbcCMFCTeYe1OyFdikbBXJLp4769ULXK6Si9YxPdcVBBMCgVCY+vgYQFJeKq
dOwlDjCF4/2vMVdcVmBxcy1kfKt3xKr7d0CmNq00SMmP+VdrOq6rBRpJIS8y
Lcgmyu7/iP60rhSHet3w3qMqQMxAaIfJgYbyqHe5mVp+Nj6wPdrbFtpQcs+V
It4p5D5OV3qMrzTLiXr4fzKd7hEOuvxFC048/R3FKI3TaMzCMybdFYe/0rt9
FvpRl9mNzYFnPskOQn0E+byQCXpjLadPo1g/j2A0koV0TaJRvytWbOvoCHfR
OlwrJj3e1w6aaQTclsqIsCZ0i+sNF/cNOGrBo9r6834NN2g5be1dj+hoI+dj
mv24jzHmYkVoiVoh21hO4vZcpUp8Z5GhqF1I2xY4r3lT0aF3ZQj01CiORme6
29en/xDdyzmIaLcsTg7nsAwPaARhu9jEzs6fm7tYKyI+m4gEjO3QNY+nj6aK
sPmT7zNmv5YcuLBJZ/Tu8kekCaGhyKy9yxUJLcYuEmISLTsN5+j7nLVI2qa8
WzkLsIEVdzubG2029zdAQZZ4ThsU0l3qDj+XmWVW0DIMm9hSWCKs4oAPpBVQ
C6HBQRwikHaPoZ9QlEprfW2LlIbrKEvbX7mw8l5SKRcf2SIV2dXspXwnjgmS
QIDN7kA5ZjTSQ3769BGJts95wS8O9i6oUdzHtwwO1tyS5BhDn3WRdD4TRWuC
fke06OOR4pTutH9ew0Qd5YAgiz0xMQFYPyyqGnWhls9atacLgvnUSFIA9h2P
RGNJ9mRrPzpcA75wdHF2TM+YCOYntKJXPtFnygGshRQixUmPN86LK5UqwpT8
KH0Ms40pN5xM692VzfMm7+dVEUppkobrIDjq12BOCZnPWE985I7Q9yW3wwX8
N5OPEV7jZIlRs6SAGZkXGq0fgldRp13sF4URQTACa/w2e4XVEJmea3f+TLrz
TxSw1T8kxmYu1COWWpRoh8a4CAKufch0qly1AcqAzFLVYKLKDoDWBHbZIG/a
h7glPAWvmNG83MslLeq0jdkiL1yiJQr4sot4JoC26zK9fCExtlVzTkFI8hGt
U6aRgSFSp+QOxklDfzGpA/xtdpnASN6Rcj3JftRsND+Om0UdUm/MYFZ42Xxf
ooZSzykcEJszDKFuy3hoY302Q7VWFec2XGuX1YY+NjtfBImILEUnJgj8CCfH
RVvJ1zU9xIwHY9ca8YHOjOPZgy6uRvBOy9YkJOecqYUVc02TTCBs1zU5RqZd
h0X43gKXe5baf6MIQIXOYIKRIFo8PNOje+EOBc4P7p4gE7Nbk39wPA62Hsd5
WxmoEMHzQv+4LIsePK87ojBx1cJ3GwKMTUSxPmsaSX5ffLF9PkSGu6uzwMF8
vY88NeIW2NSoAhtyTGOlH2/bU3DUV/FRMf1WVCGXvZwGvUPu2HKdJpwzGp06
0K3iydgLiLMeDp3Igi6wTaclUihTD6Dgm376OBvNoqf6JCneJjgiQfIzUMb5
cr5ggsy1Uw5jfdBealNmO+de01tF6Zw2oeU/RW/5NCWzkZBBxotk9FDaojZj
o0V8YXc5JyIiScG6d0ixwzxp28Mgwlkjm7lh6UZw3gaU2kFidAAVhT676lb1
HoNOrHYwuHCoNwOG3dvgQhMB6EpV0urwAawGn8+gXvXNN07aJ+8Ywt7nFtj8
FOTex9hwNgReiMJVfZsCmi09cEYxtOUByhGC23jPS9CAw8hHZNuAeExju4PV
6HSMdBJAD7S9NNJkp3m2RG1Kc0Efq0fbW1XsvXCRxdYBrOewzDE+Mqj3sc8i
0kZr2YX0H2kU5fCR3Hhax9BKN3Am0d1I9QliyNQOsiNqzWvXgKTrSpmsxgMp
2HdEF11RNQw25mLHwuycTUiNuraA3nDCSjk6ktrpH+GNHr6id5mLSbkIKKZM
bWauFam4ch0fCkPquDVI4/vojyfM3clXRcBiHF1/HliiuaoSNQQxpLkAdtLk
Z65zLiLD9ZkWqr0On7Ato3dWPaRABOyV2IcUGjk1rHDuLOACHvKtGwkQb+xE
GpgPISYF+n0mSzhdG0sHF29ZgDFQHC411evTO+i8ikaiHMkqjqfucYjubg3G
E8zzvJxsi2WTU8Cj4DNpGNeVS9qIp91xliDlj4BOmPJ23fSKP7Dfj3Twk6bY
8BL6m/TTMMJx6R1kXCQ24r6rveSyevdFG1o34vKf6umGlUYY/SAdDFFaTEsu
jhYhYH7kUe9aKBWNrbnSozPuZCNP5XiIs7NsdKrNbnBmYrFRzm4kVZbGgjGL
h7OVfiQe6yFjOe7se9NLlRl4ZwxXhHwQdx/YOOf+cvzv/VVZWADRSaXFERk2
jSx4MT6IOkITX8B6HIT5FKc1CiWP4/y4dymVOH9Tn6Nssjo4x87N1U4kTxOH
Sx+NzoaOwQ3F+gzb7n6d+BOcEIEazgq5Ggs8wFTB9ee8KEsdOIkDo6neYWDL
y7PZNw9vHk6fjOX32UwPfRwGh2C8y/Lx42djbSDrO/+Rq+oIE8OIrYCXe5OI
5t1aYa3KJ5+TxUASp1MUQ6NTKALTB9R5bBWFKuOAzFwFJF9P94jARX2DZ246
jk6GOFdPAvd1dWvIB3vpvsUEtmPRg2/HZksbrhQQw1WVhtOhhXbOx+s/QSH2
OdcHUHdlbdKFhgC11DK5i/TARPM2O5lK1sYNkdxnpP1FLCB09Vs36gYPR07D
QTAqlU4sHuprHh8Tk6KHXyo0SxHfZU6h3sq2vfFQHPQ6WkRnpmOhlNXv4GB+
1iDey+fQXLNgKKs2mNVXLQQrwnfQSmKANgccN9+cQewhVxfg7QG67fj9N1NX
E3Rh9Rh/eqcmcMmoCPYaISgcyt1Boed75oErHzn28XIn4m+g+6D1Y/ZA/q/C
0tKt37nsPad9Opks0iE7TrqHbtHbmD5PQu5AmQFVEMrTCN4xEEcGOfXOL0LS
DZqwJsYqhG4saBXnvwKjomnh4a53xnC5eYoOC+QwgWQNtKbMwUco2nEfhZgj
NwGPm+aq0BOZwgMFtSYu3WFDQB/kXy1h1tzD5ibCqDl1yzmnPI50Y8qMMzfK
tYk914HGcmFpb+5VZuLbamGOy8t5tqHAGDNXZTYdYgd3zr2JnjmPaWiqvm+c
ovjxdET6W0GHyFNI+00kEZWeNu8JJu2Ws5OxZ5765U3fMb9bOzgPwVck8eA6
3g3HMAhWfWmVKcOtHp2UaeV7ftGQpIPJpOG0Q0+IB+ez+q6M4AkDIBK5xju6
8ziFE9fF83hEJNJfi02FDioByzHSNQtAlibfmoFwSVRDvmo1VTksM0iMz6EA
QjpXFNSNdlK4+aNRLx5W1LBkrvbxIDWkgpGIELj/JEl+exKTVtyI+Uu8r8N2
vBNNaR6YfpGkIOnEnRx9z+hm9KT3UGpr49LQR7P3z4/p/6q2Hj6YPvrazve8
11jj7/HQ3eNLfozgaJlooftYu4GRa+SV8j6V/PEhhQ0Hf/WoefjtsYCvc18E
O9ryNIG8lfsto+s9TGBu+inGjXbK3eUaHzWPjlVFSRFfxmgPnMfRdswLG2f0
FR3LIu2IJp1ZqnNriU9ubFVIcZKOZ7i716edXHMv2srrIU73kT2DBYSQkTvB
Ldg6gxbq0ndfsysYnBwe8c/Wj6w6/V7r3E837c55L7hJmOr9m4dU85SUJVxH
zgbbG9FrdVVoZgaHenaqeRhuagTGVoRnA8geHwwJ3pIFJI/xRdKdxKS3lc78
kUQ6EwscsdF2Wx3xqFjV3nAa1wvsR/gFCOUdVqXxOdQwStUS+wUvclFV6PJy
nYGiuzI3G8f3lhf7Xg6vBX6Q9LBfC/xI0TCwmnwzRZC59qjICnP6lCR38QGJ
W6R3+RMM65E5JOkcSnbVSkArPPToZzPPrl5eZrQI9bEZAMYIFe+hdaRvC7m1
HxYUkgGLu8kWqq2vT//xdpy9f/v3cfbi9OeXHHHNfrpEzmWsWdaDmQC2iSfX
ElOT60++k2yRPIiIPeXBmlg42FMKL/NHxS6HFM/jsE2gYZpOR79kH9SM3cb9
sj0k82iUQHejaX6eM5EY70VLSSpjw4mMu7qWx70ybtREyQ3AptilOJIYQeDy
6ukTkUaVCWn0oDPgQJbZZYQbuXAg6exICv1Pf3j0mAzEiXod/s8u1+FqmXR4
HsjmfBLt213IY+JlHEBVuPpXxflkqdhHaFxBgIH5irgcycrSJcP0UZwsjpry
PZJSRn0yVTsMAeyfRWr6fQ2sVrTwnE7m1i5JcXWCE0rteggPOCe/8LM8mpN4
xYqS5nHLa4w6BECIU9iy+mr+70QCj2CPoCCxVnbvJkBkS1RugOXcuRnjjU75
9DVmzhSw+qpZDfOwbS2LpnWy4C6yryVr7iGLXbgllf6q3G9RfB0aYZBMM+Hi
tw75BpUuq+tQZPHlTx4Biekzu9Zpwmab1222ge5IquCOj6NjRIhaa2lbWfjZ
s6c/BBZ2HUvuxReCTVtEX3P5DOasQXSOh03dyUBhyIgtZd/JRhs3BroqP68i
mJIuFREpSbV7MiQZIOteDBFNLJD41LEFzxyGRq12exlhyNmZjXT0uHRBpNj9
rGNve3l8ZkQvv1cExHwop9gGVE//dI4iT5SdSPrbJJer/QlFiQ+BjzUHB3BA
d7gllZPvO8O7zDci54XUfKQHSonqoKeXojkSiHnInnhjWBst0aa4hP7SQv+2
yn9thKbdQr2/yk1Cipfq4k72hWSZgsZGbAsFh4q1H6rjNFWamTrUW3FjuWaM
eRM1d6B/Lt0c70vfmWHDnGX4Wike27YcUPAooaAYXXdOW3kW6kehiZ1oyYNZ
4SC0xgb2gASH2SbceOcm+TqsVDSGKnmVlKgMjs1OOTbLLhmnQIJQNwfcyUHc
RIK4iV02A2ZQS9x5ZI3URAU+cR1LbqK0r/BrZVUgQnHEqK8fkVXVuSJwSJOf
h+mMdCP0yLp8gDvqvqTci8j5Sx4Gj9yLNwGIMTkTTYICH2x4OeTuUYRY4ryx
B226lIub08Q2yA2Hk9K+GWiwZ/rIzLiEtb3Lo0o5gGZ5vzE60jmvCwY7hQ5B
6LbUgIhSjKYt53aLQ0zcKo8Eg43+I+5b0tWQIAps6aY+OD/xbCKGedlLSImQ
zvOCWINzmmFv3jN3IjuV1xjBt8Kl77lmr2lXPyXuLBHyS24RBBjRlPHxA2Sw
aA973Xy2x3Ur4N7DDQveokvTAkqhAdD0i8/qrvKWszS0674ivt4EBwQi3dWl
TNGmBSAfc/CaKganh9ddOeiVQ7TQOh1aC4N4G+eyyvHpRpUArat5Yz4kXouj
LbyLGNPD81kwjSN+380BzRRF5MpNiRlffHAHpAQdeElR3DdCyxY1yOBlqcPb
fF1WeOOWH7M8jvBiHe5WrjkSI5OlI8pxW8laurlWh68DEyshL3OptTgkU0Z6
AaYiKB2L9FnHsdR/gXX8XJ9SOQQxdV3DmQxtbM6AAKMiuyQ3V0yuUIl4JyIS
Tt5rF7lJ+JLijDQXdrAHBQ2LBBXRTAY+Qc/SRn2v0KSquUbl7NHokoHEofuU
R8lxFVkiaWy2UbvX6ktwosZn5c1FAaAZJ405aILDPA6Jybh34DavS+mflr5s
7BLeHOnsYist+uWqE2BBLcOp+dUScV4hAlWfXsWadMw7LdjvaPTghNlJybRS
dSur+BBWxizn4H7elZwdsrP7iuvzLKa4LLcFdhxalZRAi5zZPMz+qx1gzdU4
lFYRhjLlAUbmA8xqcAe8dshG4wq14cNnuCpBP+ktUoV90HftxjhPszdVyMY3
6V5935wiDFUAtUYZDk4H1kfxQ9+sSO7Yj5fdIklcmklbTfTHg3eSfcP8GlWG
uZ7qkpBRe7wfoNv0Z8SHtw6t6KMmdNMdvrxo+HV9PCTIyMhzMXLa134jQ3Rk
8m54v8LAC57O38y0YnTXlOHopQyxglt1pciLs5rfZGH0Kt5k6iZychQ/XHJV
XYVbox/Jd1gCus9iyechKInwBgf3yrynoUdGR8EKrIefNf7SjFfo/y2kz78N
g4XNLZi7N2hNKSZumu7xDoJOQP/Ji+vrq1l2dF69OPZtPc8e8+sD3SXwdeiC
a3fB02dPnrn3jfmL+DWBdNVP7qofHj15gKtC3dkTzlVZQzrDdRI42CXGPQtz
OJ9LeC2uuJpkj/7mA2N0af2ab0jHUmECsa9w9bCXQ7Nxv3YI7sFEWjE5n59I
G29iaCpt8IIV25WgOnmUq/gL0RBXbs7AlK2DmbUKLBXTGd7YGCFM4w2mFtuV
O9y0Yf+OMAyywBGl2dLG9Ovw/bMLb1HhaSDOa2gPgJvJi2N678eLpscNW92y
ijKWKSApHuJGC5pd+Ddefvc9y4Jk40JqwJXD2QdQGdRDHsvQFv+2CvG9fBgU
arRxgC7dUzFNWq8X4lfpBVhd/HLN0k99PsK7mAX6FlSA5BWlf9ePQ5L31E50
kFTv+7yD3hQdGUsfv51BcTYRFC9aCYqs9dy2mKAyaTinz44WdGXIeRDN7A6r
+3OT1PixDFV8PAGH9ALbXn37kufYifYM9d5LkXT13PkKUR1WrigicQQa/8pE
BcoObk6JYdN39rCnHb1aViuy/OrVZw+4bsr70kwth+VLIaVjeQYU+vE2Ly9e
Nxorh5whPjxs0Ywrv5vdBzPZ/RpAeNFAIfWVBvI/9MBgnrUOkYwIq1zB3k15
jdfpM5v0M0MJhefChCSriNLEP+AeXnUPhvkVvXBsmdKEjWlK++mTWETx/N17
oao5HPgkUeen9DrXfqkJqLvi+X6vuI8BVc25t7JGeAY0Xd6h08Kbobw5lTK8
WzLSRvCCXZcL+0OMIJHNcI8xaUJTKyrRd0RrZTKkrpHI7++SVR5RMbODb9aa
8t+crDGDctPsEOOLbj9Ekn3djFQ8J+Yo7qyKOjOTuQjxmzTSQXbE//pGHds4
b3gc2edfsGZ5Z48K5QsSCFJ03OHKoyLdC2PlbbVuzPaC065LGcKMY8bImMBJ
AwMi+69tDMGIthAMQMucRXNzt6J3xt1F3thPOSQj28y7yKgdCoOiGhTKtP/B
HQPy3Fyx/28T8KLXjh5Ov0tggbZRz2YlDfoMdQNYb+qG2on6HJplF1Ov6bgI
JzWg/55BdlyEufTpSHmv0n+FPyOObIZY8pCSPYbUBkweMuZ4gNejs3I3ZuBb
mvpA5ZJ7rxKobR9YfD2A+5SiuesIjfW9YpwkCha0FZkTW8rIg4VgBjHiSVPh
eQZ0cIc6cBRr4hD8+0JyPw3Z8Fx9XcgoTISK4BusqhfJFpIZcVF+UZbqVAM3
0UYAM8mZc2tV9F5XrfWNR/08wTh9aW7i+smsCj81xEajFjtuceaSS2jHu7y4
fh6qmb1XAHjYgMOK03NHXlrXnV3KFOjPtnraKPmLtBx7GURoEjv25CYr2zYT
pCpcAS+ppA2+AJL4apQSXulqeaAhGd0Nv51Z4PXMUIrLYLj9ba52jOL4ddn4
bJyN3nmqYjBIZebjKDF+yMT+a71VxhMivgiv83P2w2gI5UpIAtRUDhgXDyCA
cHccLl0NtqhEr+hOHdMwvUJwVtynWppbX360B++yFKQpDxJXlWNk/pL09ZC4
bPVN0S5dqmObgB6qOLfWcAeeBs5DbRH96TcHg6e5+1U8UV4yhiXyQPmIhUfR
9sNL5y1PeplmzyU5LaPudXZe6lHwlG8HgEgxpcOofADODL8fzOn+UTqS2yVM
npslh8gxhuZKSqIM+NPjyY6eX17N4LDOribPHjyYPPn+jPgCJjcX9XOGqy7d
C9CPrs4ujyNbE+bVJjFMVJT2IwSYoNK0wG8HLjpRSH449YDz8VWDuDkIGHlD
HIH9k8FtpDLRlVSx6un3zljBBh+2yaSF/6hx2Ov60UFecRyXrhk5Ju0ZTd8v
E17ybc0WWXU311i/a2Pkf028ky9M6Fl7fXn9Ojt1dHBNvRTPnMqfhETyhuBG
YDmaN1Ivbu8mLvBZKST28FUoh61sE3lFfAA0smV1CSQESq6gNco9IjYqUXKJ
EJ210NQCgfV3G0uorhTYqgT7LmB5jRnmhY5Dc5ALI/hkQplOezCQwsKbkFCS
Dw3KaZfACE4sKTUjwBU8g8vGmMDq3p4Tn11UDBVH2CdMm/CeFy54ScsRxuA2
XtxJ6bJylWmY0QsvQJiQ/z6REZkOzBZe/+uS1Y25c1VpZwXFndUHIwRlTCe3
yRuPrOk1aD2aalw7mSGB+/foxSYnWebGPCXTjkw8XyRBbskrneJ162zAuODW
XwFeMP7yMnvt2vlPsrf1mtyF39LG+8TTgrjgSyz4wUrJWy3SDoQIcuBaR70K
Rg6s/9aPMIjhUIKDQ8MgEhkQsQA2hiImKfU2o99Pym47Ry/M/7i3yovG3ON3
5OXlB1br5yQyP+OhbD279Vpn8+YOd5rR+naS9Wmj5lU1oxURio73bVc2t0TR
zTibLaq2zZ4X3aaGpLzryCN8UXVNYci/e1URKemuJZ0syv3LGqr4RzIcP/ve
YvqOXfBrPGfVhn47pauMpeh2V93QbwVgH+Zl9UFWcL2ptrQBWnfduEXSaQAY
AW/Xl9VkXA6GFvO03tH/Bd7GAqbljgAA

-->

</rfc>
