<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-05" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-05"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Arm Limited</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="06"/>
    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/thomas-fossati/draft-tls13-iot"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a profile of DTLS 1.3 <xref target="DTLS13"/> and TLS
1.3 <xref target="RFC8446"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>
      <t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>
      <t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>
      <section anchor="conventions-and-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="credential-types">
      <name>Credential Types</name>
      <t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>
      <t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>
      <t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>
      <t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>
      <ul spacing="compact">
        <li>Supported Versions,</li>
        <li>Cookie,</li>
        <li>Server Name Indication (SNI),</li>
        <li>Pre-Shared Key,</li>
        <li>PSK Key Exchange Modes, and</li>
        <li>Application-Layer Protocol Negotiation (ALPN).</li>
      </ul>
      <t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC7525bis"/>.</t>
      <t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>
    </section>
    <section anchor="session-resumption">
      <name>Session Resumption</name>
      <t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>
    </section>
    <section anchor="compression">
      <name> Compression</name>
      <t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>
      <t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>
    </section>
    <section anchor="perfect-forward-secrecy">
      <name> Perfect Forward Secrecy</name>
      <t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>
    </section>
    <section anchor="keep-alive">
      <name>Keep-Alive</name>
      <t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>
    </section>
    <section anchor="timeouts">
      <name>Timeouts</name>
      <t>The recommendation in Section 11 of <xref target="RFC7925"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>
    </section>
    <section anchor="random-number-generation">
      <name> Random Number Generation</name>
      <t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>
    </section>
    <section anchor="server-name-indication">
      <name>Server Name Indication</name>
      <t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the Encrypted Client Hello
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>
      <t>Note: To avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
amount of overhead associated with this privacy property.</t>
    </section>
    <section anchor="maximum-fragment-length-negotiation">
      <name> Maximum Fragment Length Negotiation</name>
      <t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>
    </section>
    <section anchor="crypto-agility">
      <name>Crypto Agility</name>
      <t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="key-length-recommendations">
      <name>Key Length Recommendations</name>
      <t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>
    </section>
    <section anchor="rtt-data">
      <name>0-RTT Data</name>
      <t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>
      <ul empty="true">
        <li>
          <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
        </li>
      </ul>
      <t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore 0-RTT MUST NOT be used by CoAP applications.</t>
    </section>
    <section anchor="certificate-profile">
      <name>Certificate Profile</name>
      <t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>.  The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>
      <section anchor="all-certificates">
        <name>All Certificates</name>
        <section anchor="version">
          <name>Version</name>
          <t>Certificates MUST be of type X.509 v3.</t>
        </section>
        <section anchor="serial-number">
          <name>Serial Number</name>
          <t>CAs SHALL generate non-sequential Certificate serial numbers greater than zero
(0) containing at least 64 bits of output from a CSPRNG (cryptographically
secure pseudo-random number generator).</t>
        </section>
        <section anchor="signature">
          <name>Signature</name>
          <t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>
        </section>
        <section anchor="issuer">
          <name>Issuer</name>
          <t>Contains the DN of the issuing CA.</t>
        </section>
        <section anchor="validity">
          <name> Validity</name>
          <t>No maximum validity period is mandated.  Validity values are expressed in
notBefore and notAfter fields, as described in Section 4.1.2.5 of <xref target="RFC5280"/>.
In particular, values MUST be expressed in Greenwich Mean Time (Zulu) and MUST
include seconds even where the number of seconds is zero.</t>
          <t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive.  This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>
          <t>In many cases it is necessary to indicate that a certificate does not expire.
This is likely to be the case for manufacturer-provisioned certificates.
RFC 5280 provides a simple solution to convey the fact that a certificate
has no well-defined expiration date by setting the notAfter to the
GeneralizedTime value of 99991231235959Z.</t>
          <t>Some devices might not have a reliable source of time and for those devices it
is also advisable to use certificates with no expiration date and to let a
device management solution manage the lifetime of all the certificates used by
the device. While this approach does not utilize certificates to its widest extent,
it is a solution that extends the capabilities offered by a raw public key approach.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name> subjectPublicKeyInfo</name>
          <t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key.  This  profile uses the id-ecPublicKey
algorithm  identifier for ECDSA signature keys, as   defined and specified in
<xref target="RFC5480"/>.</t>
        </section>
      </section>
      <section anchor="root-ca-certificate">
        <name>Root CA Certificate</name>
        <ul spacing="compact">
          <li>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field SHOULD NOT be present.</li>
          <li>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</li>
          <li>extendedKeyUsage MUST NOT be present.</li>
        </ul>
      </section>
      <section anchor="subordinate-ca-certificate">
        <name>Subordinate CA Certificate</name>
        <ul spacing="compact">
          <li>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field MAY be present.</li>
          <li>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</li>
          <li>extendedKeyUsage MUST NOT be present.</li>
        </ul>
      </section>
      <section anchor="end-entity-certificate">
        <name>End Entity Certificate</name>
        <ul spacing="compact">
          <li>extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</li>
          <li>keyUsage MAY be present and contain one of digitalSignature or
keyAgreement.</li>
          <li>Domain names MUST NOT be encoded in the subject commonName, instead they
MUST be encoded in a subjectAltName of type DNS-ID.  Domain names MUST NOT
contain wildcard (<tt>*</tt>) characters.  subjectAltName MUST NOT contain multiple
names.</li>
        </ul>
        <section anchor="client-certificate-subject">
          <name>Client Certificate Subject</name>
          <t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for client
certificates is lifted.</t>
          <t>If the EUI-64 format is used to identify the subject of a client certificate,
it MUST be encoded in a subjectAltName of type DNS-ID as a string of the form
<tt>HH-HH-HH-HH-HH-HH-HH-HH</tt> where 'H' is one of the symbols '0'-'9' or 'A'-'F'.</t>
        </section>
      </section>
    </section>
    <section anchor="certificate-revocation-checks">
      <name>Certificate Revocation Checks</name>
      <t>The considerations in Section 4.4.3 of <xref target="RFC7925"/> hold.</t>
      <t>Since the publication of
RFC 7925 the need for firmware update mechanisms has been reinforced and the work
on standardizing a secure and interoperable firmware update mechanism has made
substantial progress, see <xref target="I-D.ietf-suit-architecture"/>. RFC 7925 recommends to use
a software / firmware update mechanism to provision devices with new trust anchors.</t>
      <t>The use of device management protocols for IoT devices, which often include an onboarding
or bootstrapping mechanism, has also seen considerable uptake in deployed devices and
these protocols, some of which are standardized, allow provision of certificates on a
regular basis. This enables a deployment model where IoT device utilize end-entity
certificates with shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant.</t>
      <t>Hence, instead of performing certificate revocation checks on the IoT device itself this
specification recommends to delegate this task to the IoT device operator and to take the
necessary action to allow IoT devices to remain operational.</t>
    </section>
    <section anchor="certificate-overhead">
      <name>Certificate Overhead</name>
      <t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>
      <t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Here is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange:</t>
      <ul spacing="compact">
        <li>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size.</li>
        <li>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted.</li>
        <li>Pay attention to the amount of information conveyed inside certificates.</li>
        <li>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="DTLS-CID"/>, when possible, to enable
long-lasting connections.</li>
        <li>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</li>
        <li>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients.</li>
        <li>Use certificate compression as defined in
<xref target="I-D.ietf-tls-certificate-compression"/>.</li>
        <li>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
      </ul>
      <t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>
      <t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>
    </section>
    <section anchor="ciphersuites">
      <name>Ciphersuites</name>
      <t>Section 4.5.3 of <xref target="DTLS13"/> flags AES-CCM with 8-octet authentication tags
(CCM_8) as unsuitable for general use with DTLS.  In fact, due to its low
integrity limits (i.e., a high sensitivity to forgeries), endpoints that
negotiate ciphersuites based on such AEAD are susceptible to a trivial DoS.
(See also Section 5.3 and 5.4 of <xref target="I-D.irtf-cfrg-aead-limits"/> for further
discussion on this topic, as well as references to the analysis supporting
these conclusions.)</t>
      <t>Specifically, <xref target="DTLS13"/> warns that:</t>
      <ul empty="true">
        <li>
          <t>"TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
safeguards against forgery. Implementations MUST set usage limits for
AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
protections that are used."</t>
        </li>
      </ul>
      <t>Since all the ciphersuites mandated by <xref target="RFC7925"/> and <xref target="CoAP"/> are based on
CCM_8, there is no stand-by ciphersuite to use for applications that want to
avoid the security and availability risks associated with CCM_8 while retaining
interoperability with the rest of the ecosystem.</t>
      <t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>
      <ul spacing="compact">
        <li>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</li>
        <li>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</li>
      </ul>
      <t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
Section 4.5.3 of <xref target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>
      <t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
Section 6.2.1 of <xref target="RFC7525bis"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in Section 4.4
of <xref target="RFC7525bis"/> also apply.</t>
    </section>
    <section anchor="fault-attacks-on-deterministic-signature-schemes">
      <name>Fault Attacks on Deterministic Signature Schemes</name>
      <t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated that allow a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>
      <t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>
      <t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.mattsson-cfrg-det-sigs-with-noise"/>.</t>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DTLS13">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre">
              <organization>independent</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>arm</organization>
            </author>
            <date day="30" month="June" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are used to protect data exchanged over a wide range of
   application protocols, and can also form the basis for secure
   transport protocols.  Over the years, the industry has witnessed
   several serious attacks on TLS and DTLS, including attacks on the
   most commonly used cipher suites and their modes of operation.  This
   document provides the latest recommendations for ensuring the
   security of deployed services that use TLS and DTLS.  These
   recommendations are applicable to the majority of use cases.

   An earlier version of this document was published as RFC 7525 when
   the industry was in the midst of its transition to TLS 1.2.  Years
   later this transition is largely complete and TLS 1.3 is widely
   available.  This document updates the guidance given the new
   environment and obsoletes RFC 7525.  In addition, the document
   updates RFC 5288 and RFC 6066 in view of recent attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-09"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC5758">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
            <author fullname="Q. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="D. Brown" initials="D." surname="Brown">
              <organization/>
            </author>
            <author fullname="T. Polk" initials="T." surname="Polk">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm.  This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs).  This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5758"/>
          <seriesInfo name="DOI" value="10.17487/RFC5758"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="D. Brown" initials="D." surname="Brown">
              <organization/>
            </author>
            <author fullname="K. Yiu" initials="K." surname="Yiu">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Polk" initials="T." surname="Polk">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography.  This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DTLS-CID">
          <front>
            <title>Connection Identifier for DTLS 1.2</title>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <author fullname="A. Kraus" initials="A." surname="Kraus">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
              <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
              <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
              <t>This document updates RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9146"/>
          <seriesInfo name="DOI" value="10.17487/RFC9146"/>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
              <organization/>
            </author>
            <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay" fullname="Björn Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye" fullname="Marc Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter" fullname="Manfred Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray" fullname="Bruce Murray">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3.  It is
   isomorphic to TLS 1.3 but saves space by trimming obsolete material,
   tighter encoding, a template-based specialization technique, and
   alternative cryptographic techniques. cTLS is not directly
   interoperable with TLS 1.3, but it should eventually be possible for
   a cTLS/TLS 1.3 server to exist and successfully interoperate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="13" month="February" year="2022"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-14"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="P. Patil" initials="P." surname="Patil">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard L. Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthik Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
        </reference>
        <reference anchor="I-D.ietf-suit-architecture">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="Brendan Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="David Brown">
              <organization>Linaro</organization>
            </author>
            <author fullname="Milosch Meriac">
              <organization>Consultant</organization>
            </author>
            <date day="27" month="January" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.

 In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-architecture-16"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs).  This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="I-D.ietf-tls-certificate-compression">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="Alessandro Ghedini">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author fullname="Victor Vasiliev">
              <organization>Google</organization>
            </author>
            <date day="6" month="January" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.

 This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-certificate-compression-10"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore">
              <organization/>
            </author>
            <author fullname="S. Weiler" initials="S." surname="Weiler">
              <organization/>
            </author>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).  The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-04"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin">
              <organization/>
            </author>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="I-D.mattsson-cfrg-det-sigs-with-noise">
          <front>
            <title>Deterministic ECDSA and EdDSA Signatures with Additional Randomness</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Thormarker">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Sini Ruohomaa">
              <organization>Ericsson</organization>
            </author>
            <date day="15" month="February" year="2022"/>
            <abstract>
              <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security do not depend on a source of high-quality randomness.
   Recent research has however found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their determinism.  One countermeasure
   to such attacks is to re-add randomness to the otherwise
   deterministic calculation of the per-message secret number.  This
   document updates RFC 6979 and RFC 8032 to recommend constructions
   with additional randomness for deployments where side-channel attacks
   and fault injection attacks are a concern.  The updates are invisible
   to the validator of the signature and compatible with existing ECDSA
   and EdDSA validators.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mattsson-cfrg-det-sigs-with-noise-04"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Ben Kaduk and John Mattsson.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
