<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 2.5.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>

<rfc ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-06" category="std" consensus="true" submissionType="IETF" updates="7925" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>

    <date year="2023" month="March" day="13"/>

    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a profile of DTLS 1.3 <xref target="DTLS13"/> and TLS
1.3 <xref target="RFC8446"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>

<t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>

<t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>

<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="credential-types"><name>Credential Types</name>

<t>In accordance with the recommendations in <xref target="RFC7925"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>

<t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>

<t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>

<t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>

<t><list style="symbols">
  <t>Supported Versions,</t>
  <t>Cookie,</t>
  <t>Server Name Indication (SNI),</t>
  <t>Pre-Shared Key,</t>
  <t>PSK Key Exchange Modes, and</t>
  <t>Application-Layer Protocol Negotiation (ALPN).</t>
</list></t>

<t>For use of external pre-shared keys <xref target="RFC9258"/> makes the following
recommendation:</t>

<ul empty="true"><li>
  <t>Applications SHOULD provision separate PSKs for (D)TLS 1.3 and prior versions.</t>
</li></ul>

<t>Where possible, the importer interface defined in <xref target="RFC9258"/> MUST be used
for external PSKs. This ensures that external PSKs used in (D)TLS 1.3
are bound to a specific key derivation function (KDF) and hash function.</t>

<t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC9325"/>.</t>

<t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446"/> MUST be followed.</t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>

</section>
<section anchor="session-resumption"><name>Session Resumption</name>

<t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>

</section>
<section anchor="compression"><name> Compression</name>

<t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>

<t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>

</section>
<section anchor="perfect-forward-secrecy"><name> Perfect Forward Secrecy</name>

<t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>

</section>
<section anchor="keep-alive"><name>Keep-Alive</name>

<t>The discussion in Section 10 of <xref target="RFC7925"/> is applicable.</t>

</section>
<section anchor="timeouts"><name>Timeouts</name>

<t>The recommendation in Section 11 of <xref target="RFC7925"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>

</section>
<section anchor="random-number-generation"><name> Random Number Generation</name>

<t>The discussion in Section 12 of <xref target="RFC7925"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>

</section>
<section anchor="server-name-indication"><name>Server Name Indication</name>

<t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the Encrypted Client Hello
extension <xref target="I-D.ietf-tls-esni"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>

<t>Note: To avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484"/> and DPRIVE <xref target="RFC7858"/> <xref target="RFC8094"/>.
Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
overhead associated with this privacy feature.</t>

</section>
<section anchor="maximum-fragment-length-negotiation"><name> Maximum Fragment Length Negotiation</name>

<t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>

</section>
<section anchor="crypto-agility"><name>Crypto Agility</name>

<t>The recommendations in Section 19 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="key-length-recommendations"><name>Key Length Recommendations</name>

<t>The recommendations in Section 20 of <xref target="RFC7925"/> are applicable.</t>

</section>
<section anchor="rtt-data"><name>0-RTT Data</name>

<t><xref section="E.5" sectionFormat="of" target="TLS13"/> establishes that:</t>

<ul empty="true"><li>
  <t>Application protocols MUST NOT use 0-RTT data without a profile that
defines its use.  That profile needs to identify which messages or
interactions are safe to use with 0-RTT and how to handle the
situation when the server rejects 0-RTT and falls back to 1-RTT.</t>
</li></ul>

<t>At the time of writing, no such profile has been defined for CoAP <xref target="CoAP"/>.
Therefore, 0-RTT MUST NOT be used by CoAP applications.</t>

</section>
<section anchor="certificate-profile"><name>Certificate Profile</name>

<t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925"/>.  The content of Table 1 of <xref target="RFC7925"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>

<section anchor="all-certificates"><name>All Certificates</name>

<section anchor="version"><name>Version</name>

<t>Certificates MUST be of type X.509 v3.</t>

</section>
<section anchor="serial-number"><name>Serial Number</name>

<t>CAs SHALL generate non-sequential certificate serial numbers greater than zero
(0) containing at least 64 bits of output from a CSPRNG (cryptographically
secure pseudo-random number generator).</t>

</section>
<section anchor="signature"><name>Signature</name>

<t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758"/>.</t>

</section>
<section anchor="issuer"><name>Issuer</name>

<t>Contains the DN of the issuing CA.</t>

</section>
<section anchor="validity"><name> Validity</name>

<t>No maximum validity period is mandated.  Validity values are expressed in
notBefore and notAfter fields, as described in Section 4.1.2.5 of <xref target="RFC5280"/>.
In particular, values MUST be expressed in Greenwich Mean Time (Zulu) and MUST
include seconds even where the number of seconds is zero.</t>

<t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive.  This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>

<t>In many cases it is necessary to indicate that a certificate does not expire.
This is likely to be the case for manufacturer-provisioned certificates.
RFC 5280 provides a simple solution to convey the fact that a certificate
has no well-defined expiration date by setting the notAfter to the
GeneralizedTime value of 99991231235959Z.</t>

<t>Some devices might not have a reliable source of time and for those devices it
is also advisable to use certificates with no expiration date and to let a
device management solution manage the lifetime of all the certificates used by
the device. While this approach does not utilize certificates to its widest extent,
it is a solution that extends the capabilities offered by a raw public key approach.</t>

</section>
<section anchor="subjectpublickeyinfo"><name> subjectPublicKeyInfo</name>

<t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key.  This profile uses the id-ecPublicKey
algorithm  identifier for ECDSA signature keys, as defined and specified in
<xref target="RFC5480"/>.</t>

</section>
</section>
<section anchor="root-ca-certificate"><name>Root CA Certificate</name>

<t><list style="symbols">
  <t>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field SHOULD NOT be present.</t>
  <t>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</t>
  <t>extendedKeyUsage MUST NOT be present.</t>
</list></t>

</section>
<section anchor="subordinate-ca-certificate"><name>Subordinate CA Certificate</name>

<t><list style="symbols">
  <t>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field MAY be present.</t>
  <t>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</t>
  <t>extendedKeyUsage MUST NOT be present.</t>
</list></t>

</section>
<section anchor="end-entity-certificate"><name>End Entity Certificate</name>

<t><list style="symbols">
  <t>extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</t>
  <t>keyUsage MAY be present and contain one of digitalSignature or
keyAgreement.</t>
  <t>Domain names MUST NOT be encoded in the subject commonName, instead they
MUST be encoded in a subjectAltName of type DNS-ID.  Domain names MUST NOT
contain wildcard (<spanx style="verb">*</spanx>) characters.  subjectAltName MUST NOT contain multiple
names.</t>
</list></t>

<section anchor="client-certificate-subject"><name>Client Certificate Subject</name>

<t>The requirement in Section 4.4.2 of <xref target="RFC7925"/> to only use EUI-64 for client
certificates is lifted.</t>

<t>If the EUI-64 format is used to identify the subject of a client certificate,
it MUST be encoded in a subjectAltName of type DNS-ID as a string of the form
<spanx style="verb">HH-HH-HH-HH-HH-HH-HH-HH</spanx> where 'H' is one of the symbols '0'-'9' or 'A'-'F'.</t>

</section>
</section>
</section>
<section anchor="certificate-revocation-checks"><name>Certificate Revocation Checks</name>

<t>The considerations in Section 4.4.3 of <xref target="RFC7925"/> hold.</t>

<t>Since the publication of
RFC 7925 the need for firmware update mechanisms has been reinforced and the work
on standardizing a secure and interoperable firmware update mechanism has made
substantial progress, see <xref target="RFC9019"/>. RFC 7925 recommends to use
a software / firmware update mechanism to provision devices with new trust anchors.</t>

<t>The use of device management protocols for IoT devices, which often include an onboarding
or bootstrapping mechanism, has also seen considerable uptake in deployed devices and
these protocols, some of which are standardized, allow provision of certificates on a
regular basis. This enables a deployment model where IoT device utilize end-entity
certificates with shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant.</t>

<t>Hence, instead of performing certificate revocation checks on the IoT device itself this
specification recommends to delegate this task to the IoT device operator and to take the
necessary action to allow IoT devices to remain operational.</t>

</section>
<section anchor="certificate-overhead"><name>Certificate Overhead</name>

<t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no subordinate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>

<t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Here is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange:</t>

<t><list style="symbols">
  <t>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size.</t>
  <t>Avoid deep and complex CA hierarchies to reduce the number of subordinate CA
certificates that need to be transmitted.</t>
  <t>Pay attention to the amount of information conveyed inside certificates.</t>
  <t>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="DTLS-CID"/>, when possible, to enable
long-lasting connections.</t>
  <t>Use the TLS cached info <xref target="RFC7924"/> extension to avoid sending certificates
with every full handshake.</t>
  <t>Use client certificate URLs <xref target="RFC6066"/> instead of full certificates for
clients.</t>
  <t>Use certificate compression as defined in
<xref target="I-D.ietf-tls-certificate-compression"/>.</t>
  <t>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
</list></t>

<t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls"/>,
is a form of caching or compressing certificates as well.</t>

<t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>

</section>
<section anchor="ciphersuites"><name>Ciphersuites</name>

<t>Section 4.5.3 of <xref target="DTLS13"/> flags AES-CCM with 8-octet authentication tags
(CCM_8) as unsuitable for general use with DTLS.  In fact, due to its low
integrity limits (i.e., a high sensitivity to forgeries), endpoints that
negotiate ciphersuites based on such AEAD are susceptible to a trivial DoS.
(See also Section 5.3 and 5.4 of <xref target="I-D.irtf-cfrg-aead-limits"/> for further
discussion on this topic, as well as references to the analysis supporting
these conclusions.)</t>

<t>Specifically, <xref target="DTLS13"/> warns that:</t>

<ul empty="true"><li>
  <t>"TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
safeguards against forgery. Implementations MUST set usage limits for
AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
protections that are used."</t>
</li></ul>

<t>Since all the ciphersuites mandated by <xref target="RFC7925"/> and <xref target="CoAP"/> are based on
CCM_8, there is no stand-by ciphersuite to use for applications that want to
avoid the security and availability risks associated with CCM_8 while retaining
interoperability with the rest of the ecosystem.</t>

<t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>

<t><list style="symbols">
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</t>
  <t>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</t>
</list></t>

<t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
Section 4.5.3 of <xref target="DTLS13"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>

<t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
Section 6.2.1 of <xref target="RFC9325"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in Section 4.4
of <xref target="RFC9325"/> also apply.</t>

</section>
<section anchor="fault-attacks-on-deterministic-signature-schemes"><name>Fault Attacks on Deterministic Signature Schemes</name>

<t>A number of passive side-channel attacks as well as active fault-injection
attacks (e.g., <xref target="Ambrose2017"/>) have been demonstrated that allow a malicious
third party to gain information about the signing key if a fully deterministic
signature scheme (e.g., <xref target="RFC6979"/> ECDSA or EdDSA <xref target="RFC8032"/>) is used.</t>

<t>Most of these attacks assume physical access to the device and are therefore
especially relevant to smart cards as well as IoT deployments with poor or
non-existent physical security.</t>

<t>In this security model, it is recommended to combine both randomness and
determinism, for example, as described in
<xref target="I-D.mattsson-cfrg-det-sigs-with-noise"/>.</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document is about security.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document makes no requests to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='DTLS13'>
<front>
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='N. Modadugu' initials='N.' surname='Modadugu'><organization/></author>
<date month='April' year='2022'/>
<abstract><t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t><t>This document obsoletes RFC 6347.</t></abstract>
</front>
<seriesInfo name='RFC' value='9147'/>
<seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>



<reference anchor='TLS13'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC7925'>
<front>
<title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='T. Fossati' initials='T.' surname='Fossati'><organization/></author>
<date month='July' year='2016'/>
<abstract><t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t><t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t></abstract>
</front>
<seriesInfo name='RFC' value='7925'/>
<seriesInfo name='DOI' value='10.17487/RFC7925'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC9258'>
<front>
<title>Importing External Pre-Shared Keys (PSKs) for TLS 1.3</title>
<author fullname='D. Benjamin' initials='D.' surname='Benjamin'><organization/></author>
<author fullname='C. A. Wood' initials='C. A.' surname='Wood'><organization/></author>
<date month='July' year='2022'/>
<abstract><t>This document describes an interface for importing external Pre-Shared Keys (PSKs) into TLS 1.3.</t></abstract>
</front>
<seriesInfo name='RFC' value='9258'/>
<seriesInfo name='DOI' value='10.17487/RFC9258'/>
</reference>



<reference anchor='RFC8449'>
<front>
<title>Record Size Limit Extension for TLS</title>
<author fullname='M. Thomson' initials='M.' surname='Thomson'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t><t>This replaces the maximum fragment length extension defined in RFC 6066.</t></abstract>
</front>
<seriesInfo name='RFC' value='8449'/>
<seriesInfo name='DOI' value='10.17487/RFC8449'/>
</reference>



<reference anchor='RFC5758'>
<front>
<title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
<author fullname='Q. Dang' initials='Q.' surname='Dang'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='K. Moriarty' initials='K.' surname='Moriarty'><organization/></author>
<author fullname='D. Brown' initials='D.' surname='Brown'><organization/></author>
<author fullname='T. Polk' initials='T.' surname='Polk'><organization/></author>
<date month='January' year='2010'/>
<abstract><t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm.  This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs).  This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5758'/>
<seriesInfo name='DOI' value='10.17487/RFC5758'/>
</reference>



<reference anchor='RFC5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5480'>
<front>
<title>Elliptic Curve Cryptography Subject Public Key Information</title>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<author fullname='D. Brown' initials='D.' surname='Brown'><organization/></author>
<author fullname='K. Yiu' initials='K.' surname='Yiu'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='T. Polk' initials='T.' surname='Polk'><organization/></author>
<date month='March' year='2009'/>
<abstract><t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography.  This document updates Sections 2.3.5 and 5, and the ASN.1 module of &quot;Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile&quot;, RFC 3279.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5480'/>
<seriesInfo name='DOI' value='10.17487/RFC5480'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='DTLS-CID'>
<front>
<title>Connection Identifier for DTLS 1.2</title>
<author fullname='E. Rescorla' initials='E.' role='editor' surname='Rescorla'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='T. Fossati' initials='T.' surname='Fossati'><organization/></author>
<author fullname='A. Kraus' initials='A.' surname='Kraus'><organization/></author>
<date month='March' year='2022'/>
<abstract><t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t><t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In &quot;classical&quot; DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t><t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t><t>This document updates RFC 6347.</t></abstract>
</front>
<seriesInfo name='RFC' value='9146'/>
<seriesInfo name='DOI' value='10.17487/RFC9146'/>
</reference>



<reference anchor='CoAP'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>


<reference anchor="Ambrose2017" target="https://eprint.iacr.org/2017/975.pdf">
  <front>
    <title>Differential Attacks on Deterministic Signatures</title>
    <author initials="C." surname="Ambrose" fullname="Christopher Ambrose">
      <organization></organization>
    </author>
    <author initials="J. W." surname="Bos" fullname="Joppe W. Bos">
      <organization></organization>
    </author>
    <author initials="B." surname="Fay" fullname="Björn Fay">
      <organization></organization>
    </author>
    <author initials="M." surname="Joye" fullname="Marc Joye">
      <organization></organization>
    </author>
    <author initials="M." surname="Lochter" fullname="Manfred Lochter">
      <organization></organization>
    </author>
    <author initials="B." surname="Murray" fullname="Bruce Murray">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>




<reference anchor='RFC9325'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author fullname='Y. Sheffer' initials='Y.' surname='Sheffer'><organization/></author>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<author fullname='T. Fossati' initials='T.' surname='Fossati'><organization/></author>
<date month='November' year='2022'/>
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols.  Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t><t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='9325'/>
<seriesInfo name='DOI' value='10.17487/RFC9325'/>
</reference>


<reference anchor='I-D.ietf-tls-ctls'>
   <front>
      <title>Compact TLS 1.3</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>Mozilla</organization>
      </author>
      <author fullname='Richard Barnes' initials='R.' surname='Barnes'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Benjamin M. Schwartz' initials='B. M.' surname='Schwartz'>
         <organization>Google</organization>
      </author>
      <date day='3' month='January' year='2023'/>
      <abstract>
	 <t>   This document specifies a &quot;compact&quot; version of TLS and DTLS.  It is
   logically isomorphic to ordinary TLS, but saves space by trimming
   obsolete material, tighter encoding, a template-based specialization
   technique, and alternative cryptographic techniques. cTLS is not
   directly interoperable with TLS or DTLS, but it should eventually be
   possible for a single server port to offer cTLS alongside TLS or
   DTLS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-ctls-07'/>
   
</reference>


<reference anchor='I-D.ietf-tls-esni'>
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>RTFM, Inc.</organization>
      </author>
      <author fullname='Kazuho Oku' initials='K.' surname='Oku'>
         <organization>Fastly</organization>
      </author>
      <author fullname='Nick Sullivan' initials='N.' surname='Sullivan'>
         <organization>Cloudflare</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='3' month='October' year='2022'/>
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-15'/>
   
</reference>



<reference anchor='RFC8484'>
<front>
<title>DNS Queries over HTTPS (DoH)</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='P. McManus' initials='P.' surname='McManus'><organization/></author>
<date month='October' year='2018'/>
<abstract><t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t></abstract>
</front>
<seriesInfo name='RFC' value='8484'/>
<seriesInfo name='DOI' value='10.17487/RFC8484'/>
</reference>



<reference anchor='RFC7858'>
<front>
<title>Specification for DNS over Transport Layer Security (TLS)</title>
<author fullname='Z. Hu' initials='Z.' surname='Hu'><organization/></author>
<author fullname='L. Zhu' initials='L.' surname='Zhu'><organization/></author>
<author fullname='J. Heidemann' initials='J.' surname='Heidemann'><organization/></author>
<author fullname='A. Mankin' initials='A.' surname='Mankin'><organization/></author>
<author fullname='D. Wessels' initials='D.' surname='Wessels'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='May' year='2016'/>
<abstract><t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t><t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t></abstract>
</front>
<seriesInfo name='RFC' value='7858'/>
<seriesInfo name='DOI' value='10.17487/RFC7858'/>
</reference>



<reference anchor='RFC8094'>
<front>
<title>DNS over Datagram Transport Layer Security (DTLS)</title>
<author fullname='T. Reddy' initials='T.' surname='Reddy'><organization/></author>
<author fullname='D. Wing' initials='D.' surname='Wing'><organization/></author>
<author fullname='P. Patil' initials='P.' surname='Patil'><organization/></author>
<date month='February' year='2017'/>
<abstract><t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t><t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t></abstract>
</front>
<seriesInfo name='RFC' value='8094'/>
<seriesInfo name='DOI' value='10.17487/RFC8094'/>
</reference>


<reference anchor='I-D.irtf-cfrg-hpke'>
   <front>
      <title>Hybrid Public Key Encryption</title>
      <author fullname='Richard Barnes' initials='R.' surname='Barnes'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Karthikeyan Bhargavan' initials='K.' surname='Bhargavan'>
         <organization>Inria</organization>
      </author>
      <author fullname='Benjamin Lipp' initials='B.' surname='Lipp'>
         <organization>Inria</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='2' month='September' year='2021'/>
      <abstract>
	 <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-cfrg-hpke-12'/>
   
</reference>



<reference anchor='RFC9019'>
<front>
<title>A Firmware Update Architecture for Internet of Things</title>
<author fullname='B. Moran' initials='B.' surname='Moran'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='D. Brown' initials='D.' surname='Brown'><organization/></author>
<author fullname='M. Meriac' initials='M.' surname='Meriac'><organization/></author>
<date month='April' year='2021'/>
<abstract><t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t><t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t></abstract>
</front>
<seriesInfo name='RFC' value='9019'/>
<seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>



<reference anchor='RFC7924'>
<front>
<title>Transport Layer Security (TLS) Cached Information Extension</title>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='July' year='2016'/>
<abstract><t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs).  This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t><t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t></abstract>
</front>
<seriesInfo name='RFC' value='7924'/>
<seriesInfo name='DOI' value='10.17487/RFC7924'/>
</reference>



<reference anchor='RFC6066'>
<front>
<title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='January' year='2011'/>
<abstract><t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, &quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;.  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6066'/>
<seriesInfo name='DOI' value='10.17487/RFC6066'/>
</reference>


<reference anchor='I-D.ietf-tls-certificate-compression'>
   <front>
      <title>TLS Certificate Compression</title>
      <author fullname='Alessandro Ghedini' initials='A.' surname='Ghedini'>
         <organization>Cloudflare, Inc.</organization>
      </author>
      <author fullname='Victor Vasiliev' initials='V.' surname='Vasiliev'>
         <organization>Google</organization>
      </author>
      <date day='6' month='January' year='2020'/>
      <abstract>
	 <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.

 This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-certificate-compression-10'/>
   
</reference>



<reference anchor='RFC7250'>
<front>
<title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author fullname='P. Wouters' initials='P.' role='editor' surname='Wouters'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='J. Gilmore' initials='J.' surname='Gilmore'><organization/></author>
<author fullname='S. Weiler' initials='S.' surname='Weiler'><organization/></author>
<author fullname='T. Kivinen' initials='T.' surname='Kivinen'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).  The new certificate type allows raw public keys to be used for authentication.</t></abstract>
</front>
<seriesInfo name='RFC' value='7250'/>
<seriesInfo name='DOI' value='10.17487/RFC7250'/>
</reference>


<reference anchor='I-D.ietf-cose-cbor-encoded-cert'>
   <front>
      <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
      <author fullname='John Preuß Mattsson' initials='J. P.' surname='Mattsson'>
         <organization>Ericsson AB</organization>
      </author>
      <author fullname='Göran Selander' initials='G.' surname='Selander'>
         <organization>Ericsson AB</organization>
      </author>
      <author fullname='Shahid Raza' initials='S.' surname='Raza'>
         <organization>RISE AB</organization>
      </author>
      <author fullname='Joel Höglund' initials='J.' surname='Höglund'>
         <organization>RISE AB</organization>
      </author>
      <author fullname='Martin Furuhed' initials='M.' surname='Furuhed'>
         <organization>Nexus Group</organization>
      </author>
      <date day='10' month='January' year='2023'/>
      <abstract>
	 <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly (&quot;natively signed&quot;), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-cose-cbor-encoded-cert-05'/>
   
</reference>


<reference anchor='I-D.irtf-cfrg-aead-limits'>
   <front>
      <title>Usage Limits on AEAD Algorithms</title>
      <author fullname='Felix Günther' initials='F.' surname='Günther'>
         <organization>ETH Zurich</organization>
      </author>
      <author fullname='Martin Thomson' initials='M.' surname='Thomson'>
         <organization>Mozilla</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Cloudflare</organization>
      </author>
      <date day='30' month='January' year='2023'/>
      <abstract>
	 <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-cfrg-aead-limits-06'/>
   
</reference>



<reference anchor='RFC6979'>
<front>
<title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
<author fullname='T. Pornin' initials='T.' surname='Pornin'><organization/></author>
<date month='August' year='2013'/>
<abstract><t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t></abstract>
</front>
<seriesInfo name='RFC' value='6979'/>
<seriesInfo name='DOI' value='10.17487/RFC6979'/>
</reference>



<reference anchor='RFC8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>


<reference anchor='I-D.mattsson-cfrg-det-sigs-with-noise'>
   <front>
      <title>Deterministic ECDSA and EdDSA Signatures with Additional Randomness</title>
      <author fullname='John Preuß Mattsson' initials='J. P.' surname='Mattsson'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Erik Thormarker' initials='E.' surname='Thormarker'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Sini Ruohomaa' initials='S.' surname='Ruohomaa'>
         <organization>Ericsson</organization>
      </author>
      <date day='15' month='February' year='2022'/>
      <abstract>
	 <t>   Deterministic elliptic-curve signatures such as deterministic ECDSA
   and EdDSA have gained popularity over randomized ECDSA as their
   security do not depend on a source of high-quality randomness.
   Recent research has however found that implementations of these
   signature algorithms may be vulnerable to certain side-channel and
   fault injection attacks due to their determinism.  One countermeasure
   to such attacks is to re-add randomness to the otherwise
   deterministic calculation of the per-message secret number.  This
   document updates RFC 6979 and RFC 8032 to recommend constructions
   with additional randomness for deployments where side-channel attacks
   and fault injection attacks are a concern.  The updates are invisible
   to the validator of the signature and compatible with existing ECDSA
   and EdDSA validators.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-mattsson-cfrg-det-sigs-with-noise-04'/>
   
</reference>




    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Ben Kaduk and John Mattsson.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

