<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>


<rfc ipr="noDerivativesTrust200902" docName="draft-josefsson-cfrg-mothma-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Mothma">Mothma: Generic Instantiated PQ/T Hybrid Signatures</title>

    <author fullname="Simon Josefsson">
      <organization></organization>
      <address>
        <email>simon@josefsson.org</email>
      </address>
    </author>

    <date year="2025" month="October" day="20"/>

    <area>IRTF</area>
    <workgroup>CFRG</workgroup>
    <keyword>mothma</keyword> <keyword>PQ/T hybrid</keyword> <keyword>post quantum</keyword> <keyword>hybrid</keyword> <keyword>signature</keyword> <keyword>Ed25519</keyword> <keyword>Ed448</keyword> <keyword>EdDSA</keyword> <keyword>RSA</keyword> <keyword>ECDSA</keyword> <keyword>ML-DSA</keyword> <keyword>SLH-DSA</keyword> <keyword>XMSS</keyword> <keyword>LMS</keyword>

    <abstract>


<t>This document specify Mothma as a generic family of instantiated
Post-Quantum/Traditional (PQ/T) Hybrid Digital Signatures.  The goal
is to provide a generic hybrid signature pattern that can be analysed
separately for security assurance, and to offer concrete instantiated
algorithms for integration into protocol and implementations.
Identified instances are provided based on combinations of the
traditional EdDSA, ECDSA and RSA methods with the post-quantum methods
of ML-DSA, SLH-DSA, XMSS and LMS.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-josefsson-cfrg-mothma/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum Research Group (CFRG) Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/jas/ietf-cfrg-mothma"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>To hedge against attacks on a traditional digital signature methods
such as Ed25519 <xref target="RFC8032"/> or a post-quantum digital signature method
such as SLH-DSA <xref target="NIST.FIPS.205"/>, it is possible to combine both
algorithms to define a combined method as a joint signature method.
Using the terminology of <xref target="RFC9794"/>, this combination forms a PQ/T
Hybrid Digital Signature.</t>

<t>Mothma is a generic pattern to create a PQ/T Hybrid Digital Signature
methods based on at least one post-quantum algorithm and at least one
traditional algorithm.  The idea is that Mothma can be analyzed
generally and some assurance can be had that it behaves well.  For
ease of presentation, this document combine one traditional algorithm
with one post-quantum algorithm.</t>

<t>While a naive approach would be to integrate a generic Mothma combiner
into protocols and have the protocol and implementation negotiate
parameters, that leads to complexity detrimental to security.
Therefor this document describe specific instances of Mothma applied
on selected algorithms.</t>

<t>Mothma is based on the hybrid signature scheme suggested in
<xref target="DJB-HYBRID-SIGNATURE"></xref>.</t>

<t>We initially suggest Mothma as combinations of traditional EdDSA,
ECDSA and RSA methods with the post-quantum methods of ML-DSA,
SLH-DSA, XMSS and LMS.  Other combinations may be added following the
same generic pattern, and may be proposed for addition to this
document.</t>

</section>
<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="mothma"><name>Mothma</name>

<t>Mothma is defined as follows:</t>

<figure><artwork><![CDATA[
The signed message is (s2,s1,r,h,m) where

   m = the message being signed,
   r = H(fresh randomness chosen during signing),
   h = H(r,H(hybridpk),hybridsigname,appname,appcontext,m),
   s1 = traditional signature of (r,h),
   s2 = post-quantum signature of (s1,r,h),
   H = SHA3-256.
]]></artwork></figure>

<t>The hash function SHA3-256 is defined in <xref target="NIST.FIPS.202"></xref>.</t>

<t>Using H(hybridpk) instead of hybridpk makes clear that H(hybridpk) can
be saved alongside hybridpk, guaranteeing that the key is hashed only
once when it's generated or received.</t>

<t>Here the fresh randomness <bcp14>MUST</bcp14> be 16 bytes, and only to be used for
one signature.</t>

<t>The 'hybridsigname' value is specified by each instantiated variant,
whereas the 'appname' and 'appcontext' will come from the application
using Mothma.  These are 0-255 octet long strings, and when text
values are put into these fields the encoding is ASCII <xref target="RFC0020"></xref>.</t>

<t>The signed message (s2,s1,r,h,m) is the concatenation of its values.</t>

<t>The signature <bcp14>SHOULD NOT</bcp14> be detached from its corresponding message
'm' because this leads to fragile implementation, although we
recognize that Mothma variants <bcp14>MAY</bcp14> be integrated into existing legacy
protocols this way.</t>

<t>Verification is done by confirming that the value of 'h' and invoking
the verify functions for the traditional and post-quantum system using
the received values as follows, and taking the logical AND of their
verification outputs.</t>

<figure><artwork><![CDATA[
   Signed message is (s2,s1,r,h,m)
   h' = H(r,H(hybridpk),hybridsigname,appname,appcontext,m),
   v1 = Ed25519 verification of s1 on message (r,h),
   v2 = ML-DSA-65 verification of s2 on message (s1,r,h),
   verify = h == h' && v1 && v2
]]></artwork></figure>

</section>
<section anchor="naming"><name>Naming</name>

<t>Protocols wishing to utilize PQ/T Hybrid Signatures described in this
document <bcp14>MUST</bcp14> refer to one of the derived instantiated algorithm
identifiers and <bcp14>MUST NOT</bcp14> adopt a generic facility where the individual
algorithms are parameters.</t>

<t>The convention for identifiers is "Mothma-TSIG-PQSIG" replacing "TSIG"
and "PQSIG" with a brief mnemonic identifying the traditional and
post-quantum algorithm respectively.</t>

</section>
<section anchor="eddsa"><name>EdDSA</name>

<t>EdDSA <xref target="RFC8032"></xref> is a digital signature system, with variants Ed25519
and Ed448.  This protocol always uses the 'pure' version of EdDSA.</t>

<t>The Ed448 'context' input <bcp14>MUST</bcp14> be the Mothma name, e.g.,
"Mothma-Ed25519-ML-DSA-65".</t>

</section>
<section anchor="ecdsa"><name>ECDSA</name>

<t>ECDSA <xref target="NIST.FIPS.186"></xref> is a digital signature system, with variants for
the P256, P384 and P521 curves, and the Brainpool curves <xref target="RFC5639"></xref>
brainpoolP256r1, brainpoolP384r1, and brainpoolP512r1.  This protocol
always uses the 'pure' version of ECDSA.</t>

</section>
<section anchor="rsa"><name>RSA</name>

<t>RSA <xref target="RFC8017"></xref> is a digital signature system, with two variants
RSASSA-PSS and RSASSA-PKCS1-v1_5.  This document do not define any
Mothma RSA variants, pending a decision on how to map its arbitrary
public key and signature output sizes into Mothma's fixed-size
approach, and pending interest from anyone who desire to use RSA for
PQ/T hybrid signatures.</t>

</section>
<section anchor="ml-dsa"><name>ML-DSA</name>

<t>CRYSTALS-Dilithium <xref target="PQ-CRYSTALS"></xref> is a post-quantum digital signature
system, standardized in <xref target="NIST.FIPS.204"></xref> as Module-Lattice-Based
Digital Signature Standard (ML-DSA).</t>

<t>This protocol always uses the 'pure' version of ML-DSA (where ML-DSA
signs the message), and not the 'prehashed' variant (where ML-DSA
signs a previously hashed message).  ML-DSA may be used in
deterministic or hedged mode.</t>

<t>The ML-DSA 'context' input <bcp14>MUST</bcp14> be the Mothma name, e.g.,
"Mothma-Ed25519-ML-DSA-65".</t>

</section>
<section anchor="slh-dsa"><name>SLH-DSA</name>

<t>Sphincs+ <xref target="SPHINCS"></xref> is a stateless hash-based digital signature system,
standardized in <xref target="NIST.FIPS.205"></xref> as Stateless Hash-Based Digital
Signature Algorithm (SLH-DSA).</t>

<t>The SLH-DSA 'context' input <bcp14>MUST</bcp14> be the Mothma name, e.g.,
"Mothma-Ed25519-ML-DSA-65".</t>

</section>
<section anchor="xmss-lms"><name>XMSS &amp; LMS</name>

<t>XMSS <xref target="RFC8391"></xref> and LMS <xref target="RFC8554"></xref> are stateful hash-based digital
signature systems, discussed in <xref target="NIST.SP.800-208"></xref> as Recommendation
for Stateful Hash-Based Signature Schemes.</t>

</section>
<section anchor="mothma-variants"><name>Mothma variants</name>

<section anchor="mothma-ed25519-ml-dsa-65"><name>Mothma-Ed25519-ML-DSA-65</name>

<t>The 'hybridsigname' field is "Mothma-Ed25519-ML-DSA-65".</t>

<t>The ML-DSA-65 signature 's2' is 3309 octets, the Ed25519 signature
's1' is 64 octets, 'r' is 16 octets, 'h' is 32 octets, therefor the
signature size is 3421 octets plus the message itself.</t>

</section>
<section anchor="mothma-ed25519-slh-dsa-shake-128s-mothma-ed25519-slh-dsa-shake-128f-mothma-ed448-slh-dsa-shake-256s-mothma-ed448-slh-dsa-shake-256f"><name>Mothma-Ed25519-SLH-DSA-SHAKE-128S, Mothma-Ed25519-SLH-DSA-SHAKE-128F, Mothma-Ed448-SLH-DSA-SHAKE-256S, Mothma-Ed448-SLH-DSA-SHAKE-256F</name>

<t>The following table describe the mapping from Mothma name to the EdDSA
and SLH-DSA variant used.</t>

<texttable title="Mothma EdDSA/SLH-DSA mappings" anchor="mothma-eddsa-slh-dsa-mapping">
      <ttcol align='left'>Mothma variant</ttcol>
      <ttcol align='left'>EdDSA variant</ttcol>
      <ttcol align='left'>SLH-DSA variant</ttcol>
      <c>Mothma-Ed25519-SLH-DSA-SHAKE-128S</c>
      <c>Ed25519</c>
      <c>SLH-DSA-SHAKE-128S</c>
      <c>Mothma-Ed25519-SLH-DSA-SHAKE-128F</c>
      <c>Ed25519</c>
      <c>SLH-DSA-SHAKE-128F</c>
      <c>Mothma-Ed448-SLH-DSA-SHAKE-256S</c>
      <c>Ed448</c>
      <c>SLH-DSA-SHAKE-256S</c>
      <c>Mothma-Ed448-SLH-DSA-SHAKE-256F</c>
      <c>Ed448</c>
      <c>SLH-DSA-SHAKE-256F</c>
</texttable>

<t>The 'hybridsigname' field to use is as follows.</t>

<texttable title="Value for hybridsigname" anchor="mothma-eddsa-slh-dsa-hybridsigname">
      <ttcol align='left'>Mothma variant</ttcol>
      <ttcol align='left'>hybridsigname</ttcol>
      <c>Mothma-Ed25519-SLH-DSA-SHAKE-128S</c>
      <c>"Mothma-Ed25519-SLH-DSA-SHAKE-128S"</c>
      <c>Mothma-Ed25519-SLH-DSA-SHAKE-256F</c>
      <c>"Mothma-Ed25519-SLH-DSA-SHAKE-128F"</c>
      <c>Mothma-Ed448-SLH-DSA-SHAKE-256S</c>
      <c>"Mothma-Ed448-SLH-DSA-SHAKE-256S"</c>
      <c>Mothma-Ed448-SLH-DSA-SHAKE-256F</c>
      <c>"Mothma-Ed448-SLH-DSA-SHAKE-256F"</c>
</texttable>

</section>
<section anchor="mothma-ecdsa-p256-ml-dsa-44-mothma-ecdsa-p384-ml-dsa-65-mothma-ecdsa-p521-ml-dsa-87"><name>Mothma-ECDSA-P256-ML-DSA-44, Mothma-ECDSA-P384-ML-DSA-65, Mothma-ECDSA-P521-ML-DSA-87</name>

</section>
<section anchor="mothma-ecdsa-brainpoolp256r1-ml-dsa-44-mothma-ecdsa-brainpoolp384r1-ml-dsa-65-mothma-ecdsa-brainpoolp521-ml-dsa-87"><name>Mothma-ECDSA-brainpoolP256r1-ML-DSA-44, Mothma-ECDSA-brainpoolP384r1-ML-DSA-65, Mothma-ECDSA-brainpoolP521-ML-DSA-87</name>

</section>
<section anchor="mothma-ed25519-xmss-sha210256-mothma-ed448-xmss-sha220256"><name>Mothma-Ed25519-XMSS-SHA2_10_256, Mothma-Ed448-XMSS-SHA2_20_256</name>

</section>
<section anchor="mothma-ed25519-lmssha256m32h5-mothma-ed448-lmssha256m32h25"><name>Mothma-Ed25519-LMS_SHA256_M32_H5, Mothma-Ed448-LMS_SHA256_M32_H25</name>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The method was suggested by <contact fullname="Daniel J. Bernstein"/>.  This document
re-use ideas and some text from <xref target="CHEMPAT"/>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of all references apply.</t>

<t>The intention is that Mothma hybrid signatures should be secure if
at least one of the traditional and post-quantum algorithms is secure.</t>

<t>Cryptographic algorithms and parameters are usually broken or weakened
over time.  Implementers and users need to continously re-evaluate
that cryptographic algorithms continue to provide the expected level
of security.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC0020' target='https://www.rfc-editor.org/info/rfc20'>
  <front>
    <title>ASCII format for network interchange</title>
    <author fullname='V.G. Cerf' initials='V.G.' surname='Cerf'/>
    <date month='October' year='1969'/>
  </front>
  <seriesInfo name='STD' value='80'/>
  <seriesInfo name='RFC' value='20'/>
  <seriesInfo name='DOI' value='10.17487/RFC0020'/>
</reference>

<reference anchor='RFC5639' target='https://www.rfc-editor.org/info/rfc5639'>
  <front>
    <title>Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation</title>
    <author fullname='M. Lochter' initials='M.' surname='Lochter'/>
    <author fullname='J. Merkle' initials='J.' surname='Merkle'/>
    <date month='March' year='2010'/>
    <abstract>
      <t>This memo proposes several elliptic curve domain parameters over finite prime fields for use in cryptographic applications. The domain parameters are consistent with the relevant international standards, and can be used in X.509 certificates and certificate revocation lists (CRLs), for Internet Key Exchange (IKE), Transport Layer Security (TLS), XML signatures, and all applications or protocols based on the cryptographic message syntax (CMS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5639'/>
  <seriesInfo name='DOI' value='10.17487/RFC5639'/>
</reference>

<reference anchor='RFC8017' target='https://www.rfc-editor.org/info/rfc8017'>
  <front>
    <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
    <author fullname='K. Moriarty' initials='K.' role='editor' surname='Moriarty'/>
    <author fullname='B. Kaliski' initials='B.' surname='Kaliski'/>
    <author fullname='J. Jonsson' initials='J.' surname='Jonsson'/>
    <author fullname='A. Rusch' initials='A.' surname='Rusch'/>
    <date month='November' year='2016'/>
    <abstract>
      <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
      <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
      <t>This document also obsoletes RFC 3447.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8017'/>
  <seriesInfo name='DOI' value='10.17487/RFC8017'/>
</reference>

<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8032'/>
  <seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>

<reference anchor='RFC8391' target='https://www.rfc-editor.org/info/rfc8391'>
  <front>
    <title>XMSS: eXtended Merkle Signature Scheme</title>
    <author fullname='A. Huelsing' initials='A.' surname='Huelsing'/>
    <author fullname='D. Butin' initials='D.' surname='Butin'/>
    <author fullname='S. Gazdag' initials='S.' surname='Gazdag'/>
    <author fullname='J. Rijneveld' initials='J.' surname='Rijneveld'/>
    <author fullname='A. Mohaisen' initials='A.' surname='Mohaisen'/>
    <date month='May' year='2018'/>
    <abstract>
      <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8391'/>
  <seriesInfo name='DOI' value='10.17487/RFC8391'/>
</reference>

<reference anchor='RFC8554' target='https://www.rfc-editor.org/info/rfc8554'>
  <front>
    <title>Leighton-Micali Hash-Based Signatures</title>
    <author fullname='D. McGrew' initials='D.' surname='McGrew'/>
    <author fullname='M. Curcio' initials='M.' surname='Curcio'/>
    <author fullname='S. Fluhrer' initials='S.' surname='Fluhrer'/>
    <date month='April' year='2019'/>
    <abstract>
      <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
      <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8554'/>
  <seriesInfo name='DOI' value='10.17487/RFC8554'/>
</reference>

<reference anchor='NIST.FIPS.186' target='https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/fipspub186.pdf'>
  <front>
    <title>Federal Information Processing Standards Publication: digital signature standard (DSS)</title>
    <author>
      <organization abbrev='NIST'>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date year='1994'/>
  </front>
  <seriesInfo name='NIST Federal Information Processing Standards Publications' value='186'/>
  <seriesInfo name='DOI' value='10.6028/NIST.FIPS.186'/>
</reference>

<reference anchor='NIST.FIPS.202' target='http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf'>
  <front>
    <title>SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions</title>
    <author fullname='Morris J. Dworkin' initials='M.' surname='Dworkin'>
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname='Morris J. Dworkin' surname='Dworkin'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author>
      <organization abbrev='NIST'>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date month='August' year='2015'/>
  </front>
  <seriesInfo name='FIPS' value='PUB 202'/>
  <seriesInfo name='NIST Federal Information Processing Standards Publications' value='202'/>
  <seriesInfo name='DOI' value='10.6028/nist.fips.202'/>
  <seriesInfo name='DOI' value='10.6028/NIST.FIPS.202'/>
</reference>

<reference anchor='NIST.FIPS.204'> <front> <title>*** BROKEN REFERENCE ***</title> <author> <organization/> </author> <date/> </front> </reference>
<reference anchor='NIST.FIPS.205'> <front> <title>*** BROKEN REFERENCE ***</title> <author> <organization/> </author> <date/> </front> </reference>
<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='NIST.SP.800-208' target='https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf'>
  <front>
    <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
    <author fullname='David A. Cooper' surname='Cooper'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author fullname='Daniel C. Apon' surname='Apon'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author fullname='Quynh H. Dang' surname='Dang'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author fullname='Michael S. Davidson' surname='Davidson'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author fullname='Morris J. Dworkin' surname='Dworkin'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author fullname='Carl A. Miller' surname='Miller'>
      <organization>Information Technology Laboratory</organization>
    </author>
    <author>
      <organization abbrev='NIST'>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date day='29' month='October' year='2020'/>
    <abstract>
      <t>This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the Leighton-Micali Signature (LMS) system and the eXtended Merkle Signature Scheme (XMSS), along with their multi-tree variants, the Hierarchical Signature System (HSS) and multi-tree XMSS (XMSSMT).</t>
    </abstract>
  </front>
  <seriesInfo name='NIST Special Publications (General)' value='800-208'/>
  <seriesInfo name='DOI' value='10.6028/NIST.SP.800-208'/>
</reference>

<reference anchor='RFC9794' target='https://www.rfc-editor.org/info/rfc9794'>
  <front>
    <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
    <author fullname='F. Driscoll' initials='F.' surname='Driscoll'/>
    <author fullname='M. Parsons' initials='M.' surname='Parsons'/>
    <author fullname='B. Hale' initials='B.' surname='Hale'/>
    <date month='June' year='2025'/>
    <abstract>
      <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9794'/>
  <seriesInfo name='DOI' value='10.17487/RFC9794'/>
</reference>


<reference anchor='CHEMPAT' target='https://datatracker.ietf.org/doc/html/draft-josefsson-chempat-03'>
   <front>
      <title>Chempat: Generic Instantiated PQ/T Hybrid Key Encapsulation Mechanisms</title>
      <author fullname='Simon Josefsson' initials='S.' surname='Josefsson'>
         </author>
      <date day='18' month='March' year='2025'/>
      <abstract>
	 <t>   This document specify Chempat as a generic family of instantiated
   Post-Quantum/Traditional (PQ/T) Hybrid Key Exchange Methods (KEMs).
   The goal is to provide a generic combiner construct that can be
   analysed separately for security assurance, and to offer concrete
   instantiated algorithms for integration into protocol and
   implementations.  Identified instances are provided based on some
   combinations of traditional Diffie-Hellman key agreement using curves
   P-256, P-384, X25519, X448, brainpoolP256, brainpoolP384 and
   brainpoolP512 combined with post quantum methods ML-KEM-768, ML-KEM-
   1024, Streamlined NTRU Prime sntrup761, Classic McEliece and
   FrodoKEM.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-josefsson-chempat-03'/>
   
</reference>


<reference anchor="DJB-HYBRID-SIGNATURE" target="https://mailarchive.ietf.org/arch/msg/cfrg/LdvasJBpseekZtQkQF1nuPPDH_s/">
  <front>
    <title>How to construct a hybrid signature combiner?</title>
    <author fullname="D.J. Bernstein">
      <organization></organization>
    </author>
    <date year="2024" month="March"/>
  </front>
</reference>
<reference anchor="PQ-CRYSTALS" target="https://pq-crystals.org/">
  <front>
    <title>Cryptographic Suite for Algebraic Lattices (CRYSTALS)</title>
    <author >
      <organization>CRYSTALS Team</organization>
    </author>
    <date year="2017" month="December"/>
  </front>
</reference>
<reference anchor="SPHINCS" target="https://sphincs.org/">
  <front>
    <title>SPHINCS+</title>
    <author >
      <organization>SPHINCS+ Team</organization>
    </author>
    <date year="2017" month="November"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

