<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>


<rfc ipr="noDerivativesTrust200902" docName="draft-josefsson-ssh-ed25519mldsa65-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ed25519MLDSA65 for SSH">Hybrid Ed25519 with ML-DSA-65 for Secure Shell (SSH)</title>

    <author fullname="Simon Josefsson">
      <organization></organization>
      <address>
        <email>simon@josefsson.org</email>
      </address>
    </author>

    <date year="2025" month="October" day="17"/>

    <area>IETF</area>
    <workgroup>Secure Shell Maintenance</workgroup>
    <keyword>Ed25519</keyword> <keyword>EdDSA</keyword> <keyword>ML-DSA</keyword> <keyword>post quantum</keyword> <keyword>pq</keyword> <keyword>signature</keyword> <keyword>ssh</keyword> <keyword>secsh</keyword>

    <abstract>


<t>This document describes the use of Ed25519 with ML-DSA-65 as a hybrid
digital signature in the Secure Shell (SSH) protocol.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-josefsson-ssh-ed25519mldsa65/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SSHM Working Group mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/jas/ietf-ssh-ed25519mldsa65"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Secure Shell (SSH) <xref target="RFC4251"></xref> is a secure remote-login protocol. It
provides for an extensible variety of public key algorithms for
identifying servers and users to one another.</t>

<t>Ed25519 <xref target="RFC8032"></xref> is a digital signature system.</t>

<t>CRYSTALS-Kyber is a post-quantum digital signature system,
standardized in <xref target="NIST.FIPS.204"></xref> as Module-Lattice-Based Digital
Signature Standard (ML-DSA).</t>

<t>This document specify how Ed25519 and ML-DSA-65 may be used in SSH,
using the hybrid signature scheme suggested in <xref target="DJB-HYBRID-SIGNATURE"></xref>.</t>

</section>
<section anchor="conventions-used-in-this-document"><name>Conventions Used In This Document</name>

<t>The descriptions of key and signature formats use the notation
introduced in <xref target="RFC4251"></xref>, Section 3, and the string data type from
<xref target="RFC4251"></xref>, Section 5.  Identifiers and terminology from <xref target="RFC8032"></xref> and
<xref target="NIST.FIPS.204"></xref> are used throughout the document.</t>

</section>
<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="public-key-algorithm"><name>Public Key Algorithm</name>

<t>This document describes a public key algorithm for use with SSH, as
per <xref target="RFC4253"></xref>, Section 6.6.  The name of the algorithm is
"ssh-ed25519-ml-dsa-65".  This algorithm only supports signing and not
encryption.</t>

<t>Standard implementations of SSH <bcp14>SHOULD</bcp14> implement this signature
algorithm.</t>

</section>
<section anchor="public-key-format"><name>Public Key Format</name>

<t>The "ssh-ed25519-ml-dsa-65" key format has the following encoding:</t>

<figure><artwork><![CDATA[
string "ssh-ed25519-ml-dsa-65"

string key
]]></artwork></figure>

<t>The content of 'key' is the concatenation of the Ed25519 32-octet
public key described in <xref target="RFC8032"></xref>, Section 5.1.5, with the 1952-octet
public key described in <xref target="NIST.FIPS.204"></xref>, for the ML-DSA-65 algorithm.
The resulting key length is therefor 1984.</t>

</section>
<section anchor="signature-algorithm"><name>Signature Algorithm</name>

<t>Signatures are generated according to the following procedure, based
on <xref target="DJB-HYBRID-SIGNATURE"></xref>.</t>

<figure><artwork><![CDATA[
The signed message is (s2,s1,r,h,m) where

   m = the message being signed,
   r = H(fresh randomness chosen during signing),
   h = H(r,H(hybridpk),hybridsigname,appname,appcontext,m),
   s1 = Ed25519 signature of (r,h),
   s2 = ML-DSA-65 signature of (s1,r,h),
   H = SHA3-256.
]]></artwork></figure>

<t>The 'hybridpk' value is the public key from the previous section.
Here the fresh randomness <bcp14>MUST</bcp14> be 16 bytes, and only to be used for
the signature.  The 'hybridsigname' field is "Ed25519MLDSA65", and
'appname' is 'SSH' with 'appcontext' being 'SSH-Ed25519MLDSA65".
Strings are encoded using ASCII <xref target="RFC0020"></xref>.</t>

<t>The signed message (s2,s1,r,h,m) is the concatenation of each value.
The ML-DSA-65 signature 's2' is 4000 octets, the Ed25519 signature
's1' is 64 octets, 'r' is 16 octets, 'h' is 32 octets, therefor the
signature size is 4112 octets plus the message itself.</t>

</section>
<section anchor="signature-format"><name>Signature Format</name>

<t>The "ssh-ed25519-ml-dsa-65" key format has the following encoding:</t>

<figure><artwork><![CDATA[
string "ssh-ed25519-ml-dsa-65"

string signature
]]></artwork></figure>

<t>The 'signature' value is the signed message produced in accordance
with the previous section.</t>

</section>
<section anchor="verification-algorithm"><name>Verification Algorithm</name>

<t>Verification is the string comparison between the received signature
and a locally computed signature using locally generated inputs and
the received randomness value 'r'.</t>

</section>
<section anchor="sshfp-dns-resource-records"><name>SSHFP DNS Resource Records</name>

<t>Usage and generation of the SSHFP DNS resource record is described in
<xref target="RFC4255"></xref>. This section illustrates the generation of SSHFP resource
records for Ed25519MLDSA65 keys, and this document also specifies the
corresponding code point to "SSHFP RR Types for public key algorithms"
in the "DNS SSHFP Resource Record Parameters" IANA registry
<xref target="IANA-SSHFP"></xref>.</t>

<t>The encoding of Ed25519MLDSA65 public keys is described in earlier
sections.</t>

<t>The SSHFP Resource Record for the Ed25519MLDSA65 public key with
SHA-256 fingerprint <xref target="NIST.FIPS.180"></xref> would, for example, be:</t>

<figure><artwork><![CDATA[
ssh.example.com IN SSHFP TBD1 2 ( a87f1b687ac0e57d2a081a2f2826723
                                  34d90ed316d2b818ca9580ea384d924
                                  01 )
]]></artwork></figure>

<t>Replace TBD1 with the value eventually allocated by IANA.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"></xref>,
Section 4.11.3.</t>

<t>IANA is requested to add the following entry to "Public Key Algorithm
Names" in the "Secure Shell (SSH) Protocol Parameters" registry
<xref target="IANA-SSH"></xref>:</t>

<texttable title="SSH Public Key Code Points" anchor="iana-ssh-table">
      <ttcol align='left'>Public Key Algorithm Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>ssh-ed25519-ml-dsa-65</c>
      <c>THIS-RFC</c>
</texttable>

<t>IANA is requested to add the following entry to "SSHFP RR Types for
public key algorithms" in the "DNS SSHFP Resource Record Parameters"
registry <xref target="IANA-SSHFP"></xref>:</t>

<texttable title="SSH DNS SSHFP RR Public Key Algorithm Types" anchor="iana-sshfp-table">
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD1</c>
      <c>SSH-ED25519-ML-DSA-65</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations in <xref target="RFC4251"></xref>, Section 9 apply to all SSH
implementations, including those using Ed25519MLDSA65.</t>

<t>The security considerations in <xref target="RFC8032"></xref> and <xref target="NIST.FIPS.204"></xref> apply to
all uses of Ed25519 and ML-DSA-65, respectively, including those in
SSH.</t>

<t>Ed25519MLDSA65 signatures are intended to be secure if SHA3-256 is
secure and at least one of Ed25519 or ML-DSA-65 is secure.</t>

<t>Cryptographic algorithms and parameters are usually broken or weakened
over time.  Implementers and users need to continously re-evaluate
that cryptographic algorithms continue to provide the expected level
of security.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The text of <xref target="RFC8709"></xref> was used as a template for this document.</t>

</section>
<section anchor="test-vectors"><name>Test vectors</name>

<t>The following illustrate test vectors using file formats used by, for
example, OpenSSH.</t>

<section anchor="private-key"><name>Private Key</name>

<t>Private key:</t>

<figure><artwork><![CDATA[
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAYwAAABtzc2gtc2xoLWRz
YS1zaGEyLTI1NmYAAABAPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJYTDYEYdQpwty9
IJfwQDvK778DQCr9dx1gWb1HYDwYMAAAAQAS6f2dEun9nQAAABtzc2gtc2xoLWRzYS1zaGEyLTI1
NmYAAABAPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJYTDYEYdQpwty9IJfwQDvK778D
QCr9dx1gWb1HYDwYMAAAAIBlB//OALih6/bAIOUGOGuaSKuK86IySusLX5xiqsPmJmE32DHKfIgg
mmvckaPbwnliYgL0mV/aAetfELu7XoqHPS6Ma/U7TKh4/I8HoTobiV+1sQnpkHZL7oztSTxgWoJY
TDYEYdQpwty9IJfwQDvK778DQCr9dx1gWb1HYDwYMAAAAAhqYXNAa2FrYQECAwQF
-----END OPENSSH PRIVATE KEY-----
]]></artwork></figure>

</section>
<section anchor="public-key"><name>Public-Key</name>

<t>Public key:</t>

<figure><artwork><![CDATA[
ssh-ed25519-ml-dsa-65 AAAAG3NzaC1zcGhpbmNzcGx1c0BvcGVuc3NoLmNvbQAAAEA9Loxr9TtMqHj8jwehOhuJX7WxCemQdkvujO1JPGBaglhMNgRh1CnC3L0gl/BAO8rvvwNAKv13HWBZvUdgPBgw jas@kaka
]]></artwork></figure>

</section>
<section anchor="message"><name>Message</name>

<t>The namespace context string used is "my-namespace", and the message
is (including final newline):</t>

<figure><artwork><![CDATA[
Hello world!
]]></artwork></figure>

</section>
<section anchor="signature"><name>Signature</name>

<t>Signature:</t>

<figure><artwork><![CDATA[
-----BEGIN SSH SIGNATURE-----
U1NIU0lHAAAAAQAAAGMAAAAbc3NoLXNwaGluY3NwbHVzQG9wZW5zc2guY29tAAAAQD0ujG
v1O0yoePyPB6E6G4lftbEJ6ZB2S+6M7Uk8YFqCWEw2BGHUKcLcvSCX8EA7yu+/A0Aq/Xcd
YFm9R2A8GDAAAAAMbXktbmFtZXNwYWNlAAAAAAAAAAZzaGE1MTIAAHSDAAAAG3NzaC1zcG
hpbmNzcGx1c0BvcGVuc3NoLmNvbQAAdGCZtK1w9NaIGAV9HcHArlgyCGRb/a+f8/EDt1bL
BHVvMQiGVR4guZ1g20dasKIxJznf8YqoYQeSXEktX7ukD+Go+icRJoTQj7n0RaKjaWz/aM
P1iKeNN1hhfyOMP9nCzUKSBOlcBe1IDnHTMZDuX7wUVTu4WTcd4WrTb5Qos+fxY2cBUM9p
QeUPm2WpwkqVjpd8e4bG5ku2q4Q3jCHsambOH5VqZI+khzQ5w3M+b1wMXfWVwEd8O7t++U
-----END SSH SIGNATURE-----
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC0020' target='https://www.rfc-editor.org/info/rfc20'>
  <front>
    <title>ASCII format for network interchange</title>
    <author fullname='V.G. Cerf' initials='V.G.' surname='Cerf'/>
    <date month='October' year='1969'/>
  </front>
  <seriesInfo name='STD' value='80'/>
  <seriesInfo name='RFC' value='20'/>
  <seriesInfo name='DOI' value='10.17487/RFC0020'/>
</reference>

<reference anchor='RFC4250' target='https://www.rfc-editor.org/info/rfc4250'>
  <front>
    <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
    <author fullname='S. Lehtinen' initials='S.' surname='Lehtinen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4250'/>
  <seriesInfo name='DOI' value='10.17487/RFC4250'/>
</reference>

<reference anchor='RFC4251' target='https://www.rfc-editor.org/info/rfc4251'>
  <front>
    <title>The Secure Shell (SSH) Protocol Architecture</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4251'/>
  <seriesInfo name='DOI' value='10.17487/RFC4251'/>
</reference>

<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
  <front>
    <title>The Secure Shell (SSH) Transport Layer Protocol</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
      <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
      <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
      <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4253'/>
  <seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>

<reference anchor='RFC4255' target='https://www.rfc-editor.org/info/rfc4255'>
  <front>
    <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
    <author fullname='J. Schlyter' initials='J.' surname='Schlyter'/>
    <author fullname='W. Griffin' initials='W.' surname='Griffin'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4255'/>
  <seriesInfo name='DOI' value='10.17487/RFC4255'/>
</reference>

<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8032'/>
  <seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>

<reference anchor='NIST.FIPS.180' target='https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/NIST.FIPS.180.pdf'>
  <front>
    <title>Secure hash standard</title>
    <author>
      <organization abbrev='NIST'>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date month='May' year='1993'/>
  </front>
  <seriesInfo name='NIST Federal Information Processing Standards Publications' value='180'/>
  <seriesInfo name='DOI' value='10.6028/NIST.FIPS.180'/>
</reference>

<reference anchor='NIST.FIPS.204'> <front> <title>*** BROKEN REFERENCE ***</title> <author> <organization/> </author> <date/> </front> </reference>
<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters/">
  <front>
    <title>Secure Shell (SSH) Protocol Parameters</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters/">
  <front>
    <title>DNS SSHFP Resource Record Parameters</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor='RFC8709' target='https://www.rfc-editor.org/info/rfc8709'>
  <front>
    <title>Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol</title>
    <author fullname='B. Harris' initials='B.' surname='Harris'/>
    <author fullname='L. Velvindron' initials='L.' surname='Velvindron'/>
    <date month='February' year='2020'/>
    <abstract>
      <t>This document describes the use of the Ed25519 and Ed448 digital signature algorithms in the Secure Shell (SSH) protocol. Accordingly, this RFC updates RFC 4253.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8709'/>
  <seriesInfo name='DOI' value='10.17487/RFC8709'/>
</reference>


<reference anchor="DJB-HYBRID-SIGNATURE" target="https://mailarchive.ietf.org/arch/msg/cfrg/LdvasJBpseekZtQkQF1nuPPDH_s/">
  <front>
    <title>How to construct a hybrid signature combiner?</title>
    <author fullname="D.J. Bernstein">
      <organization></organization>
    </author>
    <date year="2024" month="March"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

