<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mahy-mls-pq-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="MLS Cipher Suites with ML-KEM">ML-KEM and Hybrid Cipher Suites for Messaging Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-mahy-mls-pq-00"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization>Rohan Mahy Consulting Services</organization>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R. L." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2025" month="March" day="02"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 50?>

<t>This document reigsters new cipher suites for Messaging Layer Security (MLS)
based on "post-quantum" algorithms, which are intended to be resilient to attack
by quantum computers.  These cipher suites are constructed using the new
Module-Lattice Key Encapsulation Mechanism (ML-KEM), optionally in combination
with traditional elliptic curve KEMs, together with appropriate authenticated
encryption, hash, and signature algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mahy-mls-pq/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rohanmahy/mahy-mls-xwing/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The potential availability of a cryptographically-relevant quantum
computer has caused concern that well-funded adversaries could overturn
long-held assumptions about the security assurances of classical
Key Exchange Mechanisms (KEMs) and classical cryptographic signatures,
which are fundamental to modern security protocols, including the MLS
protocol <xref target="RFC9420"/>.</t>
      <t>Of particular concern are "harvest now, decrypt later" attacks, by which an
attacker could collect encrypted traffic now, before a quantum computer exists,
and later use a quantum computer to break the confidentiality protections on the
collected traffic.</t>
      <t>In response to these concerns, the cryptographic community has defined
"post-quantum" algorithms, which are designed to be resilient to attacks by
quantum computers.  Symmetric algorithms can be made post-quantum secure simply
by using longer keys and hashes.  For asymmetric operations such as KEM and
signature, entirely new algorithms are needed.</t>
      <t>In this document, we define ciphersuites that use the post-quantum secure
Module-Lattice-Based KEM (ML-KEM) <xref target="MLKEM"/> together with appropriate symmetric
algorithms and traditional signature algorithms.  These cipher suites address
the risk of "harvest now, decrypt later" attacks, while not taking on the
additional cost of post-quantum signatures.</t>
      <t>Following the pattern of base MLS, we define several variations, to allow for
users that prefer to only use NIST-approved cryptography, users that prefer a
higher security level, and users that prefer a PQ/traditional hybrid KEM over
pure ML-KEM:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-768 + X25519 (Medium security, Non-NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 + P-256 (Medium security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-1024 + P-384 (High security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 (Medium security, NIST, pure PQ)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (High security, NIST, pure PQ)</t>
        </li>
      </ul>
      <t>For the PQ/T hybrid cipher suites, we use the KEM combinators defined in
<xref target="I-D.connolly-cfrg-xwing-kem"/> and <xref target="I-D.irtf-cfrg-hybrid-kems"/>.  For the
pure-PQ cipher suites, we use the HPKE integration for ML-KEM defined in
<xref target="I-D.connolly-cfrg-hpke-mlkem"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="hpke-kdf-identifiers">
        <name>HPKE KDF Identifiers</name>
        <t>This document requests that IANA add the following entry to the HPKE KDF
Identifiers registry.</t>
        <ul spacing="normal">
          <li>
            <t>Value: TBD0</t>
          </li>
          <li>
            <t>KDF: XOF(SHAKE256)</t>
          </li>
          <li>
            <t>Nh: 32</t>
          </li>
          <li>
            <t>Reference: Section 3.2 of <xref target="FIPS202"/></t>
          </li>
        </ul>
      </section>
      <section anchor="mls-cipher-suites">
        <name>MLS Cipher Suites</name>
        <t>This document requests that IANA add the following entries to the "MLS Cipher
Suites" registry, replacing "XXXX" with the RFC number assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Rec</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">MLS_128_X_Wing_AES256GCM_SHA384_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">MLS_128_QSF-KEM(ML-KEM-768,P-256)_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">MLS_192_QSF-KEM(ML-KEM-1024,P-384)_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD4</td>
              <td align="left">MLS_128_ML_KEM_768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD5</td>
              <td align="left">MLS_192_ML_KEM_1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>All of these cipher suites use HMAC <xref target="RFC2104"/> with SHA384 as their MAC
function.
The mapping of cipher suites to HPKE primitives <xref target="RFC9180"/>, HMAC hash functions,
and TLS signature schemes <xref target="RFC8446"/> is as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">KDF</th>
              <th align="left">AEAD</th>
              <th align="left">Hash</th>
              <th align="left">Signature</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0xTBD1</td>
              <td align="left">0x647a</td>
              <td align="left">TBD0</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD2</td>
              <td align="left">TBDH0</td>
              <td align="left">TBD0</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD3</td>
              <td align="left">TBDH1</td>
              <td align="left">TBD0</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD4</td>
              <td align="left">0x0041</td>
              <td align="left">TBD0</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD5</td>
              <td align="left">0x0042</td>
              <td align="left">TBD0</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
          </tbody>
        </table>
        <t>The values <tt>TBDH0</tt> and <tt>TBDH1</tt> refer to the code points to be assigned by IANA
for the following hybrid KEMs defined in <xref target="I-D.irtf-cfrg-hybrid-kems"/>:</t>
        <ul spacing="normal">
          <li>
            <t><tt>TBDH0 = QSF-KEM(ML-KEM-768,P-256)-XOF(SHAKE256)-KDF(SHA3-256)</tt></t>
          </li>
          <li>
            <t><tt>TBDH1 = QSF-KEM(ML-KEM-1024,P-384)-XOF(SHAKE256)-KDF(SHA3-256)</tt></t>
          </li>
        </ul>
        <t>The hash used for the MLS transcript hash is the one referenced in the cipher
suite name. "SHA384" refers to the SHA-384 functions defined in <xref target="SHS"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This ciphersuites defined in this document combine a post-quantum (or PQ/T
hybrid) KEM with a traditional signature algorithm. As such, they are designed
to provide confidentiality against quantum and classical attacks, but provide
authenticity against classical attacks only.  Thus, these cipher suites do not
provide full post-quantum security, only post-quantum confidentiality.  Cipher
suites using post-quantum secure signature algorithms may be defined in the
future.</t>
      <t>For security considerations related to the KEMs used in this document, please
see the documents that define those KEMs <xref target="I-D.connolly-cfrg-xwing-kem"/>
        <xref target="I-D.irtf-cfrg-hybrid-kems"/> <xref target="I-D.connolly-cfrg-hpke-mlkem"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="SHS">
        <front>
          <title>Secure hash standard</title>
          <author>
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="MLKEM">
        <front>
          <title>Module-lattice-based key-encapsulation mechanism standard</title>
          <author>
            <organization/>
          </author>
          <date month="August" year="2024"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="FIPS202">
        <front>
          <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
          <author>
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
        <front>
          <title>The Messaging Layer Security (MLS) Protocol</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
          <author fullname="R. Robert" initials="R." surname="Robert"/>
          <author fullname="J. Millican" initials="J." surname="Millican"/>
          <author fullname="E. Omara" initials="E." surname="Omara"/>
          <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9420"/>
        <seriesInfo name="DOI" value="10.17487/RFC9420"/>
      </reference>
      <reference anchor="I-D.connolly-cfrg-xwing-kem">
        <front>
          <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
          <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
            <organization>SandboxAQ</organization>
          </author>
          <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
            <organization>MPI-SP &amp; Radboud University</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
      </reference>
      <reference anchor="I-D.irtf-cfrg-hybrid-kems">
        <front>
          <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
          <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
            <organization>SandboxAQ</organization>
          </author>
          <date day="25" month="February" year="2025"/>
          <abstract>
            <t>   This document defines generic techniques to achive hybrid post-
   quantum/traditional (PQ/T) key encapsulation mechanisms (KEMs) from
   post-quantum and traditional component algorithms that meet specified
   security properties.  It then uses those generic techniques to
   construct several concrete instances of hybrid KEMs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-03"/>
      </reference>
      <reference anchor="I-D.connolly-cfrg-hpke-mlkem">
        <front>
          <title>ML-KEM for HPKE</title>
          <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
            <organization>SandboxAQ</organization>
          </author>
          <date day="18" month="October" year="2024"/>
          <abstract>
            <t>   This document defines Module-Lattice-Based Key-Encapsulation
   Mechanism (ML-KEM) KEM options for Hybrid Public-Key Encryption
   (HPKE).  ML-KEM is believed to be secure even against adversaries who
   possess a cryptographically-relevant quantum computer.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-hpke-mlkem-04"/>
      </reference>
      <reference anchor="RFC2104">
        <front>
          <title>HMAC: Keyed-Hashing for Message Authentication</title>
          <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
          <author fullname="M. Bellare" initials="M." surname="Bellare"/>
          <author fullname="R. Canetti" initials="R." surname="Canetti"/>
          <date month="February" year="1997"/>
          <abstract>
            <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2104"/>
        <seriesInfo name="DOI" value="10.17487/RFC2104"/>
      </reference>
      <reference anchor="RFC9180">
        <front>
          <title>Hybrid Public Key Encryption</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
          <author fullname="B. Lipp" initials="B." surname="Lipp"/>
          <author fullname="C. Wood" initials="C." surname="Wood"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9180"/>
        <seriesInfo name="DOI" value="10.17487/RFC9180"/>
      </reference>
      <reference anchor="RFC8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
    </references>
    <?line 164?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work would not be possible without the hard work of the CFRG Hybrid KEM
design team: Aron Wussler, Bas Westerbaan, Deirdre Connolly, Mike Ounsworth,
Nick Sullivan, and Stephen Farrell.
Thanks also to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6VZ63LTSBb+309x1vMHdi3HcQIDrqIKExKShUDAqYWtqanQ
ltp2V3Sb7pYTD+SJ9jH2xfY73ZJsJ06gZv0jkaXT5/qdmxxFkXDapWpIp++i
t4enJPOEjpcToxM60OVcGRpX2ilL08LQqbJWznQ+o3dyyY9UXBntlkJOJkYt
mMn41rEr7eY1b5EUcS4zyEqMnLook/NllKU2Kv+I+n2hSzMkZyrrBv3+8/5A
2GqSaWt1kbtliVMnh+dHRL+QTG0xpI7OE1Uq/Mldp0udk9Er/IOSnZNP50cd
aZQckjROXBXmcmaKqvTqifDAqljE0qlZYZZD0vm0EJdqCdJkKChqFMbV2+VE
Gb4oC+uiPyqZuyprvlP9nRri8O/s4845/597P66uWjK1pMPreC7zmYJP+ULb
TAjr4P0LmRY5rF0qK0o9pN9cEXfJFsYZNbW4WmZ88bsQC5VXCurSmnVEwVef
YTTH6Q0/wt1M6nRIcPZLrdy0V5gZbkoTz4c0d660w50dJuE7eqF6DdEO39iZ
mOLKqh2c3mFpiGg1GZIpoDfHcKcN5PUVZO6IX4hS+Na6FfNwqBcX2c6958IZ
IWTl5oXxcUBk7JA+9egUpJBNFAD0iXmsbkJTuPBP6YCV9Yd0UOS2Sh17YqzM
QsdwKh9QwR9eFW/syxnfYf3Wxb7r0Stp8vpQLVojXiahzWebGhxoGxcbgtLJ
S10uevZaCJEXJgPhwsdufDwe0usPJ73dfu9pf/Bs5/3J+Lx3dHI27u0+60f7
IDl9B9zcRzTo74GELwf9wf1EAyEY5K1gEUURyYl1RsZw+flcW0J6VhmyiYzS
M+uUsZSrK4pDPtsflwF6BAg+FhNpVUJFTp31nOkgb5FtwEEGFF/N4UYAUMHV
jpM4IVfQREG21almLfBdOifjSzFZtomGAJUVq9YjOp8rq26pxxxjBB11JHZg
WllW080VmyJOi6RKVfQOfAGFkId5LEtgxEdulYxsCpeAxygpJT+SabqErqzA
ROeeWvjaBg8mOlCQSlMN6pjgj4XidIeprpgpxyp6clmWpiiNBtaJgQ5LNRei
RKg8Nksvq0tzaeddX4utnkFaBbNW7uuF8GU6SVIlkG4nuTMwLfZaIZgK1ckx
Z+gkF5zXEzgVASqmJMmLKWZGlggC2xUZlaoFHNy4WTRuZkUolhUHFG6Nlcnh
TOnoCqZG08oHTiYLBEQaDf/HRZUi9rgBnXOBUjaL5gq3pLVV5q1DkCZF5XxQ
bIMcfmwkBFjWMU7xnXUT20ulpUfs28feQy3xpmErz9muWMGNdZaMctADYVmR
sE2tHggO6m2RIm46j9MqaeDDxbV5SN++/e3T0cHz/UH/5gbB+DClEp1Gx4CR
af3E0jooFQsUNcqLqy4lymvoi6Pp1OiGJOC7VjAX4aYytSchLVWxoxocnCbo
nVOY5zlOFPIR0LiTH6SutXWwnD3k5SEVthJy2qElXnoroftUJwE5jTtUHKJW
cOiVqDVaaQIHnOSctyWoFPNzITGDHzgDmPNGbCA9q3KWwABL1FTnyICfqheJ
4sA+VC8sHCq2FYzxMsuUM5C/Yg1058wnk4na6PEBE4Cozsp0yTUo1BKGNNyG
acF6+HGqKuZ+hMoobSuiKJWRwXO2Yt0t1fOVaJHZJXY1sm/pK+2aVmxprhTS
K7jXrRdouEPVTqvLX139fGpynN18qzG3CmD0yldqVqspdwxt329ubh4oXK2V
Yl3lPNkohlsr1z1VO0kQRytYbaPtJdeAn0sd4CKFpwqEX/qBp0YpODZ6xDyo
geGmP9riAP8eAdLFVZPpJZhz/uIIdzLO/HWHW4XiBrYLyb7g+HY99JgFd0cB
/5s6FCUmtZBiRZ4ufWS4KUfelwuuqausWHbp7kkp5nrmHdUUKBRqlYbWsIWc
R8/1GKzmTl+TRcnhCKHGDPD3+jL69ekz+gd9GTx5svscUFCJbiADkV16X+QR
6931k23N9PHt42fR4MnTbacfOLnbH+z7o3vP9unRMWz9yYMs8j5R3sizj7fF
bGffEgvOX47/msBNmHoUNNnFLm1mgcK0NQxdQyCFTqLXmCXzvODuGk/NLIy4
0aXKkFgcvJpIGzcNBEEiU1g0lVBOGMmsYHT28QFVjs/eHvoxahYKTpjRwjr3
I7Xm5aXCCO716vlRYvR+5MdmtIG6fuH2L0HI29dHdOLbw1QDe3fnxj8qZGyN
Sc8Jeeh1nLYpBkKzrLtEy1WscQWbGXqXWfKYQ/+SKZYcOn/1uo9vIB3Slw9H
j8bHo7eHwNtj3HyPJWZvgItPnATolKAfh65Fe70BJ/K3b/WEfHPjrbmzp/5l
U3joqY3prLiKwLXT2tLFVZnKmI91vuDTCVWVz2GUoLzKJpzAdtXcNko+svV7
8AXRd3qPCYZ+7vMdXon939o39F18H74In/biZz6eeLh2ZAhOHJhdsIfpF7uD
ZxdfLj7DxIvR4RjBeXNweoFAIbcvDpNQXLxG9G+v19EBO4JqLoM1Lh/HR4ze
R6tk7/rq8vgu4zMuOvQA372G7/PBbb5cFrq+9mxjzCXpAb77a/qevrsAvwvo
ea+C93B5sqZdzYW1uk+du1zEKE0Z4W5LW+UCcXw6Oqjn1cFufx/Vx+MucOWh
BAc1ysXoQGA09knT8xtEhiblG+r0FldA06ctZoFM8zZpm3kYC+vNTTeI5LGI
Go71HHqO/FhNBTaeq6w9/Gx//ymUA+SlrVPMboKey1mIB5chfzE6HL32F8cs
jS/GLfvNLNiG+bu3fpwYHLb+dQ36/vXT/V8li+Xy5OX3r/v9PkO5dvB3Uivk
39IoMBqE48fh/EOM4sTKC/SvEsgwuxd2LhlaLaO9mtHuzzPC98DIP2gY7den
9nf/T42eNIwGf1Ujj8QFI8DSV++lr757+uvdr9TOV2F58SM8OqGtl4O2nGJ6
5xoupnWPX9Xw1YS03sN/0J797BT0oRd0b7WKNjpVBNjytz3/7GvDYfcuh7W6
9DAL7x6faX5Db6zjPoQpMLex0ZiZPYH2mY45VAWncSvwlnrPhablE9y/5upR
JwSnE6jbHoe7flZrM3vdab+Nj8e/+ymifSN0e5LwXXZjZ1k7v9Hx6umKd9aN
yf0RjPQvWOuZ0NeFsKH8aP3o0SgsY34lXW6skwIG8lAOZe9swXImdb72tnfz
rcNqja9cw0K0r3bWz98549cCvxNVYU2+U8KTgpcb0Wg2rVDt7y52fp71K8bG
s1t2QNDBWqBtvdBuX3rv7m7oCEtOqo2AKXQNpuuF+bldU+KNuANEvLglDYp8
tnnI3o46BvJUYesSVoXhtnlQT2L1Eubmha3Z/GjaFg+n8vbzt8Zifts24TeR
gPYovsRGmqpk5tUS34ZhdlPJi85UplZ1bmqY8w8P+MOvcXhBnfiV3OoJFlbG
a/MOzL9N9rShjdPB0ac3zW8w/mcTD1FySmZDGhlMtZ8ra1NluoQFnj4rflc7
kTLv0mv0cqzSnHbemi6d6ktFH6rcQoKbd8V7HV9i5k1TveADDOWxU0BFTkfS
IE4pt3+ZA5z8OwtH7J/Ff/+T0ii9UjhwKo2TdMpvuuI/l5eBwyvEHHePZQog
/A/U/64vVBoAAA==

-->

</rfc>
