<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.7.0) -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-cfrg-det-sigs-with-noise-04" category="info" updates="6979, 8032" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" tocDepth="2" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="Hedged ECC Signatures">Deterministic ECDSA and EdDSA Signatures with Additional Randomness</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-cfrg-det-sigs-with-noise-04"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="E." surname="Thormarker" fullname="Erik Thormarker">
      <organization>Ericsson</organization>
      <address>
        <email>erik.thormarker@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Ruohomaa" fullname="Sini Ruohomaa">
      <organization>Ericsson</organization>
      <address>
        <email>sini.ruohomaa@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="February" day="15"/>
    <abstract>
      <t>Deterministic elliptic-curve signatures such as deterministic ECDSA and EdDSA have gained popularity over randomized ECDSA as their security do not depend on a source of high-quality randomness. Recent research has however found that implementations of these signature algorithms may be vulnerable to certain side-channel and fault injection attacks due to their determinism. One countermeasure to such attacks is to re-add randomness to the otherwise deterministic calculation of the per-message secret number. This document updates RFC 6979 and RFC 8032 to recommend constructions with additional randomness for deployments where side-channel attacks and fault injection attacks are a concern. The updates are invisible to the validator of the signature and compatible with existing ECDSA and EdDSA validators.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>In Elliptic-Curve Cryptography (ECC) signature algorithms, the per-message secret number has traditionally been generated from a random number generator (RNG). The security of such algorithms depends on the cryptographic quality of the random number generation and biases in the randomness may have catastrophic effects such as compromising private keys (see e.g., <xref target="Bernstein19" format="default"/>). Repeated per-message secret numbers have caused several severe security accidents in practice. As stated in <xref target="RFC6979" format="default"/>, the need for a cryptographically secure source of randomness is also a hindrance to deployment of randomized ECDSA <xref target="FIPS-186-4" format="default"/> in architectures where secure random number generation is challenging, in particular, embedded IoT systems and smartcards. <xref target="ABFJLM17" format="default"/> does however state that smartcards typically have a high-quality RNG on board, which makes it significantly easier and faster to use the RNG instead of doing a hash computation.</t>
      <t>In deterministic ECC signatures schemes such as Deterministic Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6979" format="default"/> and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8032" format="default"/>, the per-message secret number is instead generated in a fully deterministic way as a function of the message and the private key. Except for key generation, the security of such deterministic signatures does not depend on a source of high-quality randomness. This makes verification of implementations easier. As they are presumed to be safer, deterministic signatures have gained popularity and are referenced and recommended by a large number of recent RFCs <xref target="RFC8037" format="default"/> <xref target="RFC8080" format="default"/> <xref target="RFC8152" format="default"/> <xref target="RFC8225" format="default"/> <xref target="RFC8387" format="default"/> <xref target="RFC8410" format="default"/> <xref target="RFC8411" format="default"/> <xref target="RFC8419" format="default"/> <xref target="RFC8420" format="default"/> <xref target="RFC8422" format="default"/> <xref target="RFC8446" format="default"/> <xref target="RFC8463" format="default"/> <xref target="RFC8550" format="default"/> <xref target="RFC8591" format="default"/> <xref target="RFC8624" format="default"/> <xref target="RFC8208" format="default"/> <xref target="RFC8608" format="default"/>.</t>
      <t>Side-channel attacks are potential attack vectors for implementations of cryptographic algorithms. Side-Channel attacks can in general be classified along three orthogonal axes: passive vs. active, physical vs. logical, and local vs. remote <xref target="SideChannel" format="default"/>. It has been demonstrated how side-channel attacks such as power analysis <xref target="BCPST14" format="default"/> and timing attacks <xref target="Minerva19" format="default"/> <xref target="TPM-Fail19" format="default"/> allow for practical recovery of the private key in some existing implementations of randomized ECDSA. <xref target="BSI" format="default"/> summarizes minimum requirements for evaluating side-channel attacks of elliptic curve implementations and writes that deterministic ECDSA and EdDSA requires extra care. The deterministic ECDSA specification <xref target="RFC6979" format="default"/> notes that the deterministic generation of per-message secret numbers may be useful to an attacker in some forms of side-channel attacks and as stated in <xref target="Minerva19" format="default"/>, deterministic signatures like <xref target="RFC6979" format="default"/> and <xref target="RFC8032" format="default"/> might help an attacker to reduce the noise in the side-channel when the same message it signed multiple times. Recent research <xref target="SH16" format="default"/> <xref target="BP16" format="default"/> <xref target="RP17" format="default"/> <xref target="ABFJLM17" format="default"/> <xref target="SBBDS17" format="default"/> <xref target="PSSLR17" format="default"/> <xref target="SB18" format="default"/> <xref target="WPB19" format="default"/> <xref target="AOTZ19" format="default"/> <xref target="FG19" format="default"/> have theoretically and experimentally analyzed the resistance of deterministic ECC signature algorithms against side-channel and fault injection attacks. The conclusions are that deterministic signature algorithms have theoretical weaknesses against certain instances of these types of attacks and that the attacks are practically feasibly in some environments. These types of attacks may be of particular concern for hardware implementations such as embedded IoT devices and smartcards where the adversary can be assumed to have access to the device to induce faults and measure its side-channels such as timing information, power consumption, electromagnetic leaks, or sound with low signal-to-noise ratio. A good summary of fault attacks in given by <xref target="Cao20" format="default"/>. See also the discussions and references in <xref target="Comments-186-5" format="default"/>.</t>
      <t>Fault attacks may also be possible without physical access to the device. RowHammer <xref target="RowHammer14" format="default"/> showed how an attacker to induce DRAM bit-flips in memory areas the attacker should not have access to. Plundervolt <xref target="Plundervolt19" format="default"/> showed how an attacker with root access can use frequency and voltage scaling interfaces to induce faults that bypass even secure execution technologies. RowHammer can e.g., be used in operating systems with several processes or cloud scenarios with virtualized servers. Protocols like TLS, SSH, and IKEv2 that adds a random number to the message to be signed mitigate some types of attacks <xref target="PSSLR17" format="default"/>.</t>
      <t>Government agencies are clearly concerned about these attacks. In <xref target="Notice-186-5" format="default"/> and <xref target="Draft-186-5" format="default"/>, NIST warns about side-channel and fault injection attacks, but states that deterministic ECDSA may be desirable for devices that lack good randomness. BSI has published <xref target="BSI" format="default"/> and researchers from BSI have co-authored two research papers <xref target="ABFJLM17" format="default"/> <xref target="PSSLR17" format="default"/> on attacks on deterministic signatures. For many industries it is important to be compliant with both RFCs and government publications, alignment between IETF, NIST, and BSI recommendations would be preferable.</t>
      <t>Note that deriving per-message secret number deterministically, is also insecure in a multi-party signature setting <xref target="I-D.irtf-cfrg-frost" format="default"/>.</t>
      <t>One countermeasure to  entropy failures, side-channel attacks, and fault injection attacks recommended by <xref target="Langley13" format="default"/> <xref target="RP17" format="default"/> <xref target="ABFJLM17" format="default"/> <xref target="SBBDS17" format="default"/> <xref target="PSSLR17" format="default"/> <xref target="SB18" format="default"/> <xref target="AOTZ19" format="default"/> <xref target="FG19" format="default"/> and implemented in <xref target="OpenSSL13a" format="default"/> <xref target="OpenSSL13b" format="default"/> <xref target="XEdDSA" format="default"/> <xref target="libSodium" format="default"/> <xref target="libHydrogen" format="default"/> is to generate the per-message secret number from a random string, a secret key, and the message. This combines the security benefits of fully randomized per-message secret numbers with the security benefits of fully deterministic secret numbers.  Such a construction protects against key compromise due to weak random number generation, but still effectively prevents many side-channel and fault injection attacks that exploit determinism. Such a construction require minor changes to the implementation and does not increase the number of elliptic curve point multiplications and is therefore suitable for constrained IoT. Adding randomness to EdDSA is not compliant with <xref target="RFC8032" format="default"/>. <xref target="Kampanakis16" format="default"/> describes an alternative <xref target="FIPS-186-4" format="default"/> compliant approach where message specific pseudo-random information is used as an additional input to the random number generation to create per-message secret number. <xref target="Bernstein14" format="default"/> states that generation of the per-message secret number from a subset of a random string, a secret key, the message, and a message counter is common in DSA/ECDSA implementations.</t>
      <t>This document updates <xref target="RFC6979" format="default"/> and <xref target="RFC8032" format="default"/> to recommend constructions with additional randomness for deployments where side-channel and fault injection attacks are a concern. The updates are invisible to the validator of the signature. Produced signatures remain fully compatible with unmodified ECDSA and EdDSA verifiers and existing key pairs can continue to be used. As the precise use of the noise is specified, test vectors can still be produced and implementations can be tested against them.</t>
    </section>
    <section anchor="conventions-used-in-this-document" numbered="true" toc="default">
      <name>Conventions Used in This Document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="SecEdDSA" numbered="true" toc="default">
      <name>Updates to RFC 8032 (EdDSA)</name>
      <t>For Ed25519ph, Ed25519ctx, and Ed25519: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.1.6 of <xref target="RFC8032" format="default"/>:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
   2.  Compute SHA-512(dom2(F, C) || Z || prefix || 000... || PH(M)),
       where M is the message to be signed, Z is 32 octets of random
       data, the number of zeroes 000... is chosen so that the length
       of (dom2(F, C) || Z || prefix || 000...) is a multiple of 128
       octets. Interpret the 64-octet digest as a little-endian
       integer r.
]]></artwork>
      <t>For Ed448ph and Ed448: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.3.6 of <xref target="RFC8032" format="default"/>:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
   2.  Compute SHAKE256(dom4(F, C) || Z || prefix || 000... || PH(M),
       114), where M is the message to be signed, and Z is 57 octets
       of random data, the number of zeroes 000... is chosen so that
       the length of (dom4(F, C) || Z || prefix || 000...) is a
       multiple of 136 octets. F is 1 for Ed448ph, 0 for Ed448, and C
       is the context to use. Interpret the 114-octet digest as a
       little-endian integer r.
]]></artwork>
    </section>
    <section anchor="updates-to-rfc-6979-deterministic-ecdsa" numbered="true" toc="default">
      <name>Updates to RFC 6979 (Deterministic ECDSA)</name>
      <t>For Deterministic ECDSA: In existing ECDSA deployments where side-channel and fault injection attacks are a concern, the following steps are RECOMMENDED instead of steps (d) and (f) in Section 3.2 of <xref target="RFC6979" format="default"/>:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
  d.  Set:

      K = HMAC_K(V || 0x00 || Z || int2octets(x) || 000... ||
      bits2octets(h1)) where '||' denotes concatenation.  In other
      words, we compute HMAC with key K, over the concatenation of
      the following, in order: the current value of V, a sequence of
      eight bits of value 0, random data Z (of the same length as
      int2octets(x)), the encoding of the (EC)DSA private key x, a
      sequence of zero bits 000... chosen so that the length of
      (V || 0x00 || Z || int2octets(x) || 000...) is equal to the
      block size of the hash function, and the hashed message
      (possibly truncated and extended as specified by the
      bits2octets transform).  The HMAC result is the new value of K.
      Note that the private key x is in the [1, q-1] range, hence a
      proper input for int2octets, yielding rlen bits of output,
      i.e., an integral number of octets (rlen is a multiple of 8).

  f.  Set:

      K = HMAC_K(V || 0x01 || Z || int2octets(x) || 000... ||
                 bits2octets(h1))
]]></artwork>
      <t>When ECDSA is used with SHAKE <xref target="SHA3" format="default"/> the HMAC construction above MAY be used but it is RECOMMENDED to use the more efficient KMAC construction <xref target="KMAC" format="default"/>. SHAKE is a variable-length hash function defined as SHAKE(M, d) where the output is a d-bits-long digest of message M. When ECDSA is used with SHAKE128(M, d), it is RECOMMENDED to replace HMAC(K, M) with KMAC128(K, M, d, ""). When ECDSA is used with SHAKE256(M, d), it is RECOMMENDED to replace HMAC(K, M) with KMAC256(K, M, d, ""). <xref target="RFC8692" format="default"/> and <xref target="Draft-186-5" format="default"/> define the use of SHAKE128 with an output length of 256 bits and SHAKE256 with an output length or 512 bits.</t>
      <t>In new deployments, where side-channel and fault injection attacks are a concern, EdDSA with additional randomness as specified in <xref target="SecEdDSA" format="default"/> is RECOMMENDED.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The constructions in this document follows the high-level approach in <xref target="XEdDSA" format="default"/> to calculate the per-message secret number from the hash of the private key and the message, but add additional randomness into the calculation for greater resilience. This does not re-introduce the strong security requirement of randomness needed by randomized ECDSA <xref target="FIPS-186-4" format="default"/>. The randomness of Z does not need to be perfect, but SHALL be generated by a cryptographically secure pseudo random number generator (PRNG) and SHALL be secret. Even if the same random number Z is used to sign two different messages, the security will be the same as deterministic ECDSA and EdDSA and an attacker will not be able to compromise the private key with algebraic means as in fully randomized ECDSA <xref target="FIPS-186-4" format="default"/>. With the construction specified in this document, two signatures over two equal messages are different which prevents information leakage in use cases where signatures but not messages are public. The construction in this document place the additional randomness before the message to align with randomized hashing methods.</t>
      <t><xref target="SBBDS17" format="default"/> states that <xref target="XEdDSA" format="default"/> would not prevent their attack due to insufficient mixing of the hashed private key with the additional randomness. <xref target="SBBDS17" format="default"/> suggest a construction where the randomness  is padded with zeroes so that the first 1024-bit SHA-512 block is composed only of the hashed private key and the random value, but not the message. The construction in this document follows this recommendation and pads with zeroes so that the first block is composed only of the hashed private key and the random value, but not the message.</t>
      <t>Another countermeasure to fault attacks is to force the signer to verify the signature in the last step of the signature generation or to calculate the signature twice and compare the results. These countermeasure would catch a single fault but would not protect against attackers that are able to precisely inject faults several times <xref target="RP17" format="default"/> <xref target="PSSLR17" format="default"/> <xref target="SB18" format="default"/>. Adding an additional sign or verification operation would also significantly affect performance, especially verification which is a heavier operation than signing in ECDSA and EdDSA.</t>
      <t><xref target="ABFJLM17" format="default"/> suggests using both additional randomness and a counter, which makes the signature generation stateful. While most used signatures have traditionally been stateless, stateful signatures like XMSS <xref target="RFC8391" format="default"/> and LMS <xref target="RFC8554" format="default"/> have now been standardized and deployed. <xref target="RFC8937" format="default"/> specifies a PRNG construction with a random seed, a secret key, a context string, and a nonce, which makes the random number generation stateful. The generation of the per-message secret number in this document is not stateful, but it can be used with a stateful PRNG. The exact construction in <xref target="RFC8937" format="default"/> is however not recommended in deployments where side-channel and fault injection attacks are a concern as it relies on deterministic signatures.</t>
      <t>With the construction in this document, the repetition of the same per-message secret number for two different messages is highly unlikely even with an imperfect random number generator, but not impossible. As an extreme countermeasure, previously used secret numbers can be tracked to ensure their uniqueness for a given key, and a different random number can be used if a collision is detected. This document does not mandate nor stop an implementation from taking such a precaution.</t>
      <t>Implementations need to follow best practices on how to protect against all side-channel attacks, not just attacks that exploit determinism, see for example <xref target="BSI" format="default"/>.</t>
    </section>
    <section anchor="for-discussion-to-be-removed-in-the-future" numbered="true" toc="default">
      <name>For discussion (to be removed in the future)</name>
      <ul spacing="normal">
        <li>removal of "noise" from filename. Will be done if/when the draft is uploaded as adopted (draft-irtf-....)</li>
        <li>Strong consensus to change the name "Deterministic ECDSA and EdDSA Signatures with Additional Randomness". The signatures
are obliously not deteministic anymore. Several suggestions for new names: "message-dependent", "message-keyed", "entropy stealing", "entropy combining", "whitening", "keyed entropy whitening", "hedged", "noise".</li>
        <li>Ordering of the parameters in "dom2(F, C) || Z || prefix || 000... || PH(M)" in Ed25519 and similar in Ed448 and ECDSA. There has also been sugestion to use a larger Z and to use several paddings 000....</li>
        <li>Ilari Liusvaara pointed out attacks using the context that needs to be considered. Some statements "first block is composed only of the hashed private key and the random value" in the document are not true for Ed25519ctx and Ed448ctx.</li>
        <li>Jim Schaad: Is there any advantage to stealing one of the zeros from the end padding and using it to pad between 'Z' and 'x' in the construction? I would assume that it should use the '0'/'1' construction between steps d and f.</li>
        <li>Jim Schaad: Is there any advantage to padding with 0x01 in step f rather than 0x00?</li>
        <li>Rene Stuik: MUST instead of RECOMMENDED.</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6979" target="https://www.rfc-editor.org/info/rfc6979" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6979.xml">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author initials="T." surname="Pornin" fullname="T. Pornin">
              <organization/>
            </author>
            <date year="2013" month="August"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization/>
            </author>
            <author initials="I." surname="Liusvaara" fullname="I. Liusvaara">
              <organization/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8692" target="https://www.rfc-editor.org/info/rfc8692" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8692.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithm Identifiers for RSASSA-PSS and ECDSA Using SHAKEs</title>
            <author initials="P." surname="Kampanakis" fullname="P. Kampanakis">
              <organization/>
            </author>
            <author initials="Q." surname="Dang" fullname="Q. Dang">
              <organization/>
            </author>
            <date year="2019" month="December"/>
            <abstract>
              <t>Digital signatures are used to sign messages, X.509 certificates, and Certificate Revocation Lists (CRLs). This document updates the "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" (RFC 3279) and describes the conventions for using the SHAKE function family in Internet X.509 certificates and revocation lists as one-way hash functions with the RSA Probabilistic signature and Elliptic Curve Digital Signature Algorithm (ECDSA) signature algorithms. The conventions for the associated subject public keys are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8692"/>
          <seriesInfo name="DOI" value="10.17487/RFC8692"/>
        </reference>
        <reference anchor="FIPS-186-4" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author initials="N. S." surname="Department of Commerce">
              <organization/>
            </author>
            <date year="2013" month="July"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 186-4" value=""/>
        </reference>
        <reference anchor="SHA3" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">
          <front>
            <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 202" value=""/>
        </reference>
        <reference anchor="KMAC" target="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf">
          <front>
            <title>SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
          <seriesInfo name="NIST SP 800-185" value=""/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8937" target="https://www.rfc-editor.org/info/rfc8937" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8937.xml">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author initials="C." surname="Cremers" fullname="C. Cremers">
              <organization/>
            </author>
            <author initials="L." surname="Garratt" fullname="L. Garratt">
              <organization/>
            </author>
            <author initials="S." surname="Smyshlyaev" fullname="S. Smyshlyaev">
              <organization/>
            </author>
            <author initials="N." surname="Sullivan" fullname="N. Sullivan">
              <organization/>
            </author>
            <author initials="C." surname="Wood" fullname="C. Wood">
              <organization/>
            </author>
            <date year="2020" month="October"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols.  Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-frost" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-cfrg-frost.xml" target="https://www.ietf.org/archive/id/draft-irtf-cfrg-frost-02.txt">
          <front>
            <title>Two-Round Threshold Schnorr Signatures with FROST</title>
            <author fullname="Deirdre Connolly">
              <organization>Zcash Foundation</organization>
            </author>
            <author fullname="Chelsea Komlo">
              <organization>University of Waterloo, Zcash Foundation</organization>
            </author>
            <author fullname="Ian Goldberg">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date month="February" day="12" year="2022"/>
            <abstract>
              <t>   In this draft, we present a two-round signing variant of FROST, a
   Flexible Round-Optimized Schnorr Threshold signature scheme.  FROST
   signatures can be issued after a threshold number of entities
   cooperate to issue a signature, allowing for improved distribution of
   trust and redundancy with respect to a secret key.  Further, this
   draft specifies signatures that are compatible with [RFC8032].
   However, unlike [RFC8032], the protocol for producing signatures in
   this draft is not deterministic, so as to ensure protection against a
   key-recovery attack that is possible when even only one participant
   is malicious.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-frost-02"/>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf?__blob=publicationFile">
          <front>
            <title>Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="Minerva19" target="https://minerva.crocs.fi.muni.cz/">
          <front>
            <title>Minerva</title>
            <author initials="" surname="Centre for Research on Cryptography and Security (CRoCS)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RowHammer14" target="https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf">
          <front>
            <title>Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors</title>
            <author initials="Y." surname="Kim">
              <organization/>
            </author>
            <author initials="R." surname="Daly">
              <organization/>
            </author>
            <author initials="J." surname="Kim">
              <organization/>
            </author>
            <author initials="C." surname="Fallin">
              <organization/>
            </author>
            <author initials="J." surname="Lee">
              <organization/>
            </author>
            <author initials="D." surname="Lee">
              <organization/>
            </author>
            <author initials="C." surname="Wilkerson">
              <organization/>
            </author>
            <author initials="K." surname="Mutlu">
              <organization/>
            </author>
            <date year="2014" month="June"/>
          </front>
        </reference>
        <reference anchor="Plundervolt19" target="https://plundervolt.com/">
          <front>
            <title>How a little bit of undervolting can cause a lot of problems</title>
            <author initials="K." surname="Murdock">
              <organization/>
            </author>
            <author initials="D." surname="Oswald">
              <organization/>
            </author>
            <author initials="F." surname="Garcia">
              <organization/>
            </author>
            <author initials="J." surname="Van Bulck">
              <organization/>
            </author>
            <author initials="D." surname="Gruss">
              <organization/>
            </author>
            <author initials="F." surname="Piessens">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="TPM-Fail19" target="https://tpm.fail/">
          <front>
            <title>TPM-FAIL: TPM meets Timing and Lattice Attacks</title>
            <author initials="D." surname="Moghimi">
              <organization/>
            </author>
            <author initials="B." surname="Sunar">
              <organization/>
            </author>
            <author initials="T." surname="Eisenbarth">
              <organization/>
            </author>
            <author initials="N." surname="Heninge">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="XEdDSA" target="https://signal.org/docs/specifications/xeddsa/">
          <front>
            <title>The XEdDSA and VXEdDSA Signature Schemes</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="October"/>
          </front>
        </reference>
        <reference anchor="libHydrogen" target="https://github.com/jedisct1/libhydrogen">
          <front>
            <title>The Hydrogen library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="libSodium" target="https://github.com/jedisct1/libsodium">
          <front>
            <title>The Sodium library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Notice-186-5" target="https://www.federalregister.gov/documents/2019/10/31/2019-23742/request-for-comments-on-fips-186-5-and-sp-800-186">
          <front>
            <title>Request for Comments on FIPS 186-5 and SP 800-186</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="Draft-186-5" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5-draft.pdf">
          <front>
            <title>FIPS PUB 186-5 (Draft)</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="SideChannel" target="https://arxiv.org/pdf/1611.03748.pdf">
          <front>
            <title>Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices</title>
            <author initials="R." surname="Spreitzer">
              <organization/>
            </author>
            <author initials="V." surname="Moonsamy">
              <organization/>
            </author>
            <author initials="T." surname="Korak">
              <organization/>
            </author>
            <author initials="S." surname="Mangard">
              <organization/>
            </author>
            <date year="2017" month="December"/>
          </front>
        </reference>
        <reference anchor="BCPST14" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.854.7836&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Online Template Attacks</title>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="L." surname="Chmielewski">
              <organization/>
            </author>
            <author initials="L." surname="Papachristodoulou">
              <organization/>
            </author>
            <author initials="P." surname="Schwabe">
              <organization/>
            </author>
            <author initials="M." surname="Tunstall">
              <organization/>
            </author>
            <date year="2014" month="December"/>
          </front>
        </reference>
        <reference anchor="SH16" target="http://www.cs2.deib.polimi.it/slides_16/01_Seuschek_Deterministic_Signatures.pdf">
          <front>
            <title>A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes</title>
            <author initials="H." surname="Seuschek">
              <organization/>
            </author>
            <author initials="J." surname="Heyszl">
              <organization/>
            </author>
            <author initials="F." surname="De Santis">
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="BP16" target="https://link.springer.com/chapter/10.1007/978-3-319-44524-3_11">
          <front>
            <title>A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)</title>
            <author initials="A." surname="Barenghi">
              <organization/>
            </author>
            <author initials="G." surname="Pelosi">
              <organization/>
            </author>
            <date year="2016" month="September"/>
          </front>
        </reference>
        <reference anchor="RP17" target="https://romailler.ch/ddl/10.1109_FDTC.2017.12_eddsa.pdf">
          <front>
            <title>Practical fault attack against the Ed25519 and EdDSA signature schemes</title>
            <author initials="Y." surname="Romailler">
              <organization/>
            </author>
            <author initials="S." surname="Pelissier">
              <organization/>
            </author>
            <date year="2017" month="September"/>
          </front>
        </reference>
        <reference anchor="ABFJLM17" target="https://eprint.iacr.org/2017/975">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose">
              <organization/>
            </author>
            <author initials="J." surname="Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SBBDS17" target="https://eprint.iacr.org/2017/985.pdf">
          <front>
            <title>Breaking Ed25519 in WolfSSL</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="G." surname="Bertoni">
              <organization/>
            </author>
            <author initials="J." surname="Daemen">
              <organization/>
            </author>
            <author initials="R." surname="Susella">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="PSSLR17" target="https://eprint.iacr.org/2017/1014">
          <front>
            <title>Attacking Deterministic Signature Schemes using Fault Attacks</title>
            <author initials="D." surname="Poddebniak">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="P." surname="Rösler">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SB18" target="https://nielssamwel.nl/papers/africacrypt2018_fault.pdf">
          <front>
            <title>Practical Fault Injection on Deterministic Signatures: The Case of EdDSA</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="WPB19" target="https://eprint.iacr.org/2019/358.pdf">
          <front>
            <title>One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA</title>
            <author initials="L." surname="Weissbart">
              <organization/>
            </author>
            <author initials="S." surname="Picek">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2019" month="July"/>
          </front>
        </reference>
        <reference anchor="AOTZ19" target="https://eprint.iacr.org/2019/956">
          <front>
            <title>Security of Hedged Fiat-Shamir Signatures under Fault Attacks</title>
            <author initials="D." surname="Aranha">
              <organization/>
            </author>
            <author initials="C." surname="Orlandi">
              <organization/>
            </author>
            <author initials="A." surname="Takahashi">
              <organization/>
            </author>
            <author initials="G." surname="Zaverucha">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FG19" target="https://eprint.iacr.org/2019/1053">
          <front>
            <title>Modeling Memory Faults in Signature and Encryption Schemes</title>
            <author initials="M." surname="Fischlin">
              <organization/>
            </author>
            <author initials="F." surname="Günther">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="Kampanakis16" target="https://blogs.cisco.com/security/fips-and-deterministic-ecdsa-achieving-robust-security-and-conformance">
          <front>
            <title>FIPS and Deterministic ECDSA: Achieving robust security and conformance</title>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
        </reference>
        <reference anchor="Langley13" target="https://www.imperialviolet.org/2013/06/15/suddendeathentropy.html">
          <front>
            <title>Sudden Death Entropy Failures</title>
            <author initials="A." surname="Langley">
              <organization/>
            </author>
            <date year="2013" month="June"/>
          </front>
        </reference>
        <reference anchor="OpenSSL13a" target="https://github.com/openssl/openssl/commit/8a99cb29d1f0013243a532bccc1dc70ed678eebe">
          <front>
            <title>Add secure DSA nonce flag</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenSSL13b" target="https://github.com/openssl/openssl/commit/190c615d4398cc6c8b61eb7881d7409314529a75">
          <front>
            <title>Make `safe' (EC)DSA nonces the default</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Comments-186-5" target="https://csrc.nist.gov/CSRC/media/Publications/fips/186/5/draft/documents/fips-186-5-draft-comments-received.pdf">
          <front>
            <title>Public Comments Received on Draft FIPS 186-5: Digital Signature Standards (DSS)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
        <reference anchor="Bernstein19" target="https://blog.cr.yp.to/20191024-eddsa.html">
          <front>
            <title>Why EdDSA held up better than ECDSA against Minerva</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="Bernstein14" target="https://blog.cr.yp.to/20140323-ecdsa.html">
          <front>
            <title>How to design an elliptic-curve signature system</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2014" month="March"/>
          </front>
        </reference>
        <reference anchor="Cao20" target="https://eprint.iacr.org/2020/803">
          <front>
            <title>Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA</title>
            <author initials="" surname="Weiqiong Cao">
              <organization/>
            </author>
            <author initials="" surname="Hongsong Shi">
              <organization/>
            </author>
            <author initials="" surname="Hua Chen">
              <organization/>
            </author>
            <author initials="" surname="Jiazhe Chen">
              <organization/>
            </author>
            <author initials="" surname="Limin Fan">
              <organization/>
            </author>
            <author initials="" surname="Wenling Wu">
              <organization/>
            </author>
            <date year="2020" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC8037" target="https://www.rfc-editor.org/info/rfc8037" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8037.xml">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author initials="I." surname="Liusvaara" fullname="I. Liusvaara">
              <organization/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC8080" target="https://www.rfc-editor.org/info/rfc8080" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8080.xml">
          <front>
            <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
            <author initials="O." surname="Sury" fullname="O. Sury">
              <organization/>
            </author>
            <author initials="R." surname="Edmonds" fullname="R. Edmonds">
              <organization/>
            </author>
            <date year="2017" month="February"/>
            <abstract>
              <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC).  It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8080"/>
          <seriesInfo name="DOI" value="10.17487/RFC8080"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8225" target="https://www.rfc-editor.org/info/rfc8225" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8225.xml">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author initials="C." surname="Wendt" fullname="C. Wendt">
              <organization/>
            </author>
            <author initials="J." surname="Peterson" fullname="J. Peterson">
              <organization/>
            </author>
            <date year="2018" month="February"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="RFC8387" target="https://www.rfc-editor.org/info/rfc8387" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8387.xml">
          <front>
            <title>Practical Considerations and Implementation Experiences in Securing Smart Object Networks</title>
            <author initials="M." surname="Sethi" fullname="M. Sethi">
              <organization/>
            </author>
            <author initials="J." surname="Arkko" fullname="J. Arkko">
              <organization/>
            </author>
            <author initials="A." surname="Keranen" fullname="A. Keranen">
              <organization/>
            </author>
            <author initials="H." surname="Back" fullname="H. Back">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>This memo describes challenges associated with securing resource- constrained smart object devices.  The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices.  Lastly, the memo discusses trade-offs involving different types of security approaches.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8387"/>
          <seriesInfo name="DOI" value="10.17487/RFC8387"/>
        </reference>
        <reference anchor="RFC8410" target="https://www.rfc-editor.org/info/rfc8410" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8410.xml">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization/>
            </author>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves.  The signature algorithms covered are Ed25519 and Ed448.  The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411" target="https://www.rfc-editor.org/info/rfc8411" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8411.xml">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization/>
            </author>
            <author initials="R." surname="Andrews" fullname="R. Andrews">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms.  This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs.  This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC8419" target="https://www.rfc-editor.org/info/rfc8419" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8419.xml">
          <front>
            <title>Use of Edwards-Curve Digital Signature Algorithm (EdDSA) Signatures in the Cryptographic Message Syntax (CMS)</title>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies the conventions for using the Edwards-curve Digital Signature Algorithm (EdDSA) for curve25519 and curve448 in the Cryptographic Message Syntax (CMS).  For each curve, EdDSA defines the PureEdDSA and HashEdDSA modes.  However, the HashEdDSA mode is not used with the CMS.  In addition, no context string is used with the CMS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8419"/>
          <seriesInfo name="DOI" value="10.17487/RFC8419"/>
        </reference>
        <reference anchor="RFC8420" target="https://www.rfc-editor.org/info/rfc8420" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8420.xml">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author initials="Y." surname="Nir" fullname="Y. Nir">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8422" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8422.xml">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author initials="Y." surname="Nir" fullname="Y. Nir">
              <organization/>
            </author>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization/>
            </author>
            <author initials="M." surname="Pegourie-Gonnard" fullname="M. Pegourie-Gonnard">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8463" target="https://www.rfc-editor.org/info/rfc8463" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8463.xml">
          <front>
            <title>A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</title>
            <author initials="J." surname="Levine" fullname="J. Levine">
              <organization/>
            </author>
            <date year="2018" month="September"/>
            <abstract>
              <t>This document adds a new signing algorithm, Ed25519-SHA256, to "DomainKeys Identified Mail (DKIM) Signatures" (RFC 6376).  DKIM verifiers are required to implement this algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8463"/>
          <seriesInfo name="DOI" value="10.17487/RFC8463"/>
        </reference>
        <reference anchor="RFC8550" target="https://www.rfc-editor.org/info/rfc8550" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8550.xml">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Certificate Handling</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization/>
            </author>
            <author initials="B." surname="Ramsdell" fullname="B. Ramsdell">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2019" month="April"/>
            <abstract>
              <t>This document specifies conventions for X.509 certificate usage by Secure/Multipurpose Internet Mail Extensions (S/MIME) v4.0 agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 5280 ("Internet X.509 Public Key Infrastructure Certificate and                                     Certificate Revocation List (CRL) Profile").  S/MIME agents must meet the certificate-processing requirements in this document as well as those in RFC 5280.  This document obsoletes RFC 5750.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8550"/>
          <seriesInfo name="DOI" value="10.17487/RFC8550"/>
        </reference>
        <reference anchor="RFC8591" target="https://www.rfc-editor.org/info/rfc8591" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8591.xml">
          <front>
            <title>SIP-Based Messaging with S/MIME</title>
            <author initials="B." surname="Campbell" fullname="B. Campbell">
              <organization/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization/>
            </author>
            <date year="2019" month="April"/>
            <abstract>
              <t>Mobile messaging applications used with the Session Initiation Protocol (SIP) commonly use some combination of the SIP MESSAGE method and the Message Session Relay Protocol (MSRP).  While these provide mechanisms for hop-by-hop security, neither natively provides end-to-end protection.  This document offers guidance on how to provide end-to-end authentication, integrity protection, and confidentiality using the Secure/Multipurpose Internet Mail Extensions (S/MIME).  It updates and provides clarifications for RFCs 3261, 3428, and 4975.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8591"/>
          <seriesInfo name="DOI" value="10.17487/RFC8591"/>
        </reference>
        <reference anchor="RFC8624" target="https://www.rfc-editor.org/info/rfc8624" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8624.xml">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
            <author initials="P." surname="Wouters" fullname="P. Wouters">
              <organization/>
            </author>
            <author initials="O." surname="Sury" fullname="O. Sury">
              <organization/>
            </author>
            <date year="2019" month="June"/>
            <abstract>
              <t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence.  To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support.  This document defines the current algorithm implementation requirements and usage guidance for DNSSEC.  This document obsoletes RFC 6944.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8624"/>
          <seriesInfo name="DOI" value="10.17487/RFC8624"/>
        </reference>
        <reference anchor="RFC8208" target="https://www.rfc-editor.org/info/rfc8208" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8208.xml">
          <front>
            <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <author initials="O." surname="Borchert" fullname="O. Borchert">
              <organization/>
            </author>
            <date year="2017" month="September"/>
            <abstract>
              <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security).  This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use                    in the Resource Public Key Infrastructure").</t>
              <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8208"/>
          <seriesInfo name="DOI" value="10.17487/RFC8208"/>
        </reference>
        <reference anchor="RFC8608" target="https://www.rfc-editor.org/info/rfc8608" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8608.xml">
          <front>
            <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <author initials="O." surname="Borchert" fullname="O. Borchert">
              <organization/>
            </author>
            <date year="2019" month="June"/>
            <abstract>
              <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security).  This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use                            in the Resource Public Key Infrastructure") and obsoletes RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Documentation and Experimentation Algorithm IDs, correcting the range of unassigned algorithms IDs to fill the complete range, and restructuring the document for better reading.</t>
              <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8608"/>
          <seriesInfo name="DOI" value="10.17487/RFC8608"/>
        </reference>
        <reference anchor="RFC8391" target="https://www.rfc-editor.org/info/rfc8391" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8391.xml">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author initials="A." surname="Huelsing" fullname="A. Huelsing">
              <organization/>
            </author>
            <author initials="D." surname="Butin" fullname="D. Butin">
              <organization/>
            </author>
            <author initials="S." surname="Gazdag" fullname="S. Gazdag">
              <organization/>
            </author>
            <author initials="J." surname="Rijneveld" fullname="J. Rijneveld">
              <organization/>
            </author>
            <author initials="A." surname="Mohaisen" fullname="A. Mohaisen">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature.  This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS.  Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems.  Instead, it is proven that it only relies on the properties of cryptographic hash functions.  XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken.  It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554" target="https://www.rfc-editor.org/info/rfc8554" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8554.xml">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author initials="D." surname="McGrew" fullname="D. McGrew">
              <organization/>
            </author>
            <author initials="M." surname="Curcio" fullname="M. Curcio">
              <organization/>
            </author>
            <author initials="S." surname="Fluhrer" fullname="S. Fluhrer">
              <organization/>
            </author>
            <date year="2019" month="April"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995.  It specifies a one-time signature scheme and a general signature scheme.  These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level.  They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks.  Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.  This has been reviewed by many researchers, both in the research group and outside of it.  The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>The authors want to thank Tony Arcieri, Uri Blumenthal, Carsten Bormann, Phillip Hallam-Baker, Chelsea Komlo, Quynh Dang, Janos Follath, Ilari Liusvaara, Jim Schaad, and Ruggero Susella for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
