<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prabel-jose-pq-composite-sigs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="JOSE/COSE Composite Signatures">PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-prabel-jose-pq-composite-sigs-00"/>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Sun Shuzhou">
      <organization>Huawei</organization>
      <address>
        <email>sunshuzhou@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="14"/>
    <area>Security</area>
    <workgroup>JOSE</workgroup>
    <keyword>JOSE</keyword>
    <keyword>COSE</keyword>
    <keyword>PQC</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>Signature</keyword>
    <keyword>Hybrid</keyword>
    <abstract>
      <?line 73?>

<t>This document describes JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for PQ/T hybrid composite signatures. The composite algorithms described combine ML-DSA as the post-quantum component and ECDSA as the traditional component.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-prabel-jose-pq-composite-sigs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Javascript Object Signing and Encryption Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/jose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The impact of a potential Cryptographically Relevant Quantum Computer (CRQC) on algorithms whose security is based on mathematical problems such as integer factorisation or discrete logarithms over finite fields or elliptic curves raises the need for new algorithms that are perceived to be secure against CRQC as well as classical computers. Such algorithms are called post-quantum, while algorithms based on integer factorisation or discrete logarithms are called traditional.</t>
      <t>While switching from a traditional algorithm to a post-quantum one intends to strengthen the security against an adversary possessing a quantum computer, the lack of maturing time of post-quantum algorithms compared to traditional algorithms raises uncertainty about their security.</t>
      <t>Thus, the joint use of a traditional algorithm and a post-quantum algorithm in protocols represents a solution to this problem by providing security as long as at least one of the traditional or post-quantum components remains secure.</t>
      <t>This document describes JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for hybrid composite signatures. The composite algorithms described combine ML-DSA as the post-quantum component and ECDSA as the traditional component.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document follows the terminology for post-quantum hybrid schemes defined in <xref target="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04"/>.</t>
      <t>This section recalls some of this terminology, but also adds other definitions used throughout the whole document:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm":
         An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. A related mathematical problem is one that can be solved by solving the integer factorisation, finite field discrete logarithm or elliptic curve discrete logarithm problem. Where there is little risk of confusion asymmetric traditional cryptographic algorithms can also be referred to as traditional algorithms for brevity.</t>
      <t>"Post-Quantum Algorithm":
         An asymmetric cryptographic algorithm that is intended to be secure against attacks using quantum computers as well as classical computers. As with all cryptography, it always remains the case that attacks, either quantum or classical, may be found against post-quantum algorithms. Therefore it should not be assumed that just because an algorithm is designed to provide post-quantum security it will not be compromised.</t>
      <t>"Component Algorithm":
         Each cryptographic algorithm that forms part of a cryptographic scheme.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":
         A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Digital Signature":
         A multi-algorithm digital signature scheme made up of two or more component digital signature algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"Composite Algorithm":
          An algorithm which is a sequence of two component algorithms, as defined in <xref target="I-D.draft-ietf-lamps-pq-composite-sigs-02"/>.</t>
    </section>
    <section anchor="composite-keys-and-signatures-structures">
      <name>Composite Keys and Signatures Structures</name>
      <t>The structures of the composite keys and composite signatures follow the approach of <xref target="I-D.draft-ietf-lamps-pq-composite-sigs-02"/>. This design was chosen so that composite keys and signatures can be used as a drop-in replacement in JOSE / COSE object formats. This section gives some details about their construction.</t>
      <section anchor="composite-key-structures">
        <name>Composite Key Structures</name>
        <t>Composite public and private keys are generated by calling the key generation functions of the two component algorithms and concatenating the keys in an order given by the registered composite algorithm.</t>
        <t><tt>
Composite Public Key &lt;- Public Key of the 1st Algorithm || Public Key of the 2nd Algorithm
</tt></t>
        <t>and</t>
        <t><tt>
Composite Private Key &lt;- Private Key of the 1st Algorithm || Private Key of the 2nd Algorithm
</tt></t>
        <t>For the composite algorithms described in this document (ML-DSA with ECDSA), the Key Generation process is as follows:</t>
        <artwork><![CDATA[
(pk_1, sk_1) <- MLDSA.KeyGen()
(pk_2 = (x,y), sk_2 = d) <- ECDSA.KeyGen()

Composite Public Key <- pk_1 || pk_2 = pk_1 || x || y
Composite Private Key <- sk_1 || sk_2 = sk_1 || d
]]></artwork>
        <t>Point compression for ECDSA is not performed for the "AKP-EC" JSON Web Key Type but can be performed for the "AKP-EC2" COSE Key Type. Both key types are defined in <xref target="sec-composite-sig-key-types"/>.</t>
        <t>In this document, as it is specified in <xref target="FIPS.204"/>, the ML-DSA private key is stored as a 32-byte seed, which is sufficient to generate the full expanded private key.</t>
      </section>
      <section anchor="composite-signature-structures">
        <name>Composite Signature Structures</name>
        <t>Composite signatures are generated by:</t>
        <ul spacing="normal">
          <li>
            <t>pre-hashing the message to be signed;</t>
          </li>
          <li>
            <t>concatenating it with a domain separator;</t>
          </li>
          <li>
            <t>encoding the resulting message;</t>
          </li>
          <li>
            <t>calling the two signature component algorithms on this new message;</t>
          </li>
          <li>
            <t>concatenating the two output signatures.</t>
          </li>
        </ul>
        <t>For the composite algorithms described in this document (ML-DSA with ECDSA), the signature process of a message M is as follows:</t>
        <artwork><![CDATA[
M' <- Domain || HASH(M)
M' <- Encode(M')

sig_1 <- MLDSA.Sign(sk_1, M')
sig_2 <- ECDSA.Sign(sk_2, M')

Composite Signature <- (sig_1, sig_2)
]]></artwork>
        <t>The domain separator is defined as the octets of the ASCII representation of the Composite Signature "alg" (algorithm) Header Parameter value.</t>
        <t>For JOSE (resp. COSE), M' is base64url-encoded (resp. binary encoded) before signature computations.</t>
      </section>
      <section anchor="encoding-rules">
        <name>Encoding Rules</name>
        <t>In each combination, the byte streams of the keys or signatures are directly concatenated.</t>
        <t><tt>
Signature of the 1st Algorithm || Signature of the 2nd Algorithm
</tt></t>
        <t>Since all combinations presented in this document start with the ML-DSA algorithm and the key or signature sizes are fixed as defined in <xref target="FIPS.204"/>, it is unambiguous to encode or decode a composite key or signature.</t>
        <t><xref target="tab-ml-dsa-size"/> lists sizes of the three parameter sets of the ML-DSA algorithm.</t>
        <table anchor="tab-ml-dsa-size">
          <name>Sizes (in bytes) of keys and signatures of ML-DSA</name>
          <thead>
            <tr>
              <th align="left"> </th>
              <th align="left">Private Key</th>
              <th align="left">Public Key</th>
              <th align="left">Signature Size</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-DSA-44</td>
              <td align="left">2560</td>
              <td align="left">1312</td>
              <td align="left">2420</td>
            </tr>
            <tr>
              <td align="left">ML-DSA-65</td>
              <td align="left">4032</td>
              <td align="left">1952</td>
              <td align="left">3309</td>
            </tr>
            <tr>
              <td align="left">ML-DSA-87</td>
              <td align="left">4896</td>
              <td align="left">2592</td>
              <td align="left">4627</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="composite-signature-algorithms">
      <name>Composite Signature Algorithms</name>
      <t>The ML-DSA signature scheme supports three possible parameter sets, each of which corresponding to a specific security strength. See <xref target="FIPS.204"/> for more considerations on that matter.</t>
      <t>The hybrid composite schemes are described in more detail in <xref target="I-D.draft-ietf-lamps-pq-composite-sigs-02"/>.</t>
      <t>The traditional signature algorithm for each combination in <xref target="tab-jose-algs"/> and <xref target="tab-cose-algs"/> was chosen to match the security level of the ML-DSA post-quantum component. More precisely, NIST security levels 1-3 are matched with 256-bit curves and NIST security levels 4-5 are matched with 384-bit elliptic curves.</t>
      <section anchor="jose-algorithms">
        <name>JOSE algorithms</name>
        <t>The following table defines a list of algorithms associated with specific PQ/T combinations to be registered in <xref target="IANA.JOSE"/>.</t>
        <table anchor="tab-jose-algs">
          <name>JOSE Composite Signature Algorithms for ML-DSA</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">First Algorithm</th>
              <th align="left">Second Algorithm</th>
              <th align="left">Pre-Hash</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MLDSA44-ES256</td>
              <td align="left">ML-DSA-44</td>
              <td align="left">ecdsa-with-SHA256 with secp256r1</td>
              <td align="left">id-sha256</td>
              <td align="left">Composite Signature with ML-DSA-44 and ECDSA using P-256 curve and SHA-256</td>
            </tr>
            <tr>
              <td align="left">MLDSA65-ES512</td>
              <td align="left">ML-DSA-65</td>
              <td align="left">ecdsa-with-SHA512 with secp256r1</td>
              <td align="left">id-sha512</td>
              <td align="left">Composite Signature with ML-DSA-65 and ECDSA using P-256 curve and SHA-512</td>
            </tr>
            <tr>
              <td align="left">MLDSA87-ES512</td>
              <td align="left">ML-DSA-87</td>
              <td align="left">ecdsa-with-SHA512 with secp384r1</td>
              <td align="left">id-sha512</td>
              <td align="left">Composite Signature with ML-DSA-87 and ECDSA using P-384 curve and SHA-512</td>
            </tr>
          </tbody>
        </table>
        <t>Examples can be found in <xref target="appdx"/>.</t>
      </section>
      <section anchor="cose-algorithms">
        <name>COSE algorithms</name>
        <t>The following table defines a list of algorithms associated with specific PQ/T combinations to be registered in <xref target="IANA.COSE"/>.</t>
        <table anchor="tab-cose-algs">
          <name>COSE Composite Signature Algorithms for ML-DSA</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">COSE Value</th>
              <th align="left">First Algorithm</th>
              <th align="left">Second Algorithm</th>
              <th align="left">Description</th>
              <th align="left"> </th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MLDSA44-ES256</td>
              <td align="left">TBD (request assignment -51)</td>
              <td align="left">ML-DSA-44</td>
              <td align="left">ecdsa-with-SHA256 with secp256r1</td>
              <td align="left">id-sha256</td>
              <td align="left">Composite Signature with ML-DSA-44 and ECDSA using P-256 curve and SHA-256</td>
            </tr>
            <tr>
              <td align="left">MLDSA65-ES512</td>
              <td align="left">TBD (request assignment -52)</td>
              <td align="left">ML-DSA-65</td>
              <td align="left">ecdsa-with-SHA512 with secp256r1</td>
              <td align="left">id-sha512</td>
              <td align="left">Composite Signature with ML-DSA-65 and ECDSA using P-256 curve and SHA-512</td>
            </tr>
            <tr>
              <td align="left">MLDSA87-ES512</td>
              <td align="left">TBD (request assignment -53)</td>
              <td align="left">ML-DSA-87</td>
              <td align="left">ecdsa-with-SHA512 with secp384r1</td>
              <td align="left">id-sha512</td>
              <td align="left">Composite Signature with ML-DSA-87 and ECDSA using P-384 curve and SHA-512</td>
            </tr>
          </tbody>
        </table>
        <t>Examples can be found in <xref target="appdx"/>.</t>
      </section>
    </section>
    <section anchor="sec-composite-sig-key-types">
      <name>Composite Signature Key Types</name>
      <section anchor="jose-key-type">
        <name>JOSE Key Type</name>
        <t>This document requests the registration of the following key type in <xref target="IANA.JOSE"/>, for use in the optional JWS Header parameter "jwk".</t>
        <t>"AKP" stands for "Algorithm Key Pair" and is used in this document, as in <xref target="I-D.draft-ietf-cose-dilithium-03"/>, to express the ML-DSA public and private keys. When this key type is used, the JSON Web Key Parameter "alg" is <bcp14>REQUIRED</bcp14>.</t>
        <table anchor="tab-jose-kty">
          <name>JWK key type for composite algorithm</name>
          <thead>
            <tr>
              <th align="left">kty</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">AKP-EC</td>
              <td align="left">JWK key type for composite signature with ECDSA as the traditional component.</td>
            </tr>
          </tbody>
        </table>
        <t>Examples can be found in <xref target="appdx"/>.</t>
      </section>
      <section anchor="cose-key-type">
        <name>COSE Key type</name>
        <t>This document requests the registration of the following key type in <xref target="IANA.COSE"/>.</t>
        <t>"AKP" stands for "Algorithm Key Pair" and is used in this document, as in <xref target="I-D.draft-ietf-cose-dilithium-03"/>, to express the ML-DSA public and private keys. When this key type is used, the COSE Key Common Parameter "alg" is <bcp14>REQUIRED</bcp14>.</t>
        <table anchor="tab-cose-kty">
          <name>COSE key type for composite algorithm</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">kty</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">AKP-EC2</td>
              <td align="left">TBD</td>
              <td align="left">COSE key type for composite algorithm with ECDSA as the traditional component.</td>
            </tr>
          </tbody>
        </table>
        <t>Examples can be found in <xref target="appdx"/>.</t>
      </section>
    </section>
    <section anchor="sec-composite-params">
      <name>Composite Signature Web Key and Key Type Parameters</name>
      <section anchor="json-web-key-parameters">
        <name>JSON Web Key Parameters</name>
        <t>This document requests IANA to register the entries described in this section and summarised in the following <xref target="tab-cose-key-params"/> to the JSON Web Key Parameters Registry.</t>
        <t>It also requests to add "AKP-EC" as a usable "kty" value for the parameters "crv", "x", "y" and "d".</t>
        <table anchor="tab-jose-key-params">
          <name>JSON AKP-EC Web Key Parameters</name>
          <thead>
            <tr>
              <th align="left">Parameter Name</th>
              <th align="left">Parameter Description</th>
              <th align="left">Used with "kty" Value(s)</th>
              <th align="left">Parameter Information Class</th>
              <th align="left">Change Controller</th>
              <th align="left">Specification Document(s)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">pub</td>
              <td align="left">Public Key</td>
              <td align="left">AKP-EC</td>
              <td align="left">Public</td>
              <td align="left">IETF</td>
              <td align="left">n\a</td>
            </tr>
            <tr>
              <td align="left">priv</td>
              <td align="left">Private Key</td>
              <td align="left">AKP-EC</td>
              <td align="left">Private</td>
              <td align="left">IETF</td>
              <td align="left">n\a</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="cose-key-type-parameters">
        <name>COSE Key Type Parameters</name>
        <t>This document requests IANA to register the entries described in this section and summarised in the following <xref target="tab-cose-key-params"/> to the COSE Key Type Parameters Registry.</t>
        <table anchor="tab-cose-key-params">
          <name>COSE AKP-EC2 Key Parameters</name>
          <thead>
            <tr>
              <th align="left">Key Type</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">crv</td>
              <td align="left">-1</td>
              <td align="left">int / tstr</td>
              <td align="left">EC identifier</td>
            </tr>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">x</td>
              <td align="left">-2</td>
              <td align="left">bstr</td>
              <td align="left">x-coordinate</td>
            </tr>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">y</td>
              <td align="left">-3</td>
              <td align="left">bstr / bool</td>
              <td align="left">y-coordinate</td>
            </tr>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">d</td>
              <td align="left">-4</td>
              <td align="left">bstr</td>
              <td align="left">EC Private key</td>
            </tr>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">pub</td>
              <td align="left">-5</td>
              <td align="left">bstr</td>
              <td align="left">Public Key</td>
            </tr>
            <tr>
              <td align="left">TBD (request assignment 8)</td>
              <td align="left">priv</td>
              <td align="left">-6</td>
              <td align="left">bstr</td>
              <td align="left">Private Key</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC7515"/>, <xref target="RFC7517"/>, <xref target="RFC9053"/> and <xref target="FIPS.204"/> also apply to this document.</t>
      <t>All security issues that are pertinent to any cryptographic application must be addressed by JWS/JWK agents. Protecting the user's private key and employing countermeasures to various attacks constitute a priority.</t>
      <t>For security properties and security issues related to the use of a hybrid signature scheme, the user can refer to <xref target="I-D.draft-ietf-pquip-hybrid-signature-spectrums-00"/>. For more information about hybrid composite signature schemes and the different hybrid combinations that appear in this document, the user can read <xref target="I-D.draft-ietf-lamps-pq-composite-sigs-02"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="jose-algorithms-1">
        <name>JOSE Algorithms</name>
        <t>The following values of the JWS "alg" (algorithm) are requested to be added to the "JSON Web Signature and Encryption Algorithms" registry.
They are represented following the registration template provided in <xref target="RFC7518"/>.</t>
        <section anchor="mldsa44-es256">
          <name>MLDSA44-ES256</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: MLDSA44-ES256</t>
            </li>
            <li>
              <t>Algorithm Description: Composite Signature with ML-DSA-44 and ECDSA using P-256 curve and SHA-256</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TBD</t>
            </li>
          </ul>
        </section>
        <section anchor="mldsa65-es512">
          <name>MLDSA65-ES512</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: MLDSA65-ES512</t>
            </li>
            <li>
              <t>Algorithm Description: Composite Signature with ML-DSA-65 and ECDSA using P-256 curve and SHA-512</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TBD</t>
            </li>
          </ul>
        </section>
        <section anchor="mldsa87-es512">
          <name>MLDSA87-ES512</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: MLDSA87-ES512</t>
            </li>
            <li>
              <t>Algorithm Description: Composite Signature with ML-DSA-87 and ECDSA using P-384 curve and SHA-512</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): alg</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TBD</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="jose-key-types">
        <name>JOSE Key Types</name>
        <t>IANA is requested to add the following entries to the JSON Web Key Types Registry.</t>
        <section anchor="akp-ec">
          <name>AKP-EC</name>
          <ul spacing="normal">
            <li>
              <t>"kty" Parameter Value: AKP-EC</t>
            </li>
            <li>
              <t>Key Type Description: Composite signature algorithm with ECDSA as the traditional component</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="jose-web-key-parameters">
        <name>JOSE Web Key Parameters</name>
        <t>IANA is requested to add the following entries to the JSON Web Key Parameters Registry.</t>
        <section anchor="public-key">
          <name>Public Key</name>
          <ul spacing="normal">
            <li>
              <t>Parameter Name: pub</t>
            </li>
            <li>
              <t>Parameter Description: Public or verification key</t>
            </li>
            <li>
              <t>Used with "kty" Value(s): AKP-EC</t>
            </li>
            <li>
              <t>Parameter Information Class: Public</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
          </ul>
        </section>
        <section anchor="private-key">
          <name>Private Key</name>
          <ul spacing="normal">
            <li>
              <t>Parameter Name: priv</t>
            </li>
            <li>
              <t>Parameter Description: Secret, private or signing key</t>
            </li>
            <li>
              <t>Used with "kty" Value(s): AKP-EC</t>
            </li>
            <li>
              <t>Parameter Information Class: Private</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): n/a</t>
            </li>
          </ul>
        </section>
        <section anchor="others">
          <name>Others</name>
          <t>The key parameters registered in <xref target="IANA.JOSE"/> for use with the kty values "EC" should also be usable with the kty value "AKP-EC" defined in this document.</t>
        </section>
      </section>
      <section anchor="cose-algorithms-1">
        <name>COSE Algorithms</name>
        <t>The following values are requested to be added to the "COSE Algorithms" registry.
They are represented following the registration template provided in <xref target="RFC9053"/>, <xref target="RFC9054"/>.</t>
        <section anchor="mldsa44-es256-1">
          <name>MLDSA44-ES256</name>
          <ul spacing="normal">
            <li>
              <t>Name: MLDSA44-ES256</t>
            </li>
            <li>
              <t>Value: TBD (request assignment -51)</t>
            </li>
            <li>
              <t>Description: Composite Signature with ML-DSA-44 and ECDSA using P-256 curve and SHA-256</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
        <section anchor="mldsa65-es512-1">
          <name>MLDSA65-ES512</name>
          <ul spacing="normal">
            <li>
              <t>Name: MLDSA65-ES512</t>
            </li>
            <li>
              <t>Value: TBD (request assignment -52)</t>
            </li>
            <li>
              <t>Description: Composite Signature with ML-DSA-65 and ECDSA using P-256 curve and SHA-512</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
        <section anchor="mldsa87-es512-1">
          <name>MLDSA87-ES512</name>
          <ul spacing="normal">
            <li>
              <t>Name: MLDSA87-ES512</t>
            </li>
            <li>
              <t>Value: TBD (request assignment -53)</t>
            </li>
            <li>
              <t>Description: Composite Signature with ML-DSA-87 and ECDSA using P-384 curve and SHA-512</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
            <li>
              <t>Recommended: Yes</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose-key-types">
        <name>COSE Key Types</name>
        <section anchor="akp-ec2">
          <name>AKP-EC2</name>
          <ul spacing="normal">
            <li>
              <t>Name: AKP-EC2</t>
            </li>
            <li>
              <t>Value: TBD (request assignment 8)</t>
            </li>
            <li>
              <t>Description: COSE Key Type for Composite Signature Algorithm with ECDSA as the traditional component</t>
            </li>
            <li>
              <t>Capabilities: [kty(8)]</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose-key-type-parameters-1">
        <name>COSE Key Type Parameters</name>
        <section anchor="public-key-1">
          <name>Public Key</name>
          <ul spacing="normal">
            <li>
              <t>Key Type: TBD</t>
            </li>
            <li>
              <t>Name: public_key</t>
            </li>
            <li>
              <t>Label: -1</t>
            </li>
            <li>
              <t>CBOR Type: bstr</t>
            </li>
            <li>
              <t>Description: Public key</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
          </ul>
        </section>
        <section anchor="private-key-1">
          <name>Private Key</name>
          <ul spacing="normal">
            <li>
              <t>Key Type: TBD</t>
            </li>
            <li>
              <t>Name: private_key</t>
            </li>
            <li>
              <t>Label: -2</t>
            </li>
            <li>
              <t>CBOR Type: bstr</t>
            </li>
            <li>
              <t>Description: Private key</t>
            </li>
            <li>
              <t>Reference: n/a</t>
            </li>
          </ul>
        </section>
        <section anchor="others-1">
          <name>Others</name>
          <t>The key parameters registered in <xref target="IANA.COSE"/> for use with the kty value "EC2" should also be usable with the kty value "AKP-EC2" defined in this document.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.COSE" target="https://www.iana.org/assignments/cose/cose.xhtml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <reference anchor="I-D.draft-ietf-lamps-pq-composite-sigs-02">
          <front>
            <title>Composite ML-DSA for use in Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document introduces a set of signature schemes that use pairs of
   cryptographic elements such as public keys and signatures to combine
   their security properties.  These schemes effectively mitigate risks
   associated with the adoption of post-quantum cryptography and are
   fully compatible with existing X.509, PKIX, and CMS data structures
   and protocols.  This document defines thirteen specific pairwise
   combinations, namely ML-DSA Composite Schemes, that blend ML-DSA with
   traditional algorithms such as RSA, ECDSA, Ed25519, and Ed448.  These
   combinations are tailored to meet security best practices and
   regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-02"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-hybrid-signature-spectrums-00">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="24" month="May" year="2024"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatiblity, hybrid generality,
   and simultaneous verification.

   Discussion of this work is encouraged to happen on the IETF PQUIP
   mailing list pqc@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dconnolly/draft-ietf-pquip-hybrid-
   signature-spectrums

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-00"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-dilithium-03">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Rafael Misoczki" initials="R." surname="Misoczki">
              <organization>Google</organization>
            </author>
            <author fullname="Michael Osborne" initials="M." surname="Osborne">
              <organization>IBM</organization>
            </author>
            <author fullname="Christine Cloostermans" initials="C." surname="Cloostermans">
              <organization>NXP</organization>
            </author>
            <date day="2" month="June" year="2024"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), which was derived
   from Dilithium, a Post-Quantum Cryptography (PQC) based digital
   signature scheme.

   This document does not define any new cryptography, only
   seralizations of existing cryptographic systems described in
   [FIPS-204].

   Note to RFC Editor: This document should not proceed to AUTH48 until
   NIST completes paramater tuning and selection as a part of the PQC
   (https://csrc.nist.gov/projects/post-quantum-cryptography)
   standardization process.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-03"/>
        </reference>
        <reference anchor="FIPS.204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 458?>

<section anchor="appdx">
      <name>Examples</name>
      <t>Will be added in later versions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vb61bbSLb+76eoY3409EImGMjF03NxgEzoQCCYnKxec3pN
y3JhK5EltUqCuJP0s5xnOU82395VJZVkmUs6OSvND6xLXXbt67d3lTzP63TW
1tY6eZhHciC6Z6+2LsTzxTgLJ2I/maeJCnMpRuE09vMik0pcJpn48XR0KPwY
LXDR7fjjcSav0Jmeb9Gz1q7dTuDncppki4FQ+aTTmSRB7M8x6yTzL3Mvzfyx
jLy3iZJe+qsX2CE8FU6V9+BBRxXjeahUmMT5IkW3o8OLZ0KsCT9SCWYP44lM
Jf7FeXdTdOUkzJMs9CO6ORo+xQ9I7x6dXzzrduJiPpbZoDMBRYNOkMRKxqpQ
A5FnhexgLTsdP5P+QIxkUGRhvuhcJ9m7aZYU6YCX33knF3g0GXSEpx/gd9/8
nr3ap5+TY+9gNKSrkgl0o7nbuZJxgbmFsKP6V74KsjDNxen4rQxy7hXGU+b0
YRxkizTH2tFDL/8NKKLX/6T+eDr3w2ggiH3/CGV+2UuyKZ76WTAbiFmep2qw
tUVt6El4JXu20RY92BpnybWSW9R9i4gK81kxHojXo8PzrfPDs1M8i8AslVeD
yff+PI1kD5LaOh5eHI4uOh2/yGdJxlwRYQyGHvfEGQsWAwhxWUSRlvlxEfjK
fQVK/Dj8zac1DsTzwr+WIb+QemERdehpJfnHjF/TzNVMo54YFXFjGjwRo1nx
2ywp7jSLKmKlm7tzdOIkm6PPFQns/Nl+f3v7ib56tLe9V149Kq8e4+po+HLY
I9UgIQtrYD+OTl/eLGCxTp02utSL9VP8TpclZ4VZx4Bn4LH9bCodwVxfX/dC
P/a1dGEx03gOq1BauvSv936WzyND436Txv2np+e30bj/tWgMiMagorETxpd1
7j95sLdTXu0Sp72DnvYhpNNeBLVUbS6kv9w2/bUIU/zPvRmbpZfLbB7GSZRM
F96DlsF1B9NYWbv2VApmZcWcHNVyJ1qONwkjGFVYzL0HRP6zo7NRr89TOKw/
SSZFJL1jP8/DQHpPfSUn4iCEOfpR5UbEKIc8/GzCAjASGBbTQuWi/6C/y09b
hNF9yYqPoY5ihSkLOOjkshxNsZQvZDDTDBDrL49GF1rKSwKMr6K0GKteHKq8
N02utuiCnmzRyraoZ8+usZdOLjsdz/OEP1Z55gd5p3MxC5VACChI7GIiyfeN
EWDubCA6At1VVYWSFAyM6es4xsFOi1KUuiJKoaqeuJhJ540fIXpBhnNV0ssd
x2EsjbcXcGo5OqFH7v1a+HFezPUIMS2TSdt32oEZiFNaJmWznubVPJxMIon4
DGnlGRQjYP/fIaLCeQoukvB8zJWjExYn9mnNyTTz01kY+FG0EOcyklegQrwy
tFBkhtgzsOX81f6GAIOcZV3PoKlglQ56AhIaswaiFSxwJskMMbBIs2QcSXRQ
RTCjtYQxQjtGvQRVGEwxlyngTkIwSoJ5UCjfzJJcUcswJp5ehjKC4qGljCIE
vzAQmPwKipD5oZKaS7EEDSSxWF675OYzHzyFPaQyCyQcxETkiRibFUBgUx+h
IRe0VKLyGnPQbxCRxwkMz4kdioIHLaUanMYlJmJQV5qbYFIY1ZSh5NG9uOCM
72gBZP+Gx1fXYY5ADX2+zJI5xOyqSjk5rdevaxtUiAmJwVa8hb3JeAouxszK
UraWNz4UYAKBKD9b0EDguWIrEq76Eo82eYDID96R3s3JRqhhHs7Zi9SIcLhD
3bFWFk3rGkpRF3EgsxxkEXnjpMhpwjArae4JUv5CaULeJmgoCiW1FbSzhwzO
X0EauESKnCdBEoEGmcLkKQShg0qigmVHNJOjMgovxgu6vAontPKKlwqCJZ6h
by4i6YOvJAYQ1jRyKEO7byAK5iQSo7y9b8JFfpveES5xP4mvyOsRodTvQLJD
oXvtIQHQBSF0haD6enRBWQD9ipenfH1++Or10fnhAV2Png+Pj8uLjmkxen76
+viguqp67p+enBy+PNCd8VTUHnW6J8Of8Iao6p6eXRydvhwed0nZ8po8yf61
tyJrzVLyD1BW1am4hz5P98/+73+3d8WHD/9lgOenT+bm8fajXdxcw7T1bEkM
j69vwb1Fx09T6Wc0CtwMfE1KKALWA+6qWXIdi5lkPfv+X8SZnwfih3GQbu/+
zTygBdceWp7VHjLPlp8sddZMbHnUMk3JzdrzBqfr9A5/qt1bvjsPf/h7RJro
bT/++986TeO6TKIICZDWugoCsg3UtNUYhAoQDCVpOtROS+rDh/thy0+frInD
4NkMM0nxAPfJ3PgOvHQ6bYoxfCKlu3DZFDRBbaZJ0JpP3hB+doaMcDoz/pNi
OsKJXemg0+kO1WI+l3mGWHvhWFgNPYihNeeuhZD4G0KVqs5BrUPlV2+Oh5u1
0N8WGjcbWKC9DSSTScpJJ+3YpCeGNzYgdENOmkFEgDBIuCGJCETAy9MVR7eZ
/MxlLGOatkaGmJ54Q8ZI0+E/KEOugIxAYDaOtkESXxZU+nD5X3OP7bJQvDJW
GSwvk5cyM6GYXGx7NCadp4oORVxoyxmpv4WPf0ArmM+hMthkFVRD4gOAQZpM
3G9CEHUrihviPabTHq+iBLYTkulc+4sq0JJsA+iqwZF6ZihfyHZV4qmsmmkT
mrQgqi+TgpCFIXoF9OEICZ4nJNKcfG4BTYmTnEbAiDDIiZ77LWVuY5g/wRk/
djEKR1MEXc0wDT4aEbTC6zkWj4WbKYgtwI7AVhMS5H4ZaFuleOgD/94oPMrD
AYX8zCQe9cbaJS5pjOth1inj2rD1xRF3qCmSmBdRHnrVvHpQCmqkIy62cmCD
y6yVYI+RoDsAN241AV6DUwhdyr9vpnlimpdQya5i7kNyRcqu/TohxZqTalQr
We5Zy82WePAF11tVbFuVg228HBsZEHSFB1Ty10ICt9tFtYhFI46bIuXqig0H
yTWnnvxCLjTgc2rSozxDbkyXGvqp8t4i8AqlvrP92yCtgQHcBeApS8gkMMT9
CBYaWrDVimtyVJRVxwgpJtYsE+OQYCIRR3LKJ8QkS1IvJHSQIveSDFdwy0X4
La45i0Sje10nU4YAiyqmIWXTjCkmEtkVAIabXFHxm/mFtsTrBrNrzK3epMU4
IgcB2tMsvPLLxUBFpzKWGYddxFFCNDaOEiQ3L4mwS+R7GrbYPGmF/hh5xbR/
ADY5wykGt5RiT+CxaaUxTUpvMzkNFWKCnLTlKFjpL7/84izoTC+IVvyD594Z
2raV4zbFx48tTfqgsmzCw3dA+NJEhl12Jud25VTLbVrmegZ/kt+ekS3lIesm
N+OwyenXhk6wabp/VuKCOQRSKTZ7aykKcPL333/vrKfv/r29KRT+b9CqTo4x
TA8DoP/6Br/ui7+K9febiw1uRncTbsozVk1XioRmIGaYoezte/q3WM1fZdqZ
Oe3thMnunHENgeOk5J0lBj86B8U6KY6mMiO7MgUo4kt3+OLMO9zv6jz8jRzz
XBeLVDI+Nwa8sl+/q43WduqJpwDybBy0saNtqOYtYcl1R+OhsceN2T8eNUTK
/jZksEV16RAI1YxUVp3Fp09ayEb4jhFzN+Bc6392+t54QW5Syslm5fpVcXkZ
BiFpEHCJtXkek7ZfhHyf+gzznKGpgFP3MG5Ju83POI6x6Vqget9jcOnNfDWz
PgE5mfKnNrHWuOkvaFf3HoyTCCSCZQQFsTagGh+LprYIZ8nEDoiZKbzjzgzN
ozlOjZxWFa9b3Vdi5EPVS3eUJY/GqKDIgWXdOstXMO2KYGvVDOgs905ajfzk
OzKoA80x2NDz4ej5+smGeX5IXJPrJ9/BhjE8zKz0AyTkdcUegl7T235l+vZt
X7/ttCkHGq/zoJuCe29o86Vg35SgRszaekwZKQlymZdRZjjaPzqqyn2mRqvf
tc3dBa+7Yr3kOPCr9CncnGFC5Dy4uvKjQho5cVxex9hpj+18g5ZlK+kPd4ss
8ljBQJ5pNQ5jqr2apxtQXM4Y6kpVaEKVDtGHVkXPi4gMBh5AMnzncpvJT2lB
2nLzTPrzkgEcN0Fpw7YmYQbEEC0cveS8gYJLxY1VMWqpRUuEGoUEFDkzq+ik
2ioLok2BVU7JBquv46zqINciC3dFuPrNLOsyfK81oeZSrR8kN6g9ZRH7oGla
JAWXzbU0uHYv+cqv47badODShw+5P/bmkTdRvkezf/qEHF5B7TQpFuLMMikp
hTKaoxzFbK4Oo34U9ehfgx0u00eYRHxEe6/6E/e4Q089vbe7i3f9vYcP8LO9
s92nu93+A7fJwz083H2wQ++2n+zRz87Ogyduk8ePqMnjJw95sCfUZPdhHw87
HwZircEqvfv51y6vQon1MGa9VRvEmTaMjMd6nu6nenZQMaRUPZMTGOYu5WSq
SNMky5WVTAIYMI6aItrU5oV5dfwLkoxsN4l1nKA9GBNpgyobtzsvPTHCyK7O
MSQwuV+skM9nxhQ4UiBFAIzH1D1N+nIN3hQfNVBwvD8PqUH+5+RZF42Se0sa
ypQ3XY2ei4TKh3fQGLiEZaafBs5TJx8C27DOYFbfl4rklYwaJtG+X9ATJwlH
MDBeyWixKWjTuTGSEtveDnOK5wKf2JtAwb0xDN/sNRKtrZ13vb3lzjuPd7lz
Y8dSu2Z9OKqhfTqQsq74pF3aFxG6Ih/BwdfJdpRKgpBRDk9XahbXJGquMzdl
vTLV0VK3J09Yqh/FS2gyDPBZmNW9Np1uSlw3zd5Ges8BqHB5IPV5JJLwLZ7l
no4GMt3d9Q5HkIJwHQ9uZEBegdbtjZ4PqYHmgQxS3GQA74IOXsx83bfN9LlD
NWi1q6RrimceddUFWS4kPB/yk5K0h3sgbQ+eT9Q9Xp00arCCtD32mreRhjHv
QhoPZkl7/GiJNPa0N5AGZb03aRhzmTQM1Eqadeil7Vt3/uOKk4COb2Z3Urny
Q32irCyC6Cor67SfppP3uhq0pvOnb8DG9q2NVUbGpP034cG7WpxjZveK3/ey
Mvv3UVw8PSDg+WshqdpeHrwSkObGN22M4k6L6G9802Z7t0XsbHyLBh40DXzV
Ud8/auCtY9pyiRIf1m4qiFRB2PZo7vUaliunTJjVssDKk9iizFJc3eSF0W5N
qM/VJKkBTT++GdkEscKQ3bfX77pUZh++OOtSVkOHc2iEbuUJiNwzP8y6zP7Q
bOY2UyJd2+Fazm2HDHWNJ6FKDFW3aoCqvXzLu5BmwmrpmhKdT9ZKXlUCrHNk
tLRHBBh3vMsXDRhxrwwFbXXFDC9+fPOioogY11K+d8ocNx8gaQYtotPGrNXz
lNHjzopchqoXZsQvq4ll9PnTa1XJJBj+HKu/TbFMrP1S+tV3HLKJ4LfpwOfo
WtDQtTtN9Ae9pjVVkklZpS7Zu+xL2WVZJ9pq62qlEpNSkmZYqMRcQYsslG1V
Srs/xbl9MZ/7WViqpqv5Tg5JXt5Q+EkfzVvlkaAw2pzoCMOROTRTmRsfoKkK
+VznLhTDxi4k1NUVvbJyn1bDdoPsio59vad/C21V3UmX1bJSW6Og1YOakorX
yuJOPRvjxXW1UetyZM+9o8s+HUAg3Zz58ZTKlHQgOIrQCpDSQFfd8sCIBaN9
yZwNpl0vPgnHOZvHH/UXOR9F/D++7gQnIJYqWFU387jRr+6aS4mXHprkbcZY
FjuZS83tNhT+G1PeVWS62vuxalB6vmP6Cob0gc52mldfK11fBVMfk7rCGkjC
HgNQPNwSOcjGDaQT0qdYtPmU3TaO4H084RF0Hev+78G0JJtQFibv0J0Uy9ux
3bfEOEmIP4v7jTKhUXYrIrCIM2dj7PYBtJl4e9UQbr329u5kMOj/0Onv2k4j
lCzZBquTjWnLhrFWfs5GHsSpO5pjE/ZlsyhJByDMt04U/O3No/KGvsgpK35O
mVMfVUzTaFEepLaWB8UeRpH7qYEqZP1Efx7GZnfRjxfNk0kY1Lq8uT48RS6d
EIk+dwAYvkVgzp/S2Wr6CC3JyWbNThuwR/adqm17EvUScTZZUKMAMZaOXkpf
cckZVFzByGl3wB5R45MT+iMan0ZKMn1ijnaBynWlWcJLMUXG5nrtAUXjD8rT
7PaYaaNcvVkSz1iAz/NR32XcdofvlASdVXlmK9GhE270+ZDVZ7+rCrTZf5mE
l6CEpFV1ciooLNTyMHIDeTZW5E8+43wQe++mTts8sLkVUHlnjvLl/gtlbsub
faSMxmDLM4vQtEpm3RKBVLCrcb6+oqBrYT4UBbQszPDVFphTxWrmBDlpJ2mr
OQRoIKD54tDUxtbqhR/aI6+SgZf8TWS9gfveCSGDL1jNqc3xmneYjxNtvIAp
AwK7aMKyOiKgOy+3Zc/B+DDjB2ogTk2OjcZLQEh/Dow3K+HQQMRbfo2UIcZa
KCijbaW4GXy0w0lbgFrJybLBZ3Py7iWlPzUnbRVsJSfLBp/NybvXtf6cnKwX
tmjjnxxfqOoeinKbOgy1QLYtZ9JFNQdwksA0iCBJ6QylSks4VxnYBt9X4HSF
oNo2Ee+YPP+/CaBibVu6+wV43I7sidEVPiRm1zPIAeHJ2tMaj01XBPArmVWr
A5ZBn1UppiO5G1JNO/gfYiovr4KvrevD69ULBFrNJBCCRWnmyIUph32JReqB
//AqT+mDAee7M6decMPebFlCLs+3UHHIYJIu1SXMFwP28w1ToVhuXlUynEMu
Tbhts+Jb4dDtiKcxztcBNTqpqDKM3dUIpx3XGE9104YXWn09zLPvp/6YKqfw
CgPxL0jr5xs17Vwyhg6kjQrnEq5wzh/LDMRPUq1AJe1Y5NbV9++9+nvhlK+5
ehdJtOOHW1e/c+/V3wtbfJXV18tFyo3UDivsg1uZ8HiZBbVyFLmnG3f37hHH
l/mx/njj5+WF31y7Ww6YtplGSN9XYRNt/q2DBNfKBsLbJjJsvWzA9ZXm+s3Y
ut8yZUvhbMXsulFj+v4dpq+qESvmv2+g2b8t0FCc6d8/0PRvjDRUORz7wTvK
zMu9iw9req+i03lDn6iVMQX9yf8ziFH6hOt/ANyl7taWSgAA

-->

</rfc>
