<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="PQ/T Hybrid KEM: HPKE with JOSE/COSE">PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-04"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="December" day="02"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <abstract>
      <?line 63?>

<t>This document outlines the construction of a PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE. It specifies the utilization of both traditional and Post-Quantum Cryptography (PQC) algorithms, referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve, will fall to quantum cryptalanysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <t>HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. The specifications for the use of HPKE with JOSE and COSE are described in <xref target="I-D.rha-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support PQ/T Hybrid KEM as defined in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This specification defines PQ/T Hybrid KEM in HPKE for use with JOSE and COSE.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. X-Wing <xref target="I-D.connolly-cfrg-xwing-kem"/> uses a multi-algorithm scheme,
where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. X-Wing uses the final version of ML-KEM-768 and X25519. The Combiner function defined in Section 5.3 of <xref target="I-D.connolly-cfrg-xwing-kem"/> combines the output of a post-quantum KEM and a traditional KEM to generate a single shared secret.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a number of PQ/T Hybrid KEMs for use with HPKE. A ciphersuite is thereby a combination of several algorithm configurations:</t>
      <ul spacing="normal">
        <li>
          <t>KEM algorithm (PQ KEM + Traditional Algorithm,  for example, MLKEM768 + X25519 defined as "X-Wing" in <xref target="I-D.connolly-cfrg-xwing-kem"/>)</t>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The "KEM", "KDF", and "AEAD" values are conceptually taken from the HPKE IANA registry <xref target="HPKE-IANA"/>. Hence, JOSE and COSE cannot use an algorithm combination that is not already available with HPKE.</t>
      <t>For readability the algorithm ciphersuites labels are built according to the following scheme:</t>
      <artwork><![CDATA[
   HPKE-<KEM>-<KDF>-<AEAD>
]]></artwork>
      <t>The HPKE PQ/T hybrid ciphersuites for JOSE and COSE are defined in <xref target="IANA"/>. Note that the PQ/T Hybrid KEM in HPKE is not an authenticated KEM. The HPKE Base mode can only be supported with the PQ/T Hybrid KEM.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="I-D.connolly-cfrg-xwing-kem"/> are to be taken into account.</t>
      <t>The shared secrets computed in the hybrid key exchange should be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security. ML-KEM has such security properties.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
        <section anchor="jose-algorithms-registry">
          <name>JOSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-XWING-SHA256-AES256GCM</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the XWING Hybrid 
KEM, the HKDF-SHA256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-XWING-SHA256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the XWING Hybrid<br/>
KEM, the HKDF-SHA256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
          </ul>
        </section>
        <section anchor="json-web-key-elliptic-curves-registrations">
          <name>JSON Web Key Elliptic Curves Registrations</name>
          <ul spacing="normal">
            <li>
              <t>Curve name: X-Wing</t>
            </li>
            <li>
              <t>Curve description: X-Wing key pairs</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: TBD</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: This Document</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: HPKE-Base-XWING-SHA256-AES256GCM</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the XWING Hybrid KEM, the<br/>
HKDF-SHA256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: HPKE-Base-XWING-SHA256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the XWING Hybrid    <br/>
KEM, the HKDF-SHA256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
          </ul>
        </section>
        <section anchor="cose-elliptic-curves-registrations">
          <name>COSE Elliptic Curves Registrations</name>
          <t>This document requests IANA to register the following value in the "COSE Elliptic Curves" registry.</t>
          <ul spacing="normal">
            <li>
              <t>Name: X-Wing</t>
            </li>
            <li>
              <t>Value: TBD</t>
            </li>
            <li>
              <t>Key type: OKP</t>
            </li>
            <li>
              <t>Description: X-Wing</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Recommended: TBD</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara and Orie Steele for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.rha-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="31" month="March" year="2024"/>
            <abstract>
              <t>   This specification defines Hybrid Public Key Encryption (HPKE) for
   use with JSON Object Signing and Encryption (JOSE).  HPKE offers a
   variant of public key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in JOSE is provided by JOSE-native security mechanisms or by one
   of the authenticated variants of HPKE.

   This document defines the use of the HPKE with JOSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rha-jose-hpke-encrypt-07"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="12" month="July" year="2024"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by one
   of the authenticated variants of HPKE.

   This document defines the use of the HPKE with COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-09"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
