<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQ/T Hybrid KEM: HPKE with JOSE/COSE">PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-09"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="December" day="09"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <abstract>
      <?line 63?>

<t>This document outlines the construction of a PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE. It specifies the utilization of both traditional and Post-Quantum Cryptography (PQC) algorithms, referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve, will fall to quantum cryptanalysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <t>HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. The specifications for the use of HPKE with JOSE and COSE are described in <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support PQ/T Hybrid KEM as defined in <xref target="I-D.ietf-hpke-pq"/>. This specification defines PQ/T Hybrid KEM in HPKE for use with JOSE and COSE.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameter sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. PQ/T algorithms for HPKE <xref target="I-D.ietf-hpke-pq"/> use a multi-algorithm scheme, where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. The C2PRICombiner combiner function defined in Sections 5.1.3 of <xref target="I-D.irtf-cfrg-hybrid-kems"/> combines the output of a post-quantum KEM and a traditional KEM to generate a single shared secret.</t>
    </section>
    <section anchor="alignment-with-jose-hpke-modes">
      <name>Alignment with JOSE HPKE Modes</name>
      <t>The JOSE HPKE specification <xref target="I-D.ietf-jose-hpke-encrypt"/> defines two different HPKE usage modes:</t>
      <ul spacing="normal">
        <li>
          <t>Integrated Encryption Mode – HPKE is used directly to encrypt the plaintext for a recipient.</t>
        </li>
        <li>
          <t>Key Encryption Mode – HPKE is used only to encrypt the Content Encryption Key (CEK), and the CEK is then used to encrypt the payload.</t>
        </li>
      </ul>
      <t>Each mode is associated with a separate JOSE alg identifier. To maintain consistency with the JOSE HPKE specification, this document registers distinct PQ/T Hybrid HPKE algorithms for Integrated Encryption and Key Encryption. The PQ/T Hybrid KEM is the same in both cases, but the JWE-level processing and algorithm identifiers differ.</t>
      <t>This separation ensures that JOSE implementations can correctly determine how the PQ/T Hybrid KEM is used based solely on the alg value, without ambiguity.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a number of PQ/T Hybrid KEMs for use with HPKE. A ciphersuite is thereby a combination of several algorithm configurations:</t>
      <ul spacing="normal">
        <li>
          <t>KEM algorithm (PQ KEM + Traditional Algorithm,  for example, MLKEM768 + X25519 defined as "MLKEM768-X25519" in <xref target="I-D.ietf-hpke-pq"/>)</t>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The "KEM", "KDF", and "AEAD" values are conceptually taken from the HPKE IANA registry <xref target="HPKE-IANA"/>. Hence, JOSE and COSE cannot use an algorithm combination that is not already available with HPKE.</t>
      <t>The HPKE PQ/T hybrid ciphersuites for JOSE and COSE are defined in <xref target="IANA"/>. Note that the PQ/T Hybrid KEM in HPKE is not an authenticated KEM. The HPKE Base mode can only be supported with the PQ/T Hybrid KEM.</t>
    </section>
    <section anchor="akp-key-for-pqt-hybrid-algorithms-in-hpke">
      <name>AKP Key for PQ/T Hybrid Algorithms in HPKE</name>
      <t>This section describes the required parameters for an "AKP" key type, as defined in <xref target="I-D.ietf-cose-dilithium"/>, and its use with the PQ/T Hybrid Algorithms for HPKE, as defined in {#XWING} and {#XWING-KE}. An example JWK is also provided for illustration.</t>
      <section anchor="required-parameters">
        <name>Required Parameters</name>
        <t>A JSON Web Key (JWK) or COSE_Key with a key type ("kty") for use with the PQ/T Hybrid Algorithm for HPKE includes the following parameters:</t>
        <ul spacing="normal">
          <li>
            <t>kty (Key Type)<br/>
The key type parameter <bcp14>MUST</bcp14> be present and set to "AKP".</t>
          </li>
          <li>
            <t>alg (Algorithm)<br/>
The algorithm parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> represent the PQ/T algorithm for HPKE, as defined in {#XWING} or {#XWING-KE}. PQ/T algorithms for HPKE are those registered in the "JSON Web Signature and Encryption Algorithms" and "COSE Algorithms" registries, derived from the KEM identifier in the HPKE IANA registry.</t>
          </li>
          <li>
            <t>pub (Public Key)<br/>
The public key parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the public encapsulation key (pk) as defined in Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
          <li>
            <t>priv (Private Key)<br/>
When representing a private key, the private key parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the private decapsulation key (sk) as defined in Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
        </ul>
        <section anchor="example">
          <name>Example</name>
          <t>The following is an example JWK representation of an "AKP" key for the "MLKEM768-X25519-SHA3256-AES-256-GCM" algorithm:</t>
          <artwork><![CDATA[
{
    "kty"  : "AKP", 
    "alg"  : "HPKE-7", 
    "pub"  : "4iNrNajCSz...tmrrIzQSQQO9lNA", 
    "priv" : "f5wrpOiP...rPpm7yY" 
}
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="I-D.ietf-hpke-pq"/>, <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/> are to be taken into account.</t>
      <t>The shared secrets computed in the hybrid key exchange should be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security.  ML-KEM has such security properties.</t>
      <section anchor="post-quantum-security-for-multiple-recipients">
        <name>Post-Quantum Security for Multiple Recipients</name>
        <t>In HPKE JWE Key Encryption, when encrypting the Content Encryption Key (CEK) for multiple recipients, it is crucial to consider the security requirements of the message to safeguard against "Harvest Now, Decrypt Later" attacks. For messages requiring post-quantum security, all recipients <bcp14>MUST</bcp14> use algorithms supporting post-quantum cryptographic methods, such as PQC KEMs or Hybrid PQ/T KEMs. Using traditional algorithms (e.g., ECDH-ES) for any recipient in these scenarios compromises the overall security of the message.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
        <section anchor="XWING">
          <name>JOSE Algorithms for Integrated Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-7</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-8</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
          </ul>
        </section>
        <section anchor="XWING-KE">
          <name>JOSE Algorithms for Key Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-7-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-8-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: MLKEM768-P256-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-768 + P-256 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: MLKEM768-P256-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-768 + P-256 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: MLKEM768-X25519-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD3</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-768 + X25519 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: MLKEM768-X25519-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD4</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-768 + X25519 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: MLKEM1024-P384-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD5</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-1024 + P-384 Hybrid KEM, the SHA3-256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: MLKEM1024-P384-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD6</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the ML-KEM-1024 + P-384 Hybrid KEM, the SHA3-256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara and Orie Steele for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="15" month="November" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="30" month="November" year="2025"/>
            <abstract>
              <t>   This specification defines how to use Hybrid Public Key Encryption
   (HPKE) with JSON Web Encryption (JWE).  HPKE enables public key
   encryption of arbitrary-sized plaintexts to a recipient's public key,
   and provides security against adaptive chosen ciphertext attacks.
   This specification chooses a specific subset of the HPKE features to
   use with JWE.

   This specification updates RFC 7516 (JWE) to enable use of the
   Integrated Encryption Key Establishment Mode.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-hpke-encrypt-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an Authenticated Encryption with Associated Data (AEAD) algorithm.

   This document defines the use of HPKE with COSE.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-18"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-07"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
