<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-emu-pqc-eap-tls-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="PQC Enhancements to EAP-TLS/TTLS">Post-Quantum Enhancements to EAP-TLS and EAP-TTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-emu-pqc-eap-tls-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="22"/>
    <area>Security</area>
    <workgroup>EAP Method Update</workgroup>
    <keyword>PQC</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <keyword>TLS</keyword>
    <keyword>EAP</keyword>
    <abstract>
      <?line 50?>

<t>This document proposes enhancements to the Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) and EAP Tunneled TLS (EAP-TTLS) to incorporate post-quantum cryptographic mechanisms. It also addresses challenges related to large certificate sizes and long certificate chains, as identified in RFC9191, and provides recommendations for integrating PQC algorithms into EAP-TLS and EAP-TTLS deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-emu-pqc-eap-tls/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EAP Method Update Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would break the mathematical assumptions that underpins widely deployed public-key algorithms, rendering them insecure and obsolete. As a result, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms designed to resist attacks from both quantum and classical adversaries. The cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has initially selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA for usage in security protocols.</t>
      <t>To mitigate the risks posed by a CRQC, such as the potential compromise of encrypted data and the forging of digital signatures, existing security protocols must be upgraded to support PQC. These risks include "Harvest Now, Decrypt Later" (HNDL) attack, where adversaries capture encrypted traffic today with the intent to decrypt it once CRQCs become available. Protocols such as EAP-TLS and EAP-TTLS are widely used for network access authentication in Enterprise and Wireless environments. To continue providing long-term confidentiality and authentication guarantees, EAP-TLS and EAP-TTLS must evolve to incorporate post-quantum algorithms.</t>
      <t>However, transitioning these protocols to support PQC introduces practical challenges. <xref target="RFC9191"/> highlights issues related to large certificates and certificate chains in EAP-TLS, which can lead to session failures due to round-trip limitations. PQC certificates and certificate chains tend to be significantly larger than their traditional counterparts, further exacerbating these issues by increasing TLS handshake sizes and the likelihood of session failures. To address these challenges, this draft proposes mitigation strategies that enable the  use of PQC within EAP-TLS and EAP-TTLS, ensuring secure and efficient authentication even in constrained network environments.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality in EAP-TLS</name>
      <t>One of the primary threats to EAP-TLS and EAP-TTLS is the HNDL attack. In this scenario, adversaries can passively capture EAP-TLS handshakes such as those transmitted over the air in Wi-Fi networks and store them for future decryption once CRQCs become available.</t>
      <t>While EAP-TLS 1.3 <xref target="RFC9190"/> was designed to provide strong forward secrecy and protect user privacy by encrypting client identity and reducing exposure of session metadata, HNDL attacks effectively nullify these protections. If the handshake is not quantum-resistant, a future CRQC could retroactively decrypt session traffic, revealing:</t>
      <ul spacing="normal">
        <li>
          <t>The identity of the authenticated client.</t>
        </li>
        <li>
          <t>Client credentials used in certificate-based authentication (e.g., usernames, device or organization identifiers).</t>
        </li>
      </ul>
      <t>To preserve the intended privacy guarantees of TLS 1.3 and protect against HNDL, EAP-TLS and EAP-TTLS deployments <bcp14>MUST</bcp14> adopt post-quantum key exchange mechanisms, as outlined in Section 4 of <xref target="I-D.reddy-uta-pqc-app"/>. These mechanisms ensure that even if handshake data is recorded today, it cannot be decrypted in the future, maintaining the confidentiality and privacy of the TLS session.</t>
      <t>Furthermore, to support hybrid or PQC-only key exchange in bandwidth or latency-constrained EAP deployments, EAP clients and servers should apply the optimizations described in Section 4.1 of <xref target="I-D.reddy-uta-pqc-app"/> to minimize performance overhead.</t>
    </section>
    <section anchor="eaptls-authentication">
      <name>Post-Quantum Authentication in EAP-TLS</name>
      <t>Although CRQCs could eventually decrypt recorded TLS sessions to recover derived keys and access confidential data, they cannot retroactively compromise client or server authentication if the attacker did not possess the corresponding private key at the time of the handshake. However, EAP-TLS and EAP-TTLS deployments rely on X.509 certificates issued by certificate authorities (CAs), and the transition to post-quantum (PQ) authentication is constrained by the long lifecycle involved to distribute, deploy, and validate new trust anchors. If CRQCs arrive sooner than anticipated, authentication systems may lack the agility to adapt in time.</t>
      <t>This makes PQC authentication a critical requirement for EAP-TLS and EAP-TTLS deployments deployments. An on-path attacker equipped with a CRQC could compute a server’s private key before the certificate expires, enabling real-time impersonation of access points (APs). This could deceive users into revealing credentials or connecting to rogue networks, leading to privacy violations and potential client credential theft.</t>
      <t>To mitigate these risks, EAP-TLS and EAP-TTLS deployments <bcp14>MUST</bcp14> adopt either pure PQ or PQ/T certificate-based authentication, as described in <xref section="5" sectionFormat="of" target="I-D.reddy-uta-pqc-app"/>.</t>
      <t>A composite certificate contains both a traditional public key algorithm (e.g., ECDSA) and a post-quantum algorithm (e.g., ML-DSA) within a single X.509 certificate. This design enables both algorithms to be used in parallel, the traditional component ensures compatibility with existing infrastructure, while the post-quantum component introduces resistance against future quantum attacks. This approach facilitates early adoption of PQC without requiring immediate disruption to established PKI deployments.</t>
      <t>The use of post-quantum or hybrid certificates increases the size of individual certificates, certificate chains, and signatures, resulting in significantly larger handshake messages. These larger payloads can lead to packet fragmentation, retransmissions, and handshake delays, issues that are particularly disruptive in constrained or lossy network environments.</t>
      <t>To address these impacts, EAP-TLS and EAP-TTLS deployments can apply certificate chain optimization techniques outlined in Section 6.1 of <xref target="I-D.reddy-uta-pqc-app"/> to reduce transmission overhead and improve handshake reliability.</t>
    </section>
    <section anchor="ext-extn">
      <name>EST Integration</name>
      <t>The EAP-client is expected to validate the certificate presented by the EAP-server using a trust anchor that is provisioned out-of-band prior to authentication (e.g., using EST). The Intermediate certificates are provided by the EAP server during the EAP-TLS handshake. The EAP client relies solely on the pre-provisioned trust anchor to build and validate the certificate chain. This model assumes a managed deployment environment with explicitly configured trust relationships between the EAP-client and EAP-server.</t>
      <t>To further reduce handshake overhead, particularly in deployments using large certificate chains due to post-quantum (PQ) or composite certificates, this draft proposes an optimization that leverages the Enrollment over Secure Transport (EST) protocol <xref target="RFC7030"/>, extended by <xref target="RFC8295"/>. Specifically, it allows intermediate certificates to be retrieved in advance by using EST, thereby avoiding the need to transmit them during each EAP-TLS exchange.</t>
      <t>This section defines extensions to EST to support retrieval of the certificate chain used by a EAP server and EAP clients. The first extension enables clients to obtain access to the complete set of published intermediate certificates of the EAP server.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapservercertchain
]]></artwork>
      <t>The '/eapservercertchain' is intended for informational retrieval only and does not require client authentication. It allows clients to retrieve the intermediate certificate chain that the EAP server presents during TLS handshakes. This request is performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same certificate chain EAP server uses in a EAP-TLS or EAP-TTLS session.</t>
      <t>The second extension enables EAP servers to obtain access to the complete set of published intermediate certificates of the EAP clients. Rather than relying on static configuration, the EAP server can dynamically fetch the client's intermediate certificate chain from a trusted EST server within the same administrative domain.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapclientcertchain
]]></artwork>
      <t>The '/eapclientcertchain' is intended for informational retrieval only and does not require client authentication. It allows EAP server to retrieve the intermediate certificate chain that the EAP clients present during TLS handshakes. This request is performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same certificate chain EAP clients use in the EAP-TLS or EAP-TTLS session.</t>
      <t>EAP servers and clients are <bcp14>RECOMMENDED</bcp14> to cache retrieved certificate chains to reduce latency and network overhead. However, they <bcp14>SHOULD</bcp14> implement mechanisms to detect changes or expiration. These include periodic re-fetching, honoring HTTP cache control headers (e.g., Cache-Control, ETag), and verifying the validity period of intermediate certificates.</t>
      <t>As an alternative, a device <bcp14>MAY</bcp14> attempt to retrieve the certificate chain from the EST server (e.g., /eapservercertchain or /eapclientcertchain) only when certificate validation fails during an EAP-TLS or EAP-TTLS handshake. While this on-demand retrieval can serve as a fallback to recover from outdated intermediate certificate, it has the drawback of delaying authentication.</t>
      <t>After retrieving intermediate certificates via EST, a EAP client that believes it has a complete set of intermediate certificates to authenticate the EAP server sends the tls_flags extension as defined in <xref target="I-D.kampanakis-tls-scas-latest"/> with the 0xTBD1 flag set to 1 in its ClientHello message. Similarly, a EAP server that believes it has a complete set of intermediate certificates to authenticate the EAP client sends the same tls_flags extension with 0xTBD1 set to 1 in its CertificateRequest message. In both cases, only the end-entity certificates will be provided by the EAP client and server during the TLS handshake, relying on the recipient to possess or retrieve the necessary intermediate certificates for certificate chain validation.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.reddy-uta-pqc-app"/> and <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account for both EAP-TLS and EAP-TTLS deployments.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.reddy-uta-pqc-app">
          <front>
            <title>Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="2" month="July" year="2025"/>
            <abstract>
              <t>   Post-quantum cryptography presents new challenges for applications,
   end users, and system administrators.  This document highlights the
   unique characteristics of applications and offers best practices for
   implementing quantum-ready usage profiles in applications that use
   TLS and key supporting protocols such as DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-08"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="1" month="July" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-13"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.kampanakis-tls-scas-latest">
          <front>
            <title>Suppressing CA Certificates in TLS 1.3</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="5" month="January" year="2023"/>
            <abstract>
              <t>   A TLS client or server that has access to the complete set of
   published intermediate certificates can inform its peer to avoid
   sending certificate authority certificates, thus reducing the size of
   the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
