<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-emu-pqc-eap-tls-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Enhancements to EAP-TLS/TTLS">Post-Quantum Enhancements to EAP-TLS and EAP-TTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-emu-pqc-eap-tls-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="24"/>
    <area>Security</area>
    <workgroup>EAP Method Update</workgroup>
    <keyword>PQC</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <keyword>TLS</keyword>
    <keyword>EAP</keyword>
    <abstract>
      <?line 50?>

<t>This document proposes enhancements to the Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) and EAP Tunneled TLS (EAP-TTLS) to incorporate post-quantum cryptographic mechanisms. It also addresses challenges related to large certificate sizes and long certificate chains, as identified in <xref target="RFC9191"/>, and provides recommendations for integrating PQC algorithms into EAP-TLS and EAP-TTLS deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-emu-pqc-eap-tls/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EAP Method Update Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would break the mathematical assumptions that underpins widely deployed public-key algorithms, rendering them insecure and obsolete. As a result, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms designed to resist attacks from both quantum and classical adversaries. The cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has initially selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA for usage in security protocols.</t>
      <t>To mitigate the risks posed by a CRQC, such as the potential compromise of encrypted data and the forging of digital signatures, existing security protocols must be upgraded to support PQC. These risks include "Harvest Now, Decrypt Later" (HNDL) attack, where adversaries capture encrypted traffic today with the intent to decrypt it once CRQCs become available. Protocols such as EAP-TLS and EAP-TTLS are widely used for network access authentication in Enterprise and Wireless environments. To continue providing long-term confidentiality and authentication guarantees, EAP-TLS and EAP-TTLS must evolve to incorporate post-quantum algorithms.</t>
      <t>However, transitioning these protocols to support PQC introduces practical challenges. <xref target="RFC9191"/> highlights issues related to large certificates and certificate chains in EAP-TLS, which can lead to session failures due to round-trip limitations. PQC certificates and certificate chains tend to be significantly larger than their traditional counterparts, further exacerbating these issues by increasing TLS handshake sizes and the likelihood of session failures. To address these challenges, this draft proposes mitigation strategies that enable the  use of PQC within EAP-TLS and EAP-TTLS, ensuring secure and efficient authentication even in constrained network environments.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality in EAP-TLS</name>
      <t>One of the primary threats to EAP-TLS and EAP-TTLS is the HNDL attack. In this scenario, adversaries can passively capture EAP-TLS handshakes such as those transmitted over the air in Wi-Fi networks and store them for future decryption once CRQCs become available.</t>
      <t>While EAP-TLS 1.3 <xref target="RFC9190"/> provides forward secrecy through ephemeral key exchange and improves privacy by encrypting client identity and reducing exposure of session metadata, these protections rely on the security of the underlying key exchange algorithm. In the presence of a CRQC, traditional key exchange mechanisms (e.g., ECDHE) would no longer provide long-term confidentiality. In such cases, an adversary could mount a HDNL attack by passively recording EAP-TLS handshakes and decrypting the captured traffic once quantum-capable cryptanalysis becomes feasible. This could retroactively expose information that TLS 1.3 is otherwise designed to protect, including:</t>
      <ul spacing="normal">
        <li>
          <t>The identity of the authenticated client.</t>
        </li>
        <li>
          <t>Client credentials used in certificate-based authentication (e.g., usernames, device or organization identifiers).</t>
        </li>
      </ul>
      <t>To preserve the intended privacy guarantees of TLS 1.3 and to protect against HDNL attacks, EAP-TLS and EAP-TTLS deployments that require long-term confidentiality will need to adopt post-quantum key exchange mechanisms, as outlined in Section 4 of <xref target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>These mechanisms ensure that even if handshake data is recorded today, it cannot be decrypted in the future, maintaining the confidentiality and privacy of the TLS session.</t>
      <t>Furthermore, to support hybrid or PQC-only key exchange in bandwidth or latency-constrained EAP deployments, EAP clients and servers should apply the optimizations described in Section 4.1 of <xref target="I-D.ietf-uta-pqc-app"/> to minimize performance overhead.</t>
    </section>
    <section anchor="eaptls-authentication">
      <name>Post-Quantum Authentication in EAP-TLS</name>
      <t>Although a CRQC would primarily impact the confidentiality of recorded TLS sessions, it could also pose risks to authentication mechanisms that rely on traditional public-key algorithms with long-lived credentials. In particular, if quantum-capable cryptanalysis were to become practical within the validity period of a certificate, an adversary could recover the private key corresponding to a traditionally signed certificate and subsequently impersonate the certificate holder in real time. The feasibility and impact of such attacks depend on several factors, including certificate lifetimes and key management practices.</t>
      <t>EAP-TLS and EAP-TTLS deployments rely on X.509 certificates issued by CAs, and the transition to PQ certificate authentication is constrained by the long lifecycle associated with distributing, deploying, and validating new trust anchors. If CRQCs arrive sooner than anticipated, deployed authentication systems may lack the agility to transition credentials and trust anchors in a timely manner.</t>
      <t>As a result, deployments that rely on long-lived certificates or that require resistance to future quantum-capable adversaries face an increased risk of authentication compromise. In such scenarios, an on-path attacker that is able to recover a server’s private key within the certificate validity period could impersonate access points (APs) in real time, potentially deceiving users into revealing credentials or connecting to rogue networks.</t>
      <t>To mitigate these risks, EAP-TLS and EAP-TTLS deployments will need to adopt, over time, either PQ or PQ/T hybrid certificate-based authentication, as described in <xref section="5" sectionFormat="of" target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>The use of PQ or PQ/T hybrid certificates increases the size of individual certificates, certificate chains, and signatures, resulting in significantly larger handshake messages. These larger payloads can lead to packet fragmentation, retransmissions, and handshake delays, issues that are particularly disruptive in constrained or lossy network environments.</t>
      <t>To address these impacts, EAP-TLS and EAP-TTLS deployments can apply certificate chain optimization techniques outlined in Section 6.1 of <xref target="I-D.ietf-uta-pqc-app"/> to reduce transmission overhead and improve handshake reliability.</t>
    </section>
    <section anchor="ext-extn">
      <name>EST Integration</name>
      <t>The EAP-client is expected to validate the certificate presented by the EAP-server using a trust anchor that is provisioned out-of-band prior to authentication (e.g., using EST). The Intermediate certificates are provided by the EAP server during the EAP-TLS handshake. The EAP client relies solely on the pre-provisioned trust anchor to build and validate the certificate chain. This model assumes a managed deployment environment with explicitly configured trust relationships between the EAP-client and EAP-server.</t>
      <t>To further reduce handshake overhead, particularly in deployments using large certificate chains due to post-quantum (PQ) or composite certificates, this draft proposes an optimization that leverages the Enrollment over Secure Transport (EST) protocol <xref target="RFC7030"/>, extended by <xref target="RFC8295"/>. Specifically, it allows intermediate certificates to be retrieved in advance by using EST, thereby avoiding the need to transmit them during each EAP-TLS exchange.</t>
      <t>This section defines extensions to EST to support retrieval of the certificate chain used by a EAP server and EAP clients. The first extension enables clients to obtain access to the complete set of published intermediate certificates of the EAP server.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapservercertchain
]]></artwork>
      <t>The '/eapservercertchain' is intended for informational retrieval only and does not require client authentication. It allows clients to retrieve the intermediate certificate chain that the EAP server presents during TLS handshakes. This request is performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same certificate chain EAP server uses in a EAP-TLS or EAP-TTLS session.</t>
      <t>The second extension enables EAP servers to obtain access to the complete set of published intermediate certificates of the EAP clients. Rather than relying on static configuration, the EAP server can dynamically fetch the client's intermediate certificate chain from a trusted EST server within the same administrative domain.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapclientcertchain
]]></artwork>
      <t>The '/eapclientcertchain' is intended for informational retrieval only and does not require client authentication. It allows EAP server to retrieve the intermediate certificate chain that the EAP clients present during TLS handshakes. This request is performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same certificate chain EAP clients use in the EAP-TLS or EAP-TTLS session.</t>
      <t>EAP servers and clients are <bcp14>RECOMMENDED</bcp14> to cache retrieved certificate chains to reduce latency and network overhead. However, they <bcp14>SHOULD</bcp14> implement mechanisms to detect changes or expiration. These include periodic re-fetching, honoring HTTP cache control headers (e.g., Cache-Control, ETag), and verifying the validity period of intermediate certificates.</t>
      <t>As an alternative, a device <bcp14>MAY</bcp14> attempt to retrieve the certificate chain from the EST server (e.g., /eapservercertchain or /eapclientcertchain) only when certificate validation fails during an EAP-TLS or EAP-TTLS handshake. While this on-demand retrieval can serve as a fallback to recover from outdated intermediate certificate, it has the drawback of delaying authentication.</t>
      <t>After retrieving intermediate certificates via EST, a EAP client that believes it has a complete set of intermediate certificates to authenticate the EAP server sends the tls_flags extension as defined in <xref target="I-D.kampanakis-tls-scas-latest"/> with the 0xTBD1 flag set to 1 in its ClientHello message. Similarly, a EAP server that believes it has a complete set of intermediate certificates to authenticate the EAP client sends the same tls_flags extension with 0xTBD1 set to 1 in its CertificateRequest message. In both cases, only the end-entity certificates will be provided by the EAP client and server during the TLS handshake, relying on the recipient to possess or retrieve the necessary intermediate certificates for certificate chain validation.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-uta-pqc-app"/> and <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account for both EAP-TLS and EAP-TTLS deployments.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not request the creation of a new IANA registry nor the registration of the two URI path components defined in <xref target="ext-extn"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-pqc-app">
          <front>
            <title>Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="18" month="September" year="2025"/>
            <abstract>
              <t>   Post-quantum cryptography presents new challenges for device
   manufacturers, application developers, and service providers.  This
   document highlights the unique characteristics of applications and
   offers best practices for implementing quantum-ready usage profiles
   in applications that use TLS and key supporting protocols such as
   DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.kampanakis-tls-scas-latest">
          <front>
            <title>Suppressing CA Certificates in TLS 1.3</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="5" month="January" year="2023"/>
            <abstract>
              <t>   A TLS client or server that has access to the complete set of
   published intermediate certificates can inform its peer to avoid
   sending certificate authority certificates, thus reducing the size of
   the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
