<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-ikev2-pqc-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Signature Authentication in IKEv2 using PQC">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-ikev2-pqc-auth-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="16"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 79?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It introduces ML-DSA and SLH-DSA capability to IKEv2 without necessitating any alterations to existing IKE operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 85?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> are quantum-resistant digital signature schemes standardized by the US National Institute of Standards and Technology (NIST) PQC project. This document specifies the use of the ML-DSA and SLH-DSA algorithms in IKEv2.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
      <t>ML-DSA offers both deterministic and randomized signing. By default ML-DSA signatures are non-deterministic, the private random seed rho' is pseudorandomly derived from the signer’s private key, the message, and a 256-bit string, rnd - where rnd should be generated by an approved Random Bit Generator (RBG). In the deterministic version, rnd is instead a 256-bit constant string. In the context of signature-based authentication in IKEv2, the composition of the data used for generating a digital signature is unique for each IKEv2 session. This uniqueness arises because the data used for signature creation includes session-specific information such as nonces, cryptographic parameters, and identifiers. If ML-DSA is used as an authentication method within the IKEv2 protocol, the deterministic version of ML-DSA <bcp14>MUST</bcp14> be used.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>. The "Digital Signature" authentication method, as defined in <xref target="RFC7427"/>, supersedes previously defined signature authentication methods. In this case, the three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. <xref target="RFC7427"/> defines the  SIGNATURE_HASH_ALGORITHMS notification where each side of the IKE negotiation lists its supported hash algorithms. However, in the case of ML-DSA, it internally incorporates the necessary hash operation as part of its signing algorithm. ML-DSA directly takes the original message, applies a hash function to it internally, and then uses the resulting hash value for the signature generation process. In order to signal within IKE that no pre-hashing needs to be done with ML-DSA, the "Identity" (5) value defined in <xref target="RFC8420"/> <bcp14>MUST</bcp14> be set in the SIGNATURE_HASH_ALGORITHMS notification to indicate that pre-hashing is not required.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm and allows for the use of either SHA-256 <xref target="FIPS180"/> or SHAKE256 <xref target="FIPS202"/> as the hash function. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate and verify signatures.
On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
      <t>SLH-DSA offers both deterministic and randomized signing, depending on whether opt_rand is set to a fixed value or a random value. If opt_rand is set to a public seed (an element in the public key), then signing will be deterministic — signing the same message twice will result in the same signature. If SLH-DSA is used as an authentication method within the IKEv2 protocol, the deterministic version of SLH-DSA <bcp14>MUST</bcp14> be used.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>. The "Digital Signature" authentication method, as defined in <xref target="RFC7427"/>, supersedes previously defined signature authentication methods. In this case, the different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-cms-sphincs-plus"/>. In case of SLH-DSA, it internally performs randomized message compression using a keyed hash function that can process arbitrary length messages. In order to signal within IKE that no pre-hashing needs to be done with SLH-DSA, the "Identity" (5) value defined in <xref target="RFC8420"/> <bcp14>MUST</bcp14> be set in the SIGNATURE_HASH_ALGORITHMS notification to indicate that pre-hashing is not required.</t>
    </section>
    <section anchor="mechanisms-for-signaling-supported-key-pair-types">
      <name>Mechanisms for Signaling Supported Key Pair Types</name>
      <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they possess:</t>
      <ul spacing="normal">
        <li>
          <t>One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the
initiator.  For example, the initiator could indicate in the
Certificate Request payload that it trusts a certificate authority
certificate signed by an ML-DSA or SLH-DSA key. This indication implies 
that the initiator can process ML-DSA or SLH-DSA signatures, which means 
that the responder can use ML-DSA or SLH-DSA keys when authenticating.</t>
        </li>
        <li>
          <t>Another method is to leverage <xref target="I-D.draft-ipsecme-ikev2-auth-announce"/> that
allows peers to announce their supported authentication methods. It improves
interoperability when IKEv2 partners are configured with multiple
credentials of different type to authenticate each other. The responder includes 
a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message 
containing the PQC digital signature scheme(s) it supports. The initiator includes 
the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or 
in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature 
scheme(s) supported by the initiator, ordered by preference.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-DSA and SLH-DSA are modeled under existentially unforgeable digital signatures with respect to an adaptive chosen message attack (EUF-CMA).</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-SHAKE, and SLH-DSA-256{S,F}-SHAKE are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-cms-sphincs-plus"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TODO</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204.ipd">
          <front>
            <title>FIPS 204 (Initial Public Draft): Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://doi.org/10.6028/NIST.FIPS.205.ipd">
          <front>
            <title>FIPS 205 (Initial Public Draft): Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-IKEv2" target="http://www.iana.org/assignments/ikev2-parameters">
          <front>
            <title>IKEv2 Parameters</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="22" month="February" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="5" month="February" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using the Module-Lattice-Based Digital
   Signatures (ML-DSA) in Internet X.509 certificates and certificate
   revocation lists.  The conventions for the associated signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-03"/>
        </reference>
        <reference anchor="I-D.draft-ipsecme-ikev2-auth-announce">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-lamps-cms-sphincs-plus">
          <front>
            <title>Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="7" month="May" year="2024"/>
            <abstract>
              <t>   SLH-DSA is a stateless hash-based signature scheme.  This document
   specifies the conventions for using the SLH-DSA signature algorithm
   with the Cryptographic Message Syntax (CMS).  In addition, the
   algorithm identifier and public key syntax are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cms-sphincs-plus-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+Vb644jN3b+X0/ByD/SvVCpp+WZ8Uxns2tNt9otuG9uaWwY
xmRAVVESt0tV5WKVZK0xgB8ifwLkR54lj+InyXcOyarSpe2ZRQwEyMJ2SxR5
eHgu37mQG4ZhUOoyUWeiM9bzVJZVocSgKhcqLXUkS52lQqcC38UoLVWRqlJ8
rTZi+FO0kOlciW9VYWhSXxyNvh6u+seiMjqdi/tvzjuBnE4Ltfod2rysvQo/
qXlWbM6EKeMgiLMolUtwGBdyVoaFiuNNqHOjoqUK9aNa9cP8xyiUIByYarrU
hhgqNzmWjIaTyyCtllNVnAUx6J4FUZYalZrKnImyqFQA9j4PZKEksamiqtDl
phOss+JxXmRVjlG3Vyd4VBuMx2eBCIlT+sPM04cLPdelTER9Uhq8uQ4vxgP6
NL6+4o/BSqUVuBBij7oQlufOd9ibhPEVzaDxpdRJM/NLrcpZLyvm9JMsogV+
WpRlbs5OTmgmDemV6vlpJzRwMi2ytVEnTOOkEwSBKWUav5dJlmLPjTJBrs/E
D2UWdYXJirJQM4NPm6X7UBY6KrsiypZLqA8jUMtS5jkYfRcEJPysIMGAJyFm
VZJYnU10US1losxaFuKBVMcTwJZM9d/ZBs7EbfaoJY9HEP6ZeAPLAmMkQ/yv
UHOe9bUsIFn56GZmVVqSjYzS2C1WTk6PWRqXuvhyTt974Lizz9e34KnYiPFy
Y5JsdYCn4fW3o3F4f/12vL3dQwXzkqm4VLEqeO7W3mYl0y9VstKmV1QH9h1H
WVmKy6RaFKo4sO25NlEmxhtTqqXZpjyzi76MaIo9VpBmxRIrV7CoQKez5psQ
l6P7cf/Z8zMmIryT06jAMLw11aWGwd5X00RH4oKc6/hM3GRxlajwWpbwURW+
kUbF+8YtxmQ9sog7jrws5qo8E94O40yz6Z0+67181n91cjsaT3q0dw9793Qe
22XskWImE6Nqjl8c5vjFkxyDlVLBwoy4kmbxR3D84rc4Pn31bIdjWtoVjCWK
ear3Fkfjq/Fxl9eJ+7dvBBaHz7sAxXllSpzy9MUT7KWrJK+mppdqU/bm2eqE
PtDICdFqccsUe3k8E0+LuH+Y4atB+HnN6pm4V8WyKtkunVD5LPgZ6F8qzJrC
UO4qsAGLrtKIZprW4bDR1tF6n3y2GeCKv/XoEzTRf/Jk15vq2Wt3rvpg3/Zo
fAq21co8brri11/+81LLMhwv5FIX4jtdLsRgCrhDNBjkeeLCkhFlJpwL8IEv
ZVRmBbDOSaI2KwOKOOR4NDh/+P5+gnM+e93xXOycc71e97SMihqU4akn0tDQ
Ji9p5cmL16cwt9cv6w90Xkdu+7yjwe0g5OhzJnZObQPqvSyAOAjZ5hA/NTup
tOwA1eYpQ/uJi6n1+gP7ByESB/qPkFOEBkgnCGqZhFOWkdyO9KC1yGKDiKVE
VepE/x1z6vD/889/fbg8/6L/+uWHDz0xQboB7ymwXKxcgpHNPikLyYsMsSxL
hKnynBSMaC9jTawAFmIHD6bWYy8IJgttKKxVJAaRVWWiU2XEIluLPDNl+GMl
07JaHliM+JirSM9w1iTZfCSGGnFk84NjNrGPgzEscqkEYCRCHJoqRIg8yTYk
cfOU0NcwdJ/Gsby9eHpiVEILZQGWI1C3HFmG7D7YJZdT6KvckFfY5UQPAhKp
wiKjCSWQsMh0I2RSurjITqR+gvfSb1gnstz/1LPGs9RxnMCaPiO1MgscUIPJ
U4ruIlwesJiugOakQH4m5LxQihVIZzAuoQOj8wzBg4Xiz/4vQpe0sCJJI3by
eoW8COHFLJgG2ec9iPTgcFZ82gUhA85gksoxBhOYZgATeE2pIUedxioHRoII
DMJAsZHlCJsRHYBPjsxKwcaf8JSuWC90tEDyB6aQNcLsZpgPhZdrpdrMAJmY
NI3AQnKkP6roEcMsqS4dM4sgCONTec+1IHsFA5j3fvB2coVj3qUKemI+SCQ0
+yB7JLh9R3BpfG4jNMmTsS2bFzJfbED+3Hp1Aiz+bX9knIjVDC5olUOCc2bs
2UU2Bvtsu+F+2B8kKCWwbCmO2NWeTgxowtj64vAcc3vCGiL0hIIBgQDqluK8
OY/z9gcoF1lfKb5x+HCeLRESoaqj84dvzo/FOquSGJohtSCRhpuH2SyETEMY
y5YYrNxCtmPPtxHZ1GQJkJhZ0ynbtCKQhArwz1RF0lkVEMBUy9x6n5ySh1oz
YYj2XuyQFKniQlG+GNHORYZojs0wBlqt3QuFM2apN8eMjRBF1EyTcQucXSWG
aNa+VmaxhH7TTKC4mGM2ygTQcLa3I05IqAeJ4VQ/Vt4wFgpqYY8uMKoL689A
kyqnIFQ7sHESmRUSQQjgQeqkaTjBFmI3x+mJ+8M/sL0dln+syMRghiANuLXy
B9BI6KLkExiC3rVKEvobJRRMSaiRMwRjI1pb01HbjHAgvdSUuJP8JcFqvVuh
8kRG+DrdUM25y3GMYgAViQ2lgMRReMGFH0riSudcGKt0DicCF4isQfDJsekH
V0i8+8eilF//4h3z6wSPKt5oqkDLfdcXJoJdgoZxjsmZAo5P1vN2LG6lk+EI
4tclBEym5L3Y2sRERYs0S7L5RhxRdnvMsoPd/A047FynjvQudrPwFRuP85AD
wbAlfp+7EE58Ria8IpBkz8OCC4Iu1raxMEJGRd0DIzo3b8eTTtf+Fbd3/Plh
+M3b0cPwgj4jE7++rj8Ebsb46u7t9UXzqVl5fndzM7y9sIsxKraGgs7N4Hv8
Qlx17u4no7vbwXXHumNbDNI6z5TxQhXw05JzigD2HxV6am3szfn9f//X6XPY
2j8h/PZPT19/+OC+vDr94jm+rBEs7G5ZCre3XyHOTQAcULIgKgBOyitI8UBt
OI1BlpUKcnzY6J9+IMm8OxN/nkb56fO/uAE68Nagl9nWIMtsf2RvsRXigaED
29TS3BrfkfQ2v4Pvt757ubcG//xXyi9FePrqr38JdrNPWCHMERWYqYPgEw5e
hovNtNBxSLO1NXrKoS9d9M6rAliojDXq1h5dl/4sVJLPqsTpnoo6+hjrFQB+
B6ca6w9gI5ko15mFO2XOgqAzMJslsoMCMyctrNsKmU1A7qDkgiU0a57YS9hy
gpuFpaJ4MrPVmGEg6Ap2NIU/CmGWAJEsF7FnLn0ALQSwWSMuRlRWrNShWd2P
mgNSCIiSPONg/CQw6HCI8dnAp5+XQwAH9kQjuj4RdwDgMnr0GZcPaHXI+d2I
9FQcpKICXslbuvRwH7QhBj9o5ExtBdjhTxIFiTW4T4F7nUZJFR9CXUACEHbM
ML2h07opTTpI9cBnyySMjfyAGGd/biIX5xL7OzciP6K83cM+KvnxZHA9RukI
uzpu7I9+XCDGpBT/EtceqDOnDJWqWHJ49T8iDuqe6nVtNLE/XQMCUzoEcS+G
RZFBWY4IRd3vhsfHNl+weYfnqmGWTKPNUqfd0lg3LY0O8ILbIgDlGRXz1NRu
ij2OqdvtEbY8yugKiZIGlk7hknJ+QyolpmGKLpH157esXI5rPZKNyahVfyFX
dRphVKtSTY1K8i+4wbTiDVh4ZklxwXm54azfGiztHGVqhgJbU4uCsFCR5MRK
ERSYplh6dGHcciOUNBqUwbYmoyTc69UGQvlzymap2aNZdp+LuvNBRZ6py6A6
v3X3E5QwoLj6nA/6oif85QEpE4Uul4HQnTfn3WRt7ET7mia1gT2BrE0YU66+
0PCdiGhRa6FUxjZHPil5aczGe4qkqgBVcnMim8SfuTXh8+dd//HlCxvK3ddX
XxDAOdJcChhb98bKhh+q9iNeUeA/2ZJzNzJjqLAn3mwomskqKT17OwVfmqXh
Fqmuqxn0ihJ/SxN8g2ixyP6ZNJgbVcWZ/SUh+phLJWORLa3aKHcvfv3lP0xN
BqmYpQtzNZK6CsSwFP0XL8MpgiLZZTrvigKjISUw4Iw+I0mhSg7AOFcptTKs
DxFg5lA6bftgOXwDKl/ZObCeo4c3Xx33fAdhW1SuvWU3cwapZJsburBi6LRs
1XQwXqqfGLXMb7fedN0JsOuWSAh02WqqoaqSTRvEHY47OgdQU7MLo1rjyUrC
7axdGcU3b85C7RyGSkRPcvx2obq9Y0McEdfzzNHAeKqh77CJ+p6DcKnC7ohw
sJuI6v+dsqpuYVoNc8VKzkLxb1S7pm8BUfssfaLb8WQDrfu0Tlvez+nrlP0z
Bv5YEhRpSR6ygJoLWWwOhSYO5FsZuE22v3je/8K3Sjt7BVjnqZ6S3MknG1Jd
6pSCcUVCR/K/0lll2KHs9BZvB3uMzi41ZRBGWbEchJkdUKyVEouVlk26NKqV
JQbj296pyKYUjVy54FDPneKjsbN9YHcyC5xiPPrqdjB5+zB8fzUYX70fXH91
9zCaXN2MYVuOBB3WggEbvaH82Helvx5utRgTGAJ8Gf+69jM4XfDtSStRusrW
FGq7vjNCcmuEY9NzboJymwkOkSGTJ9SxLNveK5kNU66bqyQfn84wBxZ9m63r
cBzrAhIF7bIOm5gx15S0N9BI1yIEz3abmbvo4ZDaZrDre5CpK15sNxJYT5vz
2pVMHGp4YLYG5QHH9mbpVGxMKJZt6OaZSSvdc12SjOw0JNK0BTVNjMuV4yy1
3cJamJwoWZsqNx1x9OLYsbPnDq+e95/BOrzLUqPXKegjbYQkk8ZsdJbRNpea
wKr0jS0Cg63M1vcZdlJbkyxcbusnNG0Vd5lifFCIVG6DQt2qob1dZGhdeJCI
KYZQ84ylTPOpEDyEQt2aMxQlALqWFToMX6IsKfEvnYJJbQF1XBWcPjq9c5PY
q9pT1tutNk5+q5w+9v/t5XNvka7pV/r04yDGWFxs8L8JVc5hdzFpTW4dLVAo
s/4ompN7n/ZfiSk5Uau/2RWnr/sHRoktxOy9Xz46Y9vrMf1+ytYL+PrGhUo+
GOfQR+NjqtFmpNqjy2Mfkcx+McGZT5Jk6ybRdSwpTY1YvhamY/3gLrvfEWEM
fj2sR/vP+u8IdWx91AIJqwbLkg+KSMJoa7ZY/kW147+h8S7l8c5cllyFcVdi
xsW3yaoiUiFnRYVk11XpSheZvb0Uo2wCM1pR9dWzXTnENNdWtgI5yElOdmyr
kC1mwAtsGnmsN99SL1XtvmQrPhdkUYIAPHnrXvHOgkfG0lxgkk+u6YoRoE1O
YhonSG1CfRAdeQeZ6NgBDVjptgv9bdZrz+II41296x3HC58akyx2gVoMZV0x
39dIz/YwZxlZiq3GllNCAdvvbK5qzoLgT37bEN4zDtlUtgcvDw3yzP6BiVtj
r/sHKL7u71OEce7PxKCfWQNpnCkLyXVhjFCXqnVT6TeXKogHm4yjHIACCygZ
sDcT7DdUFyebOtx5LzB8yTqtdIL4VOUgU18yMnZinRMkqal1X1b7AdCO7kIS
zX7A1VU2pWcVT3VT2Ffk9iUIqv8k7onvFppouO4R5SruKsAFCFfFJ/qxriEp
UaWqASWVrq8vG+BrYhassKD3SsDtVMLKorLu3Jtmz7hSNnsw3AMAfJXbzbSW
SBx40oO9oglxWFOp1u0uoa19MsXCae6HOPy6AFnzSbI5+ADAT/jUwrYr7GUv
qcrmiOzrWV6+L6Qt6yiLwJmlmOmfVOxSD9aRq2l5hKuSg8vcjSpXvkdQh7K9
jPpSrb5wPe7aHMxHWVbKdLdC+fWXf69ncNRAnPQBVpRr6us4bVIC53fhWbXE
mNlW7P7Daii/x//TIsre+5Oyt0C3JZg/qIyKlgZVN1QWmTBPKi6gKGd0ZUoT
XLbqlDqitfzEWxaDiK3nXd+aH2344qipLchtSbMuR2xpN1HpHG7pk8H/vUKh
Ps7/5UrhRtHDDW2WNltjU+W+7LguM+m5zL0EQE82uTK7cXvZEHCvh9htp6Q3
zqZrIXKuQyRI1xZfTloNNCTXmrNv+pjRDZDh2M8PSJzDE3IZKsGldjotF81i
pr7zjGUtKYXbeshCr8/cnb7mbD+r5gt6OdCU9uKBHg8gHOZyk2SSAgO8xcYd
Wl7T7wm+FlP2hqK7s3nE3b1aIVaVtP63trKXNfSMo6KSX4pWy0HYZ9EwI6LS
/sFVObZ56LPBonZoiMi/77DccEdsaQtxFogXZov7lrvsU2w/knGtciXTHWK1
zGtUPcia4TvdLQRL5z3S/SC1WW7zRAia8/cJvsltn/FvP+AnWqFMUwT+SMGl
iCVizVUmtW36KT4Hqa3+STgtSW7UmzXWEoBT3Clxb2H4JC4ayaJM+easUPaB
y7wq/K3AkvoYsBlWJEZpL2l7WQ0+W4PO2sy4XhGLxcaZRsh13cYnFeO39/d3
D5PhBb9ten8znFzdXewARhM+348H70e3o4mjZ5rwzSxmdS1O8+nxw1Op4pE5
Jvv1zyQtk41ZbTHJ0PZxbLrq0XNLcxnKyHc8pyBvlVJPG91Ohg83w4vRYDL0
050nbG1g+2tPH43INsdrzMS9IqmP17WxwyEgP8ijt0m2K+OzS3qdpP1rf1Nf
f2w9C8GeyyxWdFvKZYB9+GitBEGxolbIXHH6fuCtG5sYKZJeCbKZCxnLnF4E
+aaEl5lNosXR8O1leH4zOG7uY37z2sbVaE13xb7jau606NKuYP6YGda0rfxP
8Pdz+tAVg+GYqi1Lm75QC8DxDV4ToNYYtTJqyKSpC6iQ+3ncvfwQ/kzVXJfr
rw/ddvlmf+Yfum25Ev3Wb//IIZjl/quP4d3GyifUTrv4K5OPv63jzfan72dW
dZuVa0ltmgfFvqVLNT7b5SB6TLM1LG3OJYAJfj6z/w8nFf9rh59ndz7gKHcX
d0HwP5J97ArgNQAA

-->

</rfc>
