<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-ikev2-pqc-auth-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Signature Authentication in IKEv2 using PQC">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-ikev2-pqc-auth-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="25"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 74?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It introduces ML-DSA and SLH-DSA capability to IKEv2 without necessitating any alterations to existing IKE operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> are quantum-resistant digital signature schemes standardized by the US National Institute of Standards and Technology (NIST) PQC project. This document specifies the use of the ML-DSA and SLH-DSA algorithms in IKEv2.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
      <t>ML-DSA offers both deterministic and randomized signing. By default ML-DSA signatures are non-deterministic, the private random seed rho' is pseudorandomly derived from the signer’s private key, the message, and a 256-bit string, rnd - where rnd should be generated by an approved Random Bit Generator (RBG). In the deterministic version, rnd is instead a 256-bit constant string. In the context of signature-based authentication in IKEv2, the composition of the data used for generating a digital signature is unique for each IKEv2 session. This uniqueness arises because the data used for signature creation includes session-specific information such as nonces, cryptographic parameters, and identifiers. Therefore, if ML-DSA is used as an authentication method within the IKEv2 protocol, the deterministic version of ML-DSA can be utilized.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>. The "Digital Signature" authentication method, as defined in <xref target="RFC7427"/>, supersedes previously defined signature authentication methods. In this case, the three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. <xref target="RFC7427"/> defines the  SIGNATURE_HASH_ALGORITHMS notification where each side of the IKE negotiation lists its supported hash algorithms. However, in the case of ML-DSA, it internally incorporates the necessary hash operation as part of its signing algorithm. ML-DSA directly takes the original message, applies a hash function to it internally, and then uses the resulting hash value for the signature generation process. The data signed to prove the identity of the initiator and responder (as discussed in Section 2.15 of <xref target="RFC7427"/>) typically fits within the memory constraints of the devices involved in the IKEv2 exchange. The data consists of nonces, SPIs, and the initial exchange messages, which are manageable in size. In order to signal within IKE that no pre-hashing needs to be done with ML-DSA, the "Identity" (5) value defined in <xref target="RFC8420"/> <bcp14>MUST</bcp14> be set in the SIGNATURE_HASH_ALGORITHMS notification to indicate that pre-hashing is not required.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm and allows for the use of either SHA-256 <xref target="FIPS180"/> or SHAKE256 <xref target="FIPS202"/> as the hash function. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate and verify signatures.
On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
      <t>SLH-DSA offers both deterministic and randomized signing, depending on whether opt_rand is set to a fixed value or a random value. If opt_rand is set to a public seed (an element in the public key), then signing will be deterministic — signing the same message twice will result in the same signature. In the context of signature-based authentication in IKEv2, the composition of the data used for generating a digital signature is unique for each IKEv2 session. This uniqueness arises because the data used for signature creation includes session-specific information such as nonces, cryptographic parameters, and identifiers. Therefore, if SLH-DSA is used as an authentication method within the IKEv2 protocol, the deterministic version of SLH-DSA can be utilized.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>. The "Digital Signature" authentication method, as defined in <xref target="RFC7427"/>, supersedes previously defined signature authentication methods. In this case, the different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-cms-sphincs-plus"/>. The final version of SLH-DSA <xref target="FIPS205"/> is expected to define two signature modes: pure mode and predigest mode.  This document only specifies the use of predigest mode for signature-based authentication in IKEv2. In case of predigest mode, SLH-DSA internally performs randomized message compression using a keyed hash function that can process arbitrary length messages. The data signed to prove the identity of the initiator and responder (as discussed in Section 2.15 of <xref target="RFC7427"/>) typically fits within the memory constraints of the devices involved in the IKEv2 exchange. The data consists of nonces, SPIs, and the initial exchange messages, which are manageable in size. In order to signal within IKE that no pre-hashing needs to be done with SLH-DSA, the "Identity" (5) value defined in <xref target="RFC8420"/> <bcp14>MUST</bcp14> be set in the SIGNATURE_HASH_ALGORITHMS notification to indicate that pre-hashing is not required.</t>
    </section>
    <section anchor="mechanisms-for-signaling-supported-key-pair-types">
      <name>Mechanisms for Signaling Supported Key Pair Types</name>
      <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they possess:</t>
      <ul spacing="normal">
        <li>
          <t>One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the
initiator.  For example, the initiator could indicate in the
Certificate Request payload that it trusts a certificate authority
certificate signed by an ML-DSA or SLH-DSA key. This indication implies 
that the initiator can process ML-DSA or SLH-DSA signatures, which means 
that the responder can use ML-DSA or SLH-DSA keys when authenticating.</t>
        </li>
        <li>
          <t>Another method is to leverage <xref target="I-D.ietf-ipsecme-ikev2-auth-announce"/> that
allows peers to announce their supported authentication methods. It improves
interoperability when IKEv2 partners are configured with multiple
credentials of different type to authenticate each other. The responder includes 
a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message 
containing the PQC digital signature scheme(s) it supports. The initiator includes 
the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or 
in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature 
scheme(s) supported by the initiator, ordered by preference.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-DSA and SLH-DSA are modeled under existentially unforgeable digital signatures with respect to an adaptive chosen message attack (EUF-CMA).</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-cms-sphincs-plus"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TODO</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204.ipd">
          <front>
            <title>FIPS 204 (Initial Public Draft): Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://doi.org/10.6028/NIST.FIPS.205.ipd">
          <front>
            <title>FIPS 205 (Initial Public Draft): Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="5" month="February" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using the Module-Lattice-Based Digital
   Signatures (ML-DSA) in Internet X.509 certificates and certificate
   revocation lists.  The conventions for the associated signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-03"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-auth-announce">
          <front>
            <title>Announcing Supported Authentication Methods in IKEv2</title>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <date day="18" month="April" year="2024"/>
            <abstract>
              <t>   This specification defines a mechanism that allows the Internet Key
   Exchange version 2 (IKEv2) implementations to indicate the list of
   supported authentication methods to their peers while establishing
   IKEv2 Security Association (SA).  This mechanism improves
   interoperability when IKEv2 partners are configured with multiple
   credentials of different type to authenticate each other.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-auth-announce-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cms-sphincs-plus">
          <front>
            <title>Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="28" month="May" year="2024"/>
            <abstract>
              <t>   SLH-DSA is a stateless hash-based signature scheme.  This document
   specifies the conventions for using the SLH-DSA signature algorithm
   with the Cryptographic Message Syntax (CMS).  In addition, the
   algorithm identifier and public key syntax are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cms-sphincs-plus-05"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1b224bx5Z951fUMA8jHZCUxViOrTlzElqiIsKSpYh0giDw
GMXuIllHfUtXN2mewEA+Yl4GmIf5lvmUfMmsvauqu3lz7AMEM8CcIImoYl12
7Vp77UuVut1uq9BFpM5Fe6zniSzKXIlBWSxUUuhAFjpNhE4EfhejpFB5ogrx
Sq3F8H2wkMlcie9VbqhTXxyNXg2X/WNRGp3Mxf13F+2WnE5ztfyduXlYcxS+
UvM0X58LU4StVpgGiYwhYZjLWdHNVRiuuzozKohVVz+qZb+b/Rx0JSZumXIa
a0MCFesMQ0bDyVUrKeOpys9bIeY9bwVpYlRiSnMuirxULYj3ZUvmSpKYKihz
XazbrVWaP87ztMzQ6tZqtx7VGu3heUt0SVL6wcLTh0s914WMRLVTary96V6O
B/RpfHPNH1tLlZSQQoid2YWwMrd/wNqkjG+pB7XHUkd1z2+0Kma9NJ/TVzIP
FvhqURSZOT85oZ7UpJeq57udUMPJNE9XRp3wHCftVqtlCpmE72SUJlhzrUwr
0+fipyINOsKkeZGrmcGndew+FLkOio4I0jjG8aEFxxLLLIOgb1stUn6ak2Ig
kxCzMorsmU10XsYyUmYlc/FAR8cdIJZM9N8YA+fidfqoJbcHUP65eAlkQTDS
If7J1Zx7vZI5NCsfXc+0TArCyCgJ3WDl9PSYJmGh82/m9HsPErd35foeMuVr
MY7XJkqXe2Qa3nw/Gnfvb96MN5d7KAEvmYgrFaqc+26sbZYy+UZFS216ebln
3XGQFoW4ispFrvI9y15oE6RivDaFis3mzDM76JuAuthttZI0jzFyCUS1dDKr
fxPianQ/7j95es6TCG/k1CrQDGtNdKEB2PtyGulAXJJxHZ+L2zQsI9W9kQVs
VHVfSqPCXXCLMaFH5mHbTS/zuSrOhcdhmGqG3umT3rMn/ecnr0fjSY/W7mHt
ns5CO4wtUsxkZFQl8dl+ic8OSgxRCgWEGXEtzeKPkPjsYxKfPn+yJTEN7Qjm
EsUyVWuLo/H1+LjD48T9m5cCg7tPOyDFeWkK7PL07IB4yTLKyqnpJdoUvXm6
PKEP1HJCczWk5Rl7WTgTh1Xc3y/w9aD7ZSXqubhXeVwWjEunVN4Lvgb7Fwq9
pgDKXQkxgOgyCainaWwOC21srffZe5uBrvi3Hn3CSfQP7uxmXT554fZVbez7
HrVPIbZamsd1R/z2639eaVl0xwsZ61z8oIuFGExBd/AGgyyLnFsyokiFMwHe
8JUMijQH1zlNVLAymBGbHI8GFw8/3k+wzycv2l6KrX2uVquelkFekTIs9UQa
alpnBY08OXtxCri9eFZ9oP266Zr77cJv0/+EnIKZIVyrVYnUnbKIctPRxgoM
HRo4DCXKQkf6b+hTed9ffvn64eriq/6LZx8+9MQE3h7gzTFcLJ1/T2efFQRk
eQpXkkbClFlG+oWzlaEmUWCVobNOU6mx12pNFtqQVynJwYi0LCKdKCMW6Upk
qSm6P5cyKcp4z2C4p0wFeoa9RtH6EynMiCPrno/5hD+NRTDIeXJYcQA3MFUg
6CxK16Rxc0jpK+DMR1Gsb6+enhgVOIUih8gBZrcSWYHsOlglk1OcV7EmUNrh
NB8UJBKFQUaTkSJekMlayKhwbokxrN7DeOg7jBNp5r/qWfDEOgwj1Wp9QcfK
IrA/a00OHXQH3moPYjoCJycFwiMh57lSfIC0B+PiKQg6T8HdrBS/938RuqCB
JWkarovHK4QlYHez4DkIn/eYpCcgD6tPOx9gIBkgqZxggMA0hS1nMi809KiT
UGWgKEwCQBgcbGAlwmI0D2w/Q2CjgPEDltIRq4UOFoi9IBSCNsBuhv448GKl
VFMYEANPTS1ASIboQ+U9Epg11aFtpgEUYXwk7aUWhFcIgH7vBm8m19jmXaJw
TiwHqYR67xWPFLdrCC6KzqyDJH0ytaTzXGaLNaa/sFYdgQo/bo/ME6GawQTt
4ZDiHIy9uAiGgM+mGe563UGESB7DYnHEpnbYL1OHsbXF4QX69oQFIs4J8Tp4
GMctxUW9H2ftDzhcBF2F+M7xw0UawyPhqI4uHr67OBartIxCnAwdC+JYmHk3
nXWh0y7AsqEGq7cu49jLbUQ6NWmkCusIdMKYVkSSOAL8O1WBdKgCA5gyzqz1
ySlZqIUJU7S3YsekiNQWisK1gFbOUzhTLIY2zNVYPVfYY5p4OKYMQuQwM03g
Fti7igzNWdlakYYS55ukArH9HL0RpWMOh70tdUJDPWgMu/q59MBYKBwLW3SO
Vp1bewablBn5oMqAjdPILJdwQiAPOk7qhh1sMHa9nZ643/8F422//kNFEAMM
MTXo1uofRCNxFgXvwBD1rlQU0c8gwimwUgMHBGM9WvOkgyaMsCEda4qbSf+S
aLVaLVdZJAP8Ol1TyrctcYhYHAmBdaWgxFH3kvMuZKSlzjgvVckcRgQp4Flb
rc/2TT+5OP7t3+el/PiztyyvUzySaKMpASx2TV+YALjEHMYZJkcK2D6h581Y
vJZOhyOoXxdQMEHJW7HFxEQFiySN0vlaHFFwecy6A27+Ch52plN5eue7WfmK
weMsZI8zbKjfxy7EE18QhJdEkmx5GHBJ1MWnbSyNEKgoeTeifftmPGl37E/x
+o4/Pwy/ezN6GF7SZwTCNzfVh5brMb6+e3NzWX+qR17c3d4OX1/awWgVG02t
9u3gR3xDUrXv7ieju9eDm7Y1x6YapDWeKfOFymGnBccULeA/yPXUYuzlxf1/
/9fpU2Dtn+B++6enLz58cL88P/3qKX5ZwVnY1dIEZm9/hTrXLfCAQhaOWUCc
FFfQwYO1YTQGUVYiyPCB0T/9RJp5ey7+PA2y06d/cQ204Y1Gr7ONRtbZbsvO
YKvEPU17lqm0udG+pelNeQc/bvzu9d5o/PPXFF+K7unzr//S2o4+gULAEQmQ
qZzgAQMvuov1NNdhl3prC3qKoa+c987KHFyojAV1Y42OC38WKspmZeTOnnIq
+hjqJQh+i6dq9CPZR6dilVq6Uwb5f3tg1jGigxw9Jw2u23CZtUNuI+MBEuox
B9YSNp3gWl2hyJ/MbDJkmAg6gg1N4YeCmyVCJOTC98yld6C5ADdr+MWA0oql
2ter80l9MBUcoiTL2Os/iQza7GJ8NPD5+2UXwI490vCuB/wOCFwGjz7i8g6t
cjm/65EO+UFKKmCVvKQLD3dJG2rwjUbO1IaDHb6XSEgs4D6H7nUSRGW4j3VB
CWDYMdP0mnbrutThIOUDX8RRNzTyA3yc/br2XBxL7K5cq/yI4nZP+0ikx5PB
zRipI3B1XOOPvlzAxyTk/yKXnVeRU4pMVcTsXv2X8IO6p3od603sVzegwIQ2
QdKLYZ6nOCw3CXndH4bHxzZesHGHl6oWlqDRFKndrCis6opCG3zBVQmQMkKk
WFFNuU722KduVicYeRTR5RIpDZBO7pJifkNHSkIDii6Q9fu3olyNq3MkjMmg
kX8hVnUnwqxWJprqhGRfMINpyQuw8kxMfsFZueGo3wKWVg5SNUOCran4S1yo
SHNiqYgKTJ0sPTo3bqURShqNmSG2JlAS7/UqgFD8nDAsNVs06+5LyuGgLArg
keSZKg2q4lt3PUABA5KrL3mjZz3ha/d0mEh0OQ3E2Xk4bwdrY6faF9SpSewR
dG26IcXqCw3bCWguKi0UytjiyGcFLzVsvKVIygqQJdc7skH8uRvTffq04z8+
O7Ou3P36/CsiODc1pwLG5r2hsu6Hsv2AR+T4Xxpz7EYwxhH2xMs1eTNZRoUX
byvhS9KkuzFVx+UMekmBv50TcmPSfJH+M51gZlQZpvabiOZHX0oZ8zS2x0ax
e/7br/9hqmkQitl5AVcjqapAAkvRP3vWncIpEi6TeUfkaO1SAAPJ6DOCFMrk
QIxzlVApw9oQEWaGQ6dlH6yELzHLt7YP0HP08PLb456vIGyqypW37GIOkEo2
paH7IqZOK1Y1D9oL9Z5Zy3y89KarSoAdFyMg0EWjqIasStZlELc5rujsYU3N
JoxsjTsrCbOzuDKKL74cQm0fpkp4TzL8ZqK6uWI9OTyul5m9gfGzdn2FTVTX
DMRLJVaHhwNuAsr/t9Iqb8jGnjBnrGQsLiPLFWbC6evKSn01iCppyYHCx8Fa
Wufw8TaIwBXtfAkUbGRnoXbSjsxx6LnM1/scFbv1jXjcht5fPe1/5Qun7Z10
rH2owiS3ost6qg7VTSG7oiNAKrDUaWnYvGz3hmx7K44OpZriCaOsZvaSzhZF
VkcUiqWWdfA0qo5ODMave6cinZJvcsmD40C3i09m0uaG3c4sjYrx6NvXg8mb
h+G768H4+t3g5tu7h9Hk+nYMpLkpaLOWGtgEDEXLvkb9arhRcIyABVg2/nPF
aEi64KuMRth0na7I8XZ8nYT0VivHButcEuWiE8wjRVxPHGRFtpVYgg3PXJVa
ST8+uGEJLBfXS1fOOdQ5NIq5i8qJosdcUwhfEyXdURBZ22Vm7taFHWxTwI6v
SCYulbG1STA/Lc5jlzJyHOJp2gLK04+t1NKuXDhElFFXYphwbXmLsVEXtjar
olVFVBwR3Pe54H7v9Mx64RoPx3QZ7ip8M1Jcw+xjFadQNBNzjmi8MBWRwlAC
jmWXabS0q9RE4cuujf3QHIwOTOBJbHw/MpX+qoJzVbN1Z1HFPGQ2sUzQxLkb
VjQgFjbANA9t8MPajRoBs6szkRpVl46DjoXKTsZlG2Ga2HprBUAONUdO121x
dHbsjnCHQp4/7T+BRXHOzolL4fXwiXZFaEpCNlQraFNKTXRf+NJgaMsvjeTA
l2q2sgMTLVx64DvUlSlHxsb71UBl1q9W1S5a3DnXxp0R6ZjcMNUfWc3Un3Lp
fdTdqSRDXgcH0TBd5wZjwhL+o13wVBu+LixzjsCdsXCd3duHn1lvVis5fygz
+tj/t2dPK+hYb1j4CG4vMVuQ1i609vYO69tEviIuDBapUYm3T+LE0/5zMdXF
Rom4I05f9Pe0klgIe3a++eSgd6dM9/tRb6/FN2Au2uCNcRpyND6mNHdGR3t0
dew9udnNxzh4jKJ0VecKTiSlqZbNF9u0rZ/cdf1bmhiNr4ZVa/9J/y1RtU0x
G8xqj8GK5IMJxLG0NCOWv1HNEIqsH2BDKuTgEnMiy+Qw4/qFScs8UN2KvwAW
lSx1nib8tEaM0olnsp4tbCIQcJV5q5C9kmSEY5vIbQgDWYBppAIevoWOVWW/
hBUfTrMqMQEseeNq9s6yR8raBAuGPj+hW1p4OjISUxtBYnOSvS6FV5CRDh3T
QJROs1ayKXplWeyWval3vOF45VNtl9UukM4iM87nuyfSs2XgWUpIsQltPCUW
sCXjfINHdyjqvNX6k2/twqTGXeCnv9l2tdP2or/b70V/px9QuNMPbbvzuXVf
DfcsvNnoVt5u3O3p195u9D0rtg5TZYm/KmAgCEnUqq7I1Jdf8DrrlP0n2AgD
KEyzN0hsnBQNROsqEPGmZvgyfFrqCF6wRNBQXwYzQWOcOy3CQuNeszI2UCrd
WUWajY2jj3RKr08OVb3YIOXmZdUqzSN4tR8WmuZwVT6KIt2VjfNCrtoS6UfV
TC0ou0Pqq6tr5ppda8cIqOf0rAvOIZGAclBUNyymXjMslY3rOGxC4BYUm0XP
hkocQ9O7xrz2oxhTqsYtPFG6fVnGyqnv8djJOy9cyUm62ftQw3f43AJER9hL
eToqG70zoaRZ8S6XNv2mWAV7loj53qvQBTh8Rq72wC0Aymz/MHfzzRWKIxyH
sjWn6vKzuhg/7tjo2LtyPpTpdvr426//XvVg1wRn7L24KFZUf3OnSaG1X4V7
VRr7R8HgjygYNCKuP6xiUL/A+f9aMrBvXsiANrxlQzd/UNEgiA0AhFMLTDeL
SuM1NeN0eM8Z1ckE0eD7zHIqXaTx9vmqrNZAnEJJ53Q3Zz87OlQwHvgcbuqJ
raCXb1P3Rr6bAzcN5OMGbjMYuW+aTiOeqsoOVazVIFdPR+x5rO25Syl+keVr
HXWpgLieoOuylwZ8I5XMweU+TflH3v+/mfdXke//6cT/VpF6tIlt8sUExjdV
46rURg8I7yVCock6U2Y7DI/rCTzPGhsNZYqT40qLnLrQFGws7MlPGlcK8B6a
k2n6mNKduOGonZ/UOU9AMYKhMqTUzhCKRT2YZ9+C8koSzDae9tFzXPfKSXPy
npbzBb2lqsub4oGeU8GSM7mOUkkhGBjERng0vJofLEMPBZS9s+1sLR7wfUd1
IvYsafzHlrLX1/SwrSSAA+uNzvbvNIAjmqX5hTNwe53ik7u84iCoyL94s9Iw
i8W2GMkK8cpsSN/gmN0Zm88G3eWhksnWZDWJeF+7VzTDr1w2SDaZ9+jsB4lN
WutHkzg5f8O6ce23+QdFNFVXJgki7EDBpEgikszVGSpo+i4+2K9Af9DHFqQ2
4lBjgQBu52KxexzIG3FRisyLhJ8S5Mq++JuXub8mjamUC8jwOaKV1pK2nF87
bYvntCmMK5ezViwf1jquQjjeqRi/ub+/e5gML/mx57vb4eT67nKLMGqefTce
vBu9Hk3cfKaOk1nEtKqsUX96DXYoJzsyxwRf/27cClmjakNIprZPE9PVgry0
1JepjP2tkxTT20Opuo1eT4YPt8PL0WAy9N2dIWwsYK8YDm+Npq23V8PEPaur
ttexvsMRIL9QpseaPa6x+jSOnmtq/9dHproP3ngn5wIbej7C+bZ9CW5RAtda
UkzuPNeex78MMTpIejbNMBcylBk9kfQlRq8zm62Ko+Gbq+7F7eC4vqD+6D22
q7jUcYV92Fpf8tMrhpzlY2H4pG0d7wQ/v6QPHTEYjqmsYeemX6ig5+SGrBFI
a6xj+pO4qE7AqWTyy7hz9aH7CxVYOlzo+NBp1kn2fd1QLy2z2+Xv2RJvoP/8
U3ZiHecBENAqPkH89McMvNhu993gu7p34hKONvXfW/g7LqrfMUoHwWOSroC7
OWfepvXLuf37SxX+a5v/eKX9AVu5u7xrtf4H7T0p2346AAA=

-->

</rfc>
