<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-ikev2-pqc-auth-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Signature Authentication in IKEv2 using PQC">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-ikev2-pqc-auth-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 75?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It introduces ML-DSA and SLH-DSA capability to IKEv2 without necessitating any alterations to existing IKE operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> are quantum-resistant digital signature schemes standardized by the US National Institute of Standards and Technology (NIST) PQC project. This document specifies the use of the ML-DSA and SLH-DSA algorithms in IKEv2.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm and allows for the use of either SHA-256 <xref target="FIPS180"/> or SHAKE256 <xref target="FIPS202"/> as the hash function. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate and verify signatures.
On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="signature-algorithm-use-and-hashing-in-ikev2-with-ml-dsa-and-slh-dsa">
      <name>Signature Algorithm Use and Hashing in IKEv2 with ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and randomized signing options. By default, ML-DSA uses a non-deterministic approach, where the private random seed rho' is derived pseudorandomly from the signer’s private key, the message, and a 256-bit string, rnd, generated by an approved Random Bit Generator (RBG). In the deterministic version, rnd is instead a constant 256-bit string. Similarly, SLH-DSA can be deterministic or randomized, depending on whether opt_rand is set to a fixed value or a random one. When opt_rand is set to a public seed (from the public key), SLH-DSA produces deterministic signatures, meaning signing the same message twice will result in the same signature.</t>
      <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each IKEv2 session, as it includes session-specific information like nonces, cryptographic parameters, and identifiers. Thus, both ML-DSA and SLH-DSA can utilize their deterministic versions when used within IKEv2. In both cases, the 'context' input parameter for the signature generation algorithm is set to an empty string.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-cms-sphincs-plus"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. This document specifies only the use of pure mode for signature-based authentication in IKEv2, where the content is signed directly along with some domain separation information. In pre-hash mode, a digest of the message is signed instead. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-cms-sphincs-plus"/> discusses pre-hash mode. The data signed to prove the identity of the initiator and responder (as discussed in Section 2.15 of <xref target="RFC7427"/>) typically fits within the memory constraints of the devices involved in the IKEv2 exchange, consisting of nonces, SPIs, and the initial exchange messages, which are manageable in size.</t>
    </section>
    <section anchor="mechanisms-for-signaling-supported-key-pair-types">
      <name>Mechanisms for Signaling Supported Key Pair Types</name>
      <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they possess:</t>
      <ul spacing="normal">
        <li>
          <t>One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the
initiator.  For example, the initiator could indicate in the
Certificate Request payload that it trusts a certificate authority
certificate signed by an ML-DSA or SLH-DSA key. This indication implies 
that the initiator can process ML-DSA or SLH-DSA signatures, which means 
that the responder can use ML-DSA or SLH-DSA keys when authenticating.</t>
        </li>
        <li>
          <t>Another method is to leverage <xref target="I-D.ietf-ipsecme-ikev2-auth-announce"/> that
allows peers to announce their supported authentication methods. It improves
interoperability when IKEv2 partners are configured with multiple
credentials of different type to authenticate each other. The responder includes 
a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message 
containing the PQC digital signature scheme(s) it supports. The initiator includes 
the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or 
in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature 
scheme(s) supported by the initiator, ordered by preference.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-DSA and SLH-DSA are modeled under existentially unforgeable digital signatures with respect to an adaptive chosen message attack (EUF-CMA).</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-cms-sphincs-plus"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="12" month="September" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-05"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using the Module-Lattice-Based Digital
   Signature Algorithm (ML-DSA) in Internet X.509 certificates and
   certificate revocation lists.  The conventions for the associated
   signatures, subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-04"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-auth-announce">
          <front>
            <title>Announcing Supported Authentication Methods in IKEv2</title>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <date day="18" month="April" year="2024"/>
            <abstract>
              <t>   This specification defines a mechanism that allows the Internet Key
   Exchange version 2 (IKEv2) implementations to indicate the list of
   supported authentication methods to their peers while establishing
   IKEv2 Security Association (SA).  This mechanism improves
   interoperability when IKEv2 partners are configured with multiple
   credentials of different type to authenticate each other.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-auth-announce-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cms-sphincs-plus">
          <front>
            <title>Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="August" year="2024"/>
            <abstract>
              <t>   SLH-DSA is a stateless hash-based signature scheme.  This document
   specifies the conventions for using the SLH-DSA signature algorithm
   with the Cryptographic Message Syntax (CMS).  In addition, the
   algorithm identifier and public key syntax are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cms-sphincs-plus-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
