<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-ikev2-pqc-auth-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Signature Authentication in IKEv2 using PQC">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-ikev2-pqc-auth-03"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="14"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 75?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It introduces ML-DSA and SLH-DSA capability to IKEv2 without necessitating any alterations to existing IKE operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec.  In the initial set of exchanges, both parties independently select and use their preferred authentication method, which may even differ between the initiator and the responder. In IKEv2, it occurs in the exchange called IKE_AUTH.  One option for the authentication method is digital signatures using public key cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional public-key algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the presence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> are quantum-resistant digital signature schemes standardized by the US National Institute of Standards and Technology (NIST) PQC project. This document specifies the use of the ML-DSA and SLH-DSA algorithms in IKEv2.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky, that leverages rejection sampling to render lattice based FS schemes compact and secure. ML-DSA uses uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3 and 5. Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in IKEv2 at three security levels.
It includes the small (S) or fast (F) versions of the algorithm. For security level 1, SHA-256 (<xref target="FIPS180"/>) is used. For security levels 3 and 5, SHA-512 (<xref target="FIPS180"/>) is used. SHAKE256 (<xref target="FIPS202"/>) is applicable for all security levels. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. On the other hand, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="signature-algorithm-use-and-hashing-in-ikev2-with-ml-dsa-and-slh-dsa">
      <name>Signature Algorithm Use and Hashing in IKEv2 with ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and randomized signing options. By default, ML-DSA uses a non-deterministic approach, where the private random seed rho' is derived pseudorandomly from the signer’s private key, the message, and a 256-bit string, rnd, generated by an approved Random Bit Generator (RBG). In the deterministic version, rnd is instead a constant 256-bit string. Similarly, SLH-DSA can be deterministic or randomized, depending on whether opt_rand is set to a fixed value or a random one. When opt_rand is set to a public seed (from the public key), SLH-DSA produces deterministic signatures, meaning signing the same message twice will result in the same signature.</t>
      <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each IKEv2 session, as it includes session-specific information like nonces, cryptographic parameters, and identifiers. Thus, both ML-DSA and SLH-DSA can utilize their deterministic versions when used within IKEv2. In both cases, the 'context' input parameter for the signature generation algorithm is set to an empty string.</t>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. Both ML-DSA and SLH-DSA define two signature modes: pure mode and pre-hash mode, as specified in <xref target="FIPS204"/> and <xref target="FIPS205"/>, respectively. This document specifies only the use of pure mode for signature-based authentication in IKEv2, where the content is signed directly along with some domain separation information. In pre-hash mode, a digest of the message is signed instead. Both <xref target="FIPS204"/> and <xref target="FIPS205"/> prefer pure mode over pre-hash mode, and neither <xref target="I-D.ietf-lamps-dilithium-certificates"/> nor <xref target="I-D.ietf-lamps-x509-slhdsa"/> discusses pre-hash mode. The data signed to prove the identity of the initiator and responder (as discussed in Section 2.15 of <xref target="RFC7427"/>) typically fits within the memory constraints of the devices involved in the IKEv2 exchange, consisting of nonces, SPIs, and the initial exchange messages, which are manageable in size.</t>
    </section>
    <section anchor="mechanisms-for-signaling-supported-key-pair-types">
      <name>Mechanisms for Signaling Supported Key Pair Types</name>
      <t>The following mechanisms can be used by peers to signal the types of public/private key pairs they possess:</t>
      <ul spacing="normal">
        <li>
          <t>One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload sent by the
initiator.  For example, the initiator could indicate in the
Certificate Request payload that it trusts a certificate authority
certificate signed by an ML-DSA or SLH-DSA key. This indication implies 
that the initiator can process ML-DSA or SLH-DSA signatures, which means 
that the responder can use ML-DSA or SLH-DSA keys when authenticating.</t>
        </li>
        <li>
          <t>Another method is to leverage <xref target="I-D.ietf-ipsecme-ikev2-auth-announce"/> that
allows peers to announce their supported authentication methods. It improves
interoperability when IKEv2 partners are configured with multiple
credentials of different type to authenticate each other. The responder includes 
a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message 
containing the PQC digital signature scheme(s) it supports. The initiator includes 
the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or 
in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature 
scheme(s) supported by the initiator, ordered by preference.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ML-DSA and SLH-DSA are modeled under existentially unforgeable digital signatures with respect to an adaptive chosen message attack (EUF-CMA).</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> applies to this specification as well.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The advent of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both classical and quantum attacks.  This document
   explains why engineers need to be aware of and understand post-
   quantum cryptography, detailing the impact of CRQCs on existing
   systems and the challenges involved in transitioning.  Unlike
   previous cryptographic updates, this shift may require significant
   protocol redesign due to the unique properties of post-quantum
   algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-06"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-05"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-auth-announce">
          <front>
            <title>Announcing Supported Authentication Methods in IKEv2</title>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <date day="18" month="April" year="2024"/>
            <abstract>
              <t>   This specification defines a mechanism that allows the Internet Key
   Exchange version 2 (IKEv2) implementations to indicate the list of
   supported authentication methods to their peers while establishing
   IKEv2 Security Association (SA).  This mechanism improves
   interoperability when IKEv2 partners are configured with multiple
   credentials of different type to authenticate each other.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-auth-announce-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Standard (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-02"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
