<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="12"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>This document specifies how the post-quantum signature scheme ML-DSA <xref target="FIPS204"/>, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3. The composite ML-DSA approach is beneficial in deployments where operators seek additional protection against potential breaks or catastrophic bugs in ML-DSA.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite scheme provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with an traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa2048_pkcs1_sha256 (0x090C),
  mldsa65_rsa3072_pkcs1_sha256 (0x090D),
  mldsa65_rsa4096_pkcs1_sha384 (0x090E),
  mldsa44_rsa2048_pss_pss_sha256 (0x090F),
  mldsa65_rsa3072_pss_pss_sha256 (0x0910),
  mldsa65_rsa4096_pss_pss_sha384 (0x0911),
  mldsa87_ed448 (0x0912)
} SignatureScheme
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="11" month="April" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries that do not already have a
   "Comments" column.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-12"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 199?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71ba3IbOZL+X6fAyj/WdrAoUZZsWbE707IebY2fLcozsb8c
YBVIolUsVBdQpNl2d+wd9gJ7lj3KnGS+TKBeFKW2djaWEd0iq/DId36ZgOM4
jpx2mToWO5+sEmYqTs2iMFY7Jd69jc/GJ0Ln4vrtWIyGz3YiOZmUavmdgxPp
1MyU62NhXRpFqUlyucBOaSmnLi5Vmq5jl9k4qReJF1lqZZxhnnWRrSYLba02
uVsXmHZ5fn0R5dViosrjKMWY4ygxuVW5reyxcGWlIlD2LJKlkqBwrJKq1G69
E61MeTMrTVXgKYjbiaIbtcbD9DgScSCcvl1cfhzv7x3Q14avKJKVm5uShkYC
n2mVZZ6Na11WC5kpu5KluCJueIApZzLXv0oHwo/Fe3OjJT9PQMuxeCXzmcxM
qfhZqWY86o0sc+nkTRhpqtyR2C7zNExWC6kzkH9j8tTp8ocZ/R5CcDvb6FoY
N1+L1ybL1ESpmy1knemZPlWl61D2UTtnJ1U5m/eJ+ETC6ZDg9GI4r5f+IcVC
CRbq0eLp+IuZ5+LHUjZiORbnWLKyTrzVC8g25Re1SYV3/My6Uil3LPYP9/bE
2GQSXIsrI1Px9//8LzGuyOBGe3sd6j84J1dyID7kTpba9Fk4lblMa9mmIO3N
/hvx7MfDLl8/g9rhDNT+oDwhxNFt4Y4T45y4yKp5qcotgj3VNjFivLZOLWxP
bnbqJ/2Q0BAvryg35QIzl7BlcXVxenRw8BzfYKSXJ+9PYADx2VArN2U3KacJ
3r+YaKzbvMjkorBx8UvHiaye2eNI59P+2of7vDbtsjd6cdxZo/il0gX+7+L5
elLqNHaqXOjcZGa2xrjgFsfETR0r6FlMD8U7k1aZit9K52AI8StpVcrm5WQm
xnoGu65KJcYOOpRlusOryHJG6p07V9jj3d18mRXVxA5zDbHPzHKXvtCTXdpn
9/3l+HpI34bYcVikU1qDA4CYyszClV6NL/f39kc9En+qZO6qRWzlVImkXBfO
QL0FHCOGPkHMAorG9IFAnCjxXaRqqTJT0HMrQC7cE1LFz5SVa7fSvlqthhOr
hxMsOUzV7niO+JOemcTunplVnsFo7e75+12QuPuxmmQ68YvtvipNMododn/p
EBp3Ca1ZbSIQfWLvSTsXKlUlRPxhOoXcBZSNcBFUbnJRRz/xGBs/2Wkl9iFx
BhFUkLwiEcVxDA+Ev8nERdH1XFuBOF2RDIQtVKKnWlkxNyvh5krAwlwc6BW2
Ua5N5mrRpICvX4PF/PbbgPIBZDjRuSdrpd0coVqmmn6CfJkhQ+Dhwoqr8Un8
8c3p+NFoORoeDvjneDwQ56dYFX/S/cPD0csBa+Y8PTg4EonMxUSJikyOBECC
AuFBxJ1cNBTXoD7ZTFayKEojk7kA1xOVK0hSgybMS1WRmbW3hNVcgUdTQNzO
lFZYxD0h04YFrOFUwjvKmdQ54luBJ6ADLxHb5I2FzkCsk5CzKeY6EZNqZmkf
T8gwYj0sdJpmyDiPoEkMTCtelLSisN+SVIKUW4ufuKmczmekFehIskKgL0jF
QVvYGH9MY90dywIB1kcoCKajjP6QjmpsBSFJVtEAzg2TU/FrlWULmeM3PSSl
QPi6FHisC+iANl4qsUQ4luxQEOKyynKIcZIpoqzmBKFDJjeg5QwmC37I0mAj
uWW6aGTP7nq+/PjjT6dPBjQFy0ONhAh0GvaockpNUAn8AKkW4adevjQThPhc
WUsinSBfCvUFQYfeEyu5Wt0pjaH421xj9ZViA8yNyEw+g0tRllgLn+HcdrGu
BzQNUcfQ3Nw4oRFgkOWdwtQik4k300w5FVaClfTYLxUP87aJBKcz4mgt5nJJ
HIP3mckV2IEJWkR/eGdJdrIOIU1mMbBPBnUpzy/kC0GZJTgIQc/p6bpjw5ro
4WjJ+phmcmVhsp/yTN8gJiB7a1NZmC9Y5NgGZ3IrpfI7RcgKg5MhFdKKUAGc
jDXtF1FMyQqT5l0zxHuZmsKRoqcAXdPSLAgrSD2bOwQAALF0KM7hKQIIE/zQ
Lg1ZAh6sTYqY5MRCrilywKsgVDlTRD9HkFwQ0279r3aDeBgVvyAiNMRVFoYJ
XVSZ05CPKDi4x4CWGySrfC5hiIgbPiRDdKeIVCyzRrQKgYWIIu7IaTlmqrs9
ElbhnVKsMMvN4eug3XsSGF+ZKiMrRmDEahyEMDsjSUMmFLuJbpkT49k67IhA
BsCtfKT3QQ3zkTYkx0+8WagEvGi78O5cqqlCcOE9EB0+kpmGtLvbjStw0t3r
J+I1owuLBPFd0OO334YCovIeLH6G7GyqE29gtLvMwFa6brM0GTN0uJCcsNnT
IRYECJF5dBISlW2ShvqSZBU5CWRAqQn7SEHECk8OLAwwgeoHn0GqzaonZD5I
awkD4SDcN8dN58HssLQ1WeWZIdHjLUUszo+PyfhhmoYKqFRM1k8wGLvMyEfz
Fp4kayTy2qqQe1SeULL++jXAIQgwim4nZfIeeX8qR8QPeE1bpkAwBhOXzk9e
eNBXi3XCoM9PHQYUsVALs4Eg5O0MHDJ4jjrRaeb23jwullqyee40FH9unWKH
pbL11WdKBDt1UITQh8EaW9ZtrcVubidMBtlCAFRmcnbqpHtFkUZPm7SmM8xT
3jpTQvnQF1gC/RSRve9xhkIgqSgnd5PKBRjvwg423pAklLSa3HRFfowFpnpW
haCGWWo6JYLYilVOmW8Xu3MG7IbcrvhbhftIQ4yRo7TPm5neJqGnbkrbNs6A
jNL6mAvjIl0RCbWdDz2Q8WSjbGZNOzKVHgxjU6Ksj7EZlYkhpUB6APvZBPGN
fcyhdFZBbOqLJC8bkC7kHXR6wOMhQh3pkAuQvGAZIQ3Ku2XA8ZRSHasthFnr
MxAYmdEKBBo65uSDMpZpEYJMElXAymF9ZkU7D+oo3vAG0hKCJZlCPrc1TgOL
hPLSNuFvICR6chfxgWfCFIOQVIPf2QxuCfNEyCTTWerS+PgCVyfgDhgKzDpA
3CP+5rc8htmnrREuSmRVkDOj5o3Xq7a2wo5sFzTfg64eXoa/ImoZGDNLcIrd
SEyU5EO0BFOwnIuqJIg3EL+q0sQpUt6Gzw0CTKcE/gVOpDlSdZyQtuKYP1HQ
l09y3TXWNN7ncLgRTcwMW8gc0TyjiB64QhoK2cDpBeVApLCQA+tZQake1vLO
ZOvdRgEDA6Sv2m0tnAxTyAYzSCDnur2b70lhbBKNRSR4gwhJkDMYx1C8WnvT
IMKkBxyqNS3dxRvgrDVjQh6MH+ucmkiWlUZ2L6QH0yiYkWKG4oSVs9Uc4B9q
UQSW5iorbGMSXnYrnaewONMPmQDFTXTFMnikCC/56OojwZSAMaZVVOICiRBY
5AqHgOijR8jIOXmmxwaQ93ULI8TXRxBED1j4SERIjbqAVuy8+zS+3hn4v+L9
B/5+df7Tp8ur8zP6Pn598vZt8yUKI8avP3x6e9Z+a2eefnj37vz9mZ+Mp6L3
KNp5d/IfO75m2vnw8fryw/uTtzue1W79TbGD0BsKGwKIkC4lSGkjIA1of+JT
y6vTj//z36MDZPh/ubo43R+NXiLF+x9HoxeU7wlb+91MTkCHf1LNECHyKuBo
gj0Ah4kstO+IAMxZZOxckE8NIw/+vKzIVLh+aef2qdZ5hKiiqODFJKyEcgWD
zvNZpu3crzKgnoPiMpVKxqYLBtQgKRdBq//254wAcHz05z9Fm42Jus6zVKGE
ngKZfUfpKYr53AvoAXDz0oWJts2VMCh7HEV/EkI8bYHfaQ+Yn3unenosxMkG
Zlf+FWcDXgSfTv1g2wKCd8xvl+phBVsDCAtIWq9EnXFWn18mboN+g8Ye1Vir
acaNA8a7xmQbRSe2L63Qh6TuDW23MY2bu7Ygf4Qa6tZLRCNrFBci963+0BZo
F/Bc9M/juQ0TAYaznJBvcU0iswF8bOsJ0bsMFkyR5ffff49UDoD8NRKCDycO
Dj6rBH8/I6YU+4fPy9FnO5f4Ih7vfdl7uffiyaAe+vywM/TZ0YEfii9h6FE7
9OjF/UNftkOJAN8JC+9O+jv23r3qzSutRAFw9Lm4SewG2ae9RTDw2d6L/W0D
zzYHHuy9fN4ObEk+3761tfxfb82L7ZtvGTra2759O7QhYDTqi5cbhv7N/pPo
t027YFVH54RCqf+/7pQuEllH/1KpXiMT9i3r9p2gFLlAcC4HjD/6DTAY2hXG
hD6Yj8MS2dbOGfFUOUMhjyimurSdqgA7IgFbRIWUAYPfLj44GNRfnx/6BcPP
oxccu3vu3NR9dfkGDGBQU+fcaEB1oTxSZdxO0nrKEiDOkfwp2fo4DXBEHTzA
hRqPO04LHZBClCBvcOsBVcuEi50pxwgO0liN+MbPuis4aFqLr/Giwx+nmLv4
GFcFscBOfHtN4pG2b5DZRDGc4SLSd02VL1NoYh1VERos8I14rIaz4aBF2Ei0
hasH0QpzcAlDu1FPvNyoyWJDnqZQRTisKbutpxTvV8b3Z6FzVM/KHoM7n32o
7Ziw7MDFjKZf5qE/1h1AszxdbWCliAdsvVTcTiDU1SDymp/QmIWc9JJwGFDP
gLVhqlpEbIdQ9BzFGfDZgtui4Kyml+Bk3fTkXK+oMMs5e6FiVXnKeI3xPIfk
kkovv5bwB7ZipnLfPxePr97/+KRpwiEVAsYxZLZUG+kAxh2JK1Ux9ZtyldVg
urWXqUTCw/SfVcd/vABZVJvFCMF2quPb3Euscef3Fu+BWAJbfSmwNAtuOJEV
pd1JCnymqbfWWwLn/jR2b2ohOgngknDL6UG3emiMgYoxyJYsEVY42EykHRQu
fVXvCeS2bohfjeV2LBsSXcgbokhR7OuYVo4FqKKBnBLvalSwIjAqPpMngWvu
mRRIxYQJKWcyqaFLpjRx3bP6npa6L+qCNKM95MyXU3U/ZouIvBvcso9wzjM3
3JUKTei7/Mz7ISCD8vFCchvFY20+7amLE+nZAmV8uuJ7yaFM17bBZCwjMijW
GVsW7zDo6a/JFd3odtJE/H0msP39jCTZbd5xiUKhRrm67qeaa00WBWmGLkur
x3p8YxG0vmeFi4km0YUwOw6SPhgeDHnzBg564TYQOA5nV5RImzQ2uAN433FM
TRhzpVF6UEPWQdy/+m4ji5TiSlm3piunNmIfSEaeCYGZusReOeqvxNu6jn9D
XxqWFsHRK+IWA2FCy8Lt3PMQPqCNzKxbPhAtlF56TpZ+q/8dI16zLSRgp83T
OJxLJO1Mf5rSaaqSEURVaO1fMMhoTOzyjE0Cejddy8Nj2qdpLHLZ+SCR1KYY
cHdndr9grIvupivf9Hv3fTVCNxfI/AC0FB/qSFdL1YJugKzyjVqff6FYMGPA
dacUfa1Urw6O82DujE++j1Q5IewRfLo3HzEMRqBmMvvcurnM6HoM1WHtbYjW
v68U+a0/1YC8Qpu7VAvDSb0DdAAix+GEfBQvR58PQ6m2N3pBPf38bqYRgULL
prvOeCwolCoJwDFGPs9k6V2ky3AZyOsF9n7dtKXjaO8tOQb31hkez95bYPSP
1+48DtisEetDrD8g/ZY5Nv2FO4rUWxssZVYxep5S+vO4zJluig4nm00HpeO7
Vjy2Sm0E4n0YazcUP/FVBPeWXWOupF1Skc4DEO3j1cYcYIxbXUne6zcpp75w
ft6xhNt22dYvSC+9k4+6wXG34H2qliHa33IwwD66V3Svl6ksTDnFwuBCsmDa
1s0WN7R1bL1lGRv5kWF5tz9XOwg5q2J01m/eFBLRdkCQBPmsRecMMmygk8RD
5YGpSmCK4yh6unFdpVsQNiUo9aXas88HZSq2Ps/X2gMVOjrgSuH+Mx6YjqfN
n7Gach07E9dRClLu0vNHa4mMGnidcP8M+nu19qc+fBFjO9vs89Rl74RpZuJ7
uPfdYb9dCHZBwQHYcSe6Pr1hTEwqPBaklXdKIRJC43JCvUzWeTh9rc9LfWdp
qyFx6unfZPGYMNTsnZ7u96XXp+Ly9uFxV+ppuIbXIWLDYBpJNA34Tfjrz2ik
9/fmYCYcltc1MRb1xxL16S9fzC2X4RijPt9DMV4lofbmeoy6hN5dsXOV81U9
U3KN1nDVO+6EK9HZneEJjfAn604lyz1uvjoTwO5KZVm8VI5+szsOxUXFtlgV
qS8QzTZL8OWpv4jVOxRu7ZKXYxDdqF8tTbZUVKdOqDT1gZ+zqyAa6gtGYJFu
Hpicz3EoSoXgFVg6re8x1chg3l4gaS85eYegY6fKBuRUp43RyFcO3+ES3MGI
fAfDIVHQqQudRCV8gZaAZ7h717l6591EjD9dNGTVgYXkVtKt17w+garPyes7
4lZMSnPDhxKOTrUAR/255unVT6c2AgYr+aSpKJrrkt4fUVOT5FEm9HYO13no
Ap/zMdYfWPJVF38DMbgju0ggw5moOZ0ia7R9Evmot+LzNU8tK4ju5W5RTh8z
odi2zref61ZaACrkLJsNdboEjiSyHkQk8XBHzdS3cBL4TIgeLSZ4HtoARA0D
7eib+CuhDiHEN3GmfG1PI+/6fAPybCMB/QJY4TaOfx19i+tP++2+z7d7ftED
UOgb5LT3H7TSA4Xve/T2hDwUzYJHzYJ3N9wftODLZsG72/IPWvCkx3Jwpe1K
+b4FX/VY/j9Y8LRL4dZjggcueNalcOtxwgMXPN9Y8HZV8MAFL7ay3D9zeMiC
o72tLP8TC462stw/6njQgvs9w+Ywvv3zhwvSkXtTuSJc3Q+u62h2Z5EmzusS
Koo4wFK/1kfRcLkwpTOTqTGOzyt6xUj36OL/oeLku10BeHavD9bFV1Mt3s1t
UzD2qjgCXhyMv2ulTtXpL4/TDQ9KUCfJTW5WmUpnfGgcfT32HXiV/vsO/2uJ
Hb7+IPMb1ssrgJe/kZzLiaTL3CfIuD9L+gdJ2gzEJWCLFm91ZZcSpVZoFEng
xqrM6cZzOEUNCKRmyScWupvxDzB7UPpgNgAA

-->

</rfc>
