<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-03"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="04"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>This document specifies how the post-quantum signature scheme ML-DSA <xref target="FIPS204"/>, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3. The composite ML-DSA approach is beneficial in deployments where operators seek additional protection against potential breaks or catastrophic bugs in ML-DSA.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite scheme provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with an traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa2048_pkcs1_sha256 (0x090C),
  mldsa65_rsa3072_pkcs1_sha256 (0x090D),
  mldsa65_rsa4096_pkcs1_sha384 (0x090E),
  mldsa44_rsa2048_pss_pss_sha256 (0x090F),
  mldsa65_rsa3072_pss_pss_sha256 (0x0910),
  mldsa65_rsa4096_pss_pss_sha384 (0x0911),
  mldsa87_ed448 (0x0912)
} SignatureScheme
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such a scenario, an attacker with access to a CRQC could forge a traditional server certificate, thereby impersonating the server. If the client accepts traditional-only certificates, it will be exposed to this risk. To mitigate such attacks, clients SHOULD enforce a policy to reject traditional-only certificates once post-quantum or composite authentication is broadly deployed and the need to interoperate with legacy servers has passed. In the interim, accepting traditional-only certificates remains necessary for compatibility with the existing ecosystem, where many servers have not yet upgraded to PQ or composite authentication mechanisms.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 201?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
