<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-04"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="15"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with an traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa2048_pkcs1_sha256 (0x090C),
  mldsa65_rsa3072_pkcs1_sha256 (0x090D),
  mldsa65_rsa4096_pkcs1_sha384 (0x090E),
  mldsa44_rsa2048_pss_pss_sha256 (0x090F),
  mldsa65_rsa3072_pss_pss_sha256 (0x0910),
  mldsa65_rsa4096_pss_pss_sha384 (0x0911),
  mldsa87_ed448 (0x0912)
} SignatureScheme
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such a scenario, an attacker with access to a CRQC could forge a traditional server certificate, thereby impersonating the server. If the client accepts traditional-only certificates, it will be exposed to this risk. To mitigate such attacks, clients SHOULD enforce a policy to reject traditional-only certificates once post-quantum or composite authentication is broadly deployed and the need to interoperate with legacy servers has passed. In the interim, accepting traditional-only certificates remains necessary for compatibility with the existing ecosystem, where many servers have not yet upgraded to PQ or composite authentication mechanisms.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 203?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71b63IbuXL+P0+ByD9ib5GUKMs3VXLOyrqsdda3FeWzlV8u
cAYksRoO6AGGNNfrrbxDXiDPkkfJk+TrBjAXipStnFRcdc6SnAHQ3ej++usG
1O/3E6ddro7F3gerhJmIUzNfGKudEm9e989GJ0IX4vr1SAwHj/cSOR6Xavmd
L6fSqakp18fCuixJMpMWco6VslJOXL9UWbbuu9z20zhJf55nVvZzjLMusdV4
rq3VpnDrBYZdnl9fJEU1H6vyOMnwznGSmsKqwlb2WLiyUgkke5zIUklIOFJp
VWq33ktWpryZlqZa4FcIt5ckN2qNH7PjRPSD4PTp4vL96PDgiD7WeiWJrNzM
lPRqIvBvUuW5V+Nal9Vc5squZCmuSBt+wZRTWejfpYPgx+KtudGSf08hy7F4
KYupzE2p+LdSTfmtn2VZSCdvwpumKhyZ7bLIwmA1lzqH+DemyJwuf5zS9wEM
t7dNrrlxs7V4ZfJcjZW62SLWmZ7qU1W6lmTvtXN2XJXTWVeID2SclghOzwez
OPWPGSZKMVFHFi/H38ysED+VsjbLsTjHlJV14rWew7YZP4guFZ7xb9aVSrlj
cfjk4ECMTC6htbgyMhP//e//IUYVOdzw4KAl/Tvn5Er2xLvCyVKbrgqnspBZ
tG0G0X4+/Fk8/ulJW6/fIO1gCml/VF4Q0ui2cUepcU5c5NWsVOUWw55qmxox
Wlun5rZjNzvxg35M6RVvr6Qw5Rwjl/BlcXVx+vzo6Ck+wUkvT96ewAH6ZwOt
3ITDpJykeP5srDFv/SCX84XtLz61gsjqqT1OdDHpzv3kkOemVQ6Gz45bcyw+
VXqB/3f92Xpc6qzvVDnXhcnNdI33QlgckzYRK+i3Pv0o3pisylX/tXQOjtB/
Ka3K2L2czMVIT+HXVanEyGEPZZnt8SyynNL2zpxb2OP9/WKZL6qxHRQaZp+a
5T59oF/2aZ39t5ej6wF9GmDFwSKb0BwMAGIic4tQejm6PDw4HHZE/KWShavm
fSsnSqTleuEMtneBwOhjPyHMHBuN4T0BnCjxWWRqqXKzoN+tgLgIT1gVXzPe
XLtV9tVqNRhbPRhjykGm9kcz4E92ZlK7f2ZWRQ6ntfvnb/ch4v77apzr1E+2
/7I06Qym2f/UErTfFjSqWiMQ/ev7SNq7UJkqYeJ3kwnsLrDZgIuw5aYQEf3E
Qyz8aK+x2LvUGSCoIHslIun3+4hAxJtMXZJE2NPFVLiZEvji+kG+iPC23tOV
djPgrsw0LQlZmkcyB/Dj8dyKRWmWOlP8wamUpZNTqQvgwAK/FE5jKDBA3ljo
hq3CdCn9VE0t5ZOwLh6RSDHPzBe54h2kCQfieqatQIap6DdhFyrVE41FZ2Yl
bJXOhBR1hLTkTGUhxmy9Ody2sqR4WIG1uxqd9N//fDp6MBTL4eBJz/8wGvXE
+Slewn+ywydPhi967C/n2dHRc+FM1Jl3jhT0e95KjoOELT/XWZYjxzzA3rkS
kcTmSZJrKCqzJamCJBs3gBSoeG+gB3STrAj0hBYOxoEJHa0e/bnlSzoV1mMS
TNXase4rrV3zNrOkbw/hDCdT/Vcqz+eywHf6kRSGdroU+FkvoCQtvFRiCQCW
HEIw8LLKC/jpOFckWdQEYCHTG8hyBicNvgZHKizLxRZse14neh++/+X0UY+G
YHpsOnEAnYU1qoKSEZwLno/kCsCJ05dmDFAvlLVk0jEypFCfATP0nFQp1Gqn
NQbi15nG7CvvMIURuSmmCCLKC2vhc5rbbtZ1j4YBZwyNLYyD68LXNIIRQxe5
RPDSxubKqTAT3KSjfqn4NY9LSGk6J43WYiaXpDF0n5pCQR0EkwXeC5uW5Cfr
AGIy74Pt5Ngu5fWFfWEos4QGAeacnqxb0diNLjHJ5crCZT8Uub4BKiBfa1NZ
uC9UZDRDELmVUsVOE/KGAWGR/GhGbMEKkUGS+EkUS7LCoFnbDfFcZmbhaKMn
oFmT0syJHUg9nTlELahXNhDniBQBTqk8RNRiiYUCF8h6Qjsxl2uKdEQVjCqn
iuQn0MR+ktJu/c92Q3g4FT8gITTMVS4MCzqvcqdhH7FgOO+DTG6IrIqZhCMK
G0AYpjsFFLDNatOq0rJQpB0FrZmPdaF2RyS8IgDZCqPcDLEO2X0kQfGVqXLy
YsAYZmM4xeicLA2bwGia5JYFKZ6vw4rAKVBs5bHewzPGI1FIQlSFJ3OVQhdt
5z6cSzVRABdeA+jwntw0JNr9Nq4gSPevH4lXzCes+PLlu8jG168DkSTvChIG
+YizACtrGrNBfz+wheI2hYYMBgBBU013oX1tzQHwFu9igFxAb5nOvH9uTRGE
L9YxbLiV6TzB2wVFZU8ozEEmBITDOmN4hMiAmoqBeKsEJ63VyIVIekJwDJce
24tp7h/xZsOXKU21HnVdxeAF7/URu2noVBXh557PFgHuEPucOHgAxPWpTzvy
M+wIZ3P1qVLkxlC8VpUmtTS5nngQIpk60pKzewwWv8H7baZTDxGS9YeK2bph
VrQqonAumWQxVkNXQLzIPaMMm0sIAyFhHPU5zSuCOXgx5WisIwW5W/SLSQlq
RzUf+zAN6laqccKamMhNRNnEPwyPPmfyymtDFsFTSjrMFB6SVYEuJuUtHK8f
4WU45ZRgtmg4ZboG+4rAACIECxNP+fIlcFjEQJIECvLlS+DeX7+Se8huWtj0
fyTtQLK19T7IxFlcOj947pl6tOuYmbofOiDKgZfmam42yFM7koJYgTQVKO6d
Zm0ZSHdxHbHUkqNrr5b4Y4Nre2yVrY8+Ui7fi3kNRh8EQGlUtw3VyhoaCiIN
28IA1BtggtHinoqSBbw3MhOdY5zy7plRaYb9gkqQn5Kqh08GAeSCigGoxQsu
oHiG9GzWfofZe0OeV9JqQtoVQTEmmOhpFSIUoxTAIXXejVVB5GUfqzOJaWfN
HbSVkwUpRpGyBV68T2KfvkHPod+EEhGnTTgX7RWJEP184LmoF1vmvs7oACf5
lnclIm54N6faPrACWA8VWj5GiuIYc2oKU3uzqc+SoqxHeyF3yOk5q2d5MVkh
nYN/wDMCk5G7bcApkdgKb1vIlNaTCCgypRmI97XcyedVTNOQPJmmagEvh/eZ
Fa3ci4m41g2ipcQscwVKZiPVhopE1LOGs22QXPpll/BBZ6KFvcCLQtzZHGEJ
9wRmkussdWk8vnBWg6NhEet6AdI3k2VQn5YGXJQgRhBnSh03v6/a2gorsl/Q
eM+bO8Ub4hWoZeDMbMEJViMzEU8LaAml4DkXVUksvSd+V6XpZ0jkGzFHihGL
Jw72GUGkGalaQUhLMeiPFfbL85T2HJw1PQ1DGNHA3LCHzIDmOSF60Ap5KKQD
p+dEY8BCAo2Jo8Km+sqEVyZfb3d3mNshf8WwtQgyDCEfzDln0u9tykYbxi5R
e0QsbinovXMMxMu1dw0STHrOqBrX0m3KCM0aNybyyCVATKqpZFtpELSF9PVQ
JudIMSAbvDlb3QHxoeaLoNJM5Qtbu4S33UoXGTzOdCETdU2NrpgGPzFX8Ojq
kWAiPXmoqC8BMkl8n4tUqiUePEBKLigyPTmAva8bJii+PIAhOtzQIxFxGmrd
WrH35sPoeq/n/yvevuPPV+e/fLi8Oj+jz6NXJ69f1x+S8Mbo1bsPr8+aT83I
03dv3py/PfOD8avo/JTsvTn5tz1f9u69e399+e7tyes9r2q79UDYQQRceSIF
63pGl4BpYPfHPrW8PH3/X/85PEKG/6eri9PD4fAFUrz/8nz4jPI9lUd+NVMQ
0+GvxLgSIK9CKUS8B/w+lQvt21ggZRYZuxAUU4PE83dvK3IVLkGbsV2pdZEA
VRDFKaCcZkLFiZfOQeq0nflZetQoUtxpoKq/bl2CNUjKRdjVf/lrTjVM//lf
/5IEStEsYSOVpm++d0Ru39r0TE0wnA10j4rh0oWBtsmVRFGPk+QvQogfGuZ3
2iHM5z6ofjgWxMU7j1SoNSgb8CT41yoBbVMDNsR46ww2EggLThpnouMM3j4/
Tb8B/ZqNPYhcq+6gjgLHu8ZgmyQntmut0Dz++tUXMhvDuCNvFxSP2AZGCYRk
Qm9GFheQ+1ZRtYXaBT6X/ON8bsNFwOEsJ+RbWpPJbCAf6jYjlfQshwcTsvz5
55+JKkCQvyRC8InS0dFHleK/H4Epi8MnT8vhRzuT+CAeHnw+eHHw7FEvvvr0
SevVx8+P/Kv4EF593rz6/Nndr75oXiUBfKMwPDvprth59rIzrrQSBcDzj4ub
1G6IfdqZBC8+Pnh2uO3Fs80Xjw5ePG1ebEQ+3760tfy/zpwX2xff8urwYPvy
zau1AMNh17zcT/VPDh8lXzf9grc6OScWSoc261bpIpF1NOrXQJVr/5Z1P5lS
5BzgXPaYf3R7mHC0K7wTWpkehyWyrZ0x46mKNLadESG6tK2qACsiAVugQsaE
wS/XPzrqxY9Pn/gJw9fnzxi7O+Fc132xfAMHMCiqC+4VobpQnqkybydr/cAW
IM2R/CnZepwGOaImLOhC5OOO00KLpJAkyBvcPULVMuZiZ8IYwSCN2UhvfI2N
3V7dYXiFBy39OMXs0mNULUgFDuLbc5KOtHzNzMaK6QwXkb7xrXyZQgMjqgIa
LPiNeKgG00GvYdhItAsXX6IZZtASjnajHnm7UZ/MhjxNUEU8rC67rZfU1u0e
2nNUz8oeQzuffahznLLtoMWUhl8WocXZfoFGebkaYCXEA7deKm4nEOuqGXnU
J/TWYSe9lL4/1OPdMFU0EfshNnqG4gz8bM6dbelqeYlOxr4153pFhVnB2QsV
qyoy39spPPsOPR8/l/Cn7LF5hA17ePX2p0d1HxWpEDSOKbOl2kgHMu7IXJnq
U8uwUHkk042/TCQSHob/plrx4w3IptosRoi2Ux3f5F5SjZv3t3QPwhLZ6lqB
rbngjhN5UdYepKBnlnlvvWVwPmLA6nUthBLWl4RbjrLa1UPtDFSMwbbkifDC
3mYibbFwGfqJLCB35gN+1Z7b8mxYdC5vSCJuO7Zcq8AEVNHATqkPNSpYAYyK
L1KEczKIv0AqJk5IOZNFDW0ypUnrjtd3dqn9IBakOa0hp76civ2YLSbyYXDL
P/z86cxwVyqcI+yKMx+HoAzK44XkNorn2twBjcWJ9Gp1+pyxTNe25mRsI3Io
3jP2LF6h19m/Ole00e2kRvxDFrD5/pgs2W7ecYlCUKNcrPup5lqTR8GaocvS
7GN8v/aIpmXr28Mx0QWYHQVLHw2OBrx4TQe9cWsK3PcQN6BEWqex3g7iveNu
AXHMlUbpQR1ZB3P/7ruNbFLClTKeLlRObWAfREaeCcBMbWK/OervpNs64t/A
l4alBTj6jbilQBjQqHA799xHD+xGbtaNHkALpZdek6Vf6n+niN/ZhhJw0BZZ
Pxwtpc1IfyDWaqqSEyRVOJ25YJJRu9jlGbsE9t20PQ8/0zp1Y5HLznuZJLpi
4N2t0d2CMRbddVu+7vce+mqErpuQ+4FoKT6Xky5a1UJukKzyZ7U+/0xYMGXC
tdOKvlaKs0PjIrg785PvE1WOiXuEmO6MB4bBCdRU5h+bMJc53WmiOqy5wtLE
95WiuPXHGrBXaHOXam44qbeIDkjkKFwhGPaXw49PQql2MHxGPf1it9JAoNCy
ac8zGgmCUiVBOEbI57ksfYi0FS6DeB1g33W81WKCd5UcvTvrDM9n7ywwuiek
O48DNmvEeA75DdFvuWPdX9hRpN5aYCnzitnzhNKf52XOtFN0OJyuOyit2LXi
oVVqA4gP4axtKH7kqwjuLbvaXWl3aYt0EYhol6/W7gBn3BpK8s64yTj1hSsQ
LU+47ZdN/YL00jn5iA2O3Yb3qVoGtL8VYKB9dBnszihTeRhyiomhhWTDNK2b
LWFoI7be8oyN/Mi0vN2fiwFCwaqYnXWbNwsJtO0RJUE+a9g5kwwb5IynwaYq
wSmOk+QH0ZWmXRDWJSgfndaHn/fKVOx9Xq+1Jyp0dMCVwjeuYA2CbP6Q1ZTr
vjP9iFKwclueb17nyqmB14J7usr0cu1PffhwebvaHPPUZW/BNCvxPdr77rBf
LoBd2OBA7LgTHU9v/FE8tvBY0K68UQpIiB2XY+pl8p6H09d4Xuo7S1sdiVNP
9zKS54ShZm/1dL8vvf4gLm8fHretnoW7ky0hNhymtkTdgN+kv/6MRvp4rw9m
wml5rIkxqT+WiKe/fJu6XIZjjHi+h2K8SkPtzfUYdQl9uGLlquD7labkGq3W
qnPciVCiszvDA2rjj9etSpZ73Hz7KZDdlcrz/lI5+s7hOBAXFftitch8gWi2
eYIvT/1dus6hcOOXPB2T6Hr71dLkS0V16phKUw/8nF0FyRAvTUBFunpgCj7H
IZQK4BVUOo1X0SIzmDV3gJp7aj4g6NipsoE5xbQxHPrK4TtCgjsYie9gOCQK
OnWhk6iUbz0T8QxXE1s3E32YiNGHi1qsCCxkt5KuKhfxBCqek8cLl1aMS3PD
hxKOTrVAR/255unVL6c2AQcr+aRpsajvuIaLK6Umy6NM6KwcbmQVwAPnMdYf
WPJtJUqvdThyiAQxnEnq0ynyRtsVkY96Kz5f89IOPD9L6Xgqns9H6GP86cT2
Bpr22S23wuDtu42ZWRVIIHQVodUFCCfFNlUF3Uvvde9scXpMuSblk2wyJV1b
z5kXUCOoC8hMm9vEo2lS6DnC35qiSff+bUgREjmbIJxm29tqtukMd3rq2iic
YseAC2eppjkmbPc+erWtw/maotM/ikWYGp6x9oeoPszukgGYkG7cQO6A9OZ9
E/ZPmdE5sArFXGyjxVtxDUxGryJGkq6DqSz1FgEP1rb6eTxGz3vBcGzcO8X2
UUTnGLSvslzXyUXWjbKandZXUGswjmfifLrfyLX0rHENulIt2M1Yo/e/3GmU
5vYeAcIDQX9VsAWlusXDJ/Bg589hYk85MHaKpM2TJfoTFrCpdS8h6An3bU28
UZgieYQ02pDjp6EfRtJwxZn8If5O9FsI8Yc4U77JRW/u+vcHSrAmJdI3vmmX
qvA4+aMf/zWf7vr3xx3f6AdI6E+KaO1vnCkFCd925O0YeSDqCZ/XE+4+ebrX
hC/qCXefT91rwpOOyiGnbN+U75vwZUfl/4MJT9sSbj0vu+eEZ20Jt56r3XPC
840Jb5fH95zwYqvK3cO3+0w4PNiq8j8w4XCryt0zv3tNeNhxbOYz2/99c0K6
e1K3cABXd1eZEc12divEeewlJAkDLOVIj6LhonRGh4cTYxwf3HWq8vYZ3v9D
64UvOYYKrH2RNnYh6sS0W9u6c9JpZ1CaZDD+rpla7Rf/hzB01YkS1El6U5hV
rrIp355Ivhz7oyiV/ese/63XHt8DksUN78tL5Otfyc7lWNIfppyAYPwm6c8p
iWpdgr9r8VpXdillKXviDOTr10jmRwrfrquyoL/jCBcLAimPyvkUQ9eV/ge9
kkIAKDsAAA==

-->

</rfc>
