<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="04"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with an traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa2048_pkcs1_sha256 (0x090C),
  mldsa65_rsa3072_pkcs1_sha256 (0x090D),
  mldsa65_rsa4096_pkcs1_sha384 (0x090E),
  mldsa44_rsa2048_pss_pss_sha256 (0x090F),
  mldsa65_rsa3072_pss_pss_sha256 (0x0910),
  mldsa65_rsa4096_pss_pss_sha384 (0x0911),
  mldsa87_ed448 (0x0912)
} SignatureScheme
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such a scenario, an attacker with access to a CRQC could forge a traditional server certificate, thereby impersonating the server. If the client accepts traditional-only certificates for backward compatibility, it will be exposed to this risk.</t>
      <t>While the widespread deployment of composite or post-quantum certificates will reduce exposure, clients remain vulnerable unless they enforce stricter authentication policies. A coordinated "flag day" in which all traditional-only certificates are simultaneously phased out across the ecosystem is highly unlikely, due to real-world deployment constraints. To address this deployment challenge, implementations MAY adopt a strategy to allow clients to cache a server's support for composite or PQ certificates, similar to the HTTP Strict Transport Security (HSTS) mechanism. Once a client observes a server presenting a composite or PQ certificate, it could remember it and reject fallback to traditional-only authentication in future connections to that server.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="16" month="June" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-14"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="18" month="June" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory guidelines.  Composite ML-DSA is
   applicable in any application that uses X.509 or PKIX data structures
   that accept ML-DSA, but where the operator wants extra protection
   against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-06"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 205?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, 
Yaron Sheffer and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
