<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-06"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="06"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature scheme standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with a traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature schemes for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  /* ECDSA-based Composite */ 
  mldsa44_ecdsa_secp256r1_sha256 (TBD1),
  mldsa65_ecdsa_secp256r1_sha512 (TBD2), 
  mldsa65_ecdsa_secp384r1_sha512 (TBD3), 

  /* EdDSA-based Composite */
  mldsa44_ed25519 (TBD4),
  mldsa65_ed25519 (TBD5),
  mldsa87_ed448 (TBD6), 

  /* RSA-PKCS1-based Composite (for signature_algorithms_cert ONLY) */
  mldsa44_rsa2048_pkcs1_sha256 (TBD7),
  mldsa65_rsa3072_pkcs1_sha512 (TBD8),
  mldsa65_rsa4096_pkcs1_sha512 (TBD9),

  /* RSA-PSS-based Composite (for CertificateVerify and Certificates) */
  mldsa44_rsa2048_pss_pss_sha256 (TBD10),
  mldsa65_rsa3072_pss_pss_sha512 (TBD11),
  mldsa87_rsa3072_pss_pss_sha512 (TBD12), 
  mldsa65_rsa4096_pss_pss_sha512 (TBD13), 
  mldsa87_rsa4096_pss_pss_sha512 (TBD14)  
  
} SignatureScheme;

]]></artwork>
      <t>The SignatureScheme names defined in this document follow the TLS IANA naming convention. In composite ML-DSA schemes, the trailing portion of the name corresponds to the traditional signature algorithm variant, including its associated hash function (for example, RSASSA-PSS with SHA-256). The pre-hash function in the composite ML-DSA algorithm names defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> is not used in the TLS name. The explicit RSA key size (for example, RSA2048, RSA3072, or RSA4096) is included to uniquely identify the composite construction and to align with the composite algorithm definitions in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The hash function indicated in the name applies only to the traditional signature component; ML-DSA internally defines its own hashing as specified in <xref target="FIPS204"/>.</t>
      <t>Each entry specifies a unique combination of an ML-DSA parameter set (ML-DSA-44, ML-DSA-65, or ML-DSA-87, as defined in <xref target="FIPS204"/>) and a traditional signature algorithm. The mldsa* identifiers refer to the pure ML-DSA variants and MUST NOT be confused with prehashed variants (for example, HashML-DSA-44).</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over a signing input derived from the handshake transcript, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature in the CertificateVerify message MUST be computed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>When a composite ML-DSA signature scheme defined in this document is negotiated, the TLS 1.3 CertificateVerify signing input constructed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/> MUST be provided as the message input M to the Composite-ML-DSA.Sign function defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The composite signature construction then applies its domain separation, labeling, and pre-hash function as specified by the composite algorithm identifier. Any pre-hash function applied as part of the composite signature construction is determined by the composite algorithm identifier defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and is independent of the TLS SignatureScheme name.</t>
      <t>The traditional signature algorithm and its associated parameters including the specific hash function are fully determined by the negotiated composite algorithm identifier (OID). The Trad.Sign operation, as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, MUST be performed using the hash function implicitly bound to that OID.</t>
      <t>Upon receipt of the CertificateVerify message, the peer MUST verify the signature by applying the corresponding Composite-ML-DSA.Verify function to the received signature and the locally constructed TLS 1.3 CertificateVerify signing input, in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are a restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> need
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such scenarios, an attacker with access to a CRQC could forge a traditional server certificate and impersonate the server. If the client continues to accept traditional-only certificates for backward compatibility, it remains exposed to this risk.</t>
      <t>While broader deployment of composite or post-quantum certificates will reduce this exposure, clients remain vulnerable unless stricter authentication continuity policies are enforced. A coordinated “flag day” in which all traditional-only certificates are simultaneously phased out is unlikely due to real-world deployment constraints. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> addresses this deployment challenge by allowing clients to cache and enforce a server’s support for post-quantum or composite authentication, thereby preventing fallback to traditional-only authentication in subsequent connections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD9</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD10</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD11</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD12</td>
            <td align="left">mldsa87_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD13</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD14</td>
            <td align="left">mldsa87_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="31" month="October" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-13"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   As the Internet transitions toward post-quantum cryptography (PQC),
   many TLS servers will continue supporting traditional certificates to
   maintain compatibility with legacy clients.  However, this
   coexistence introduces a significant vulnerability: an undetected
   rollback attack, where a malicious actor strips the PQC or Composite
   certificate and forces the use of a traditional certificate once
   quantum-capable adversaries exist.

   To defend against this, this document defines a TLS extension that
   allows a client to cache a server's declared commitment to present
   PQC or composite certificates for a specified duration.  On
   subsequent connections, clients enforce that cached commitment and
   reject traditional-only certificates that conflict with it.  This
   mechanism, inspired by HTTP Strict Transport Security (HSTS) but
   operating at the TLS layer provides PQC downgrade protection without
   requiring changes to certificate authority (CA) infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
        </reference>
      </references>
    </references>
    <?line 227?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, Yaron Sheffer, Daniel Van Geest, and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
