<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-07"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="13"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature scheme standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with a traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature schemes for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  /* ECDSA-based Composite */ 
  mldsa44_ecdsa_secp256r1_sha256 (TBD1),
  mldsa65_ecdsa_secp256r1_sha512 (TBD2), 
  mldsa65_ecdsa_secp384r1_sha512 (TBD3), 
  mldsa87_ecdsa_secp384r1_sha512 (TBD4), 

  /* EdDSA-based Composite */
  mldsa44_ed25519 (TBD5),
  mldsa65_ed25519 (TBD6),
  mldsa87_ed448 (TBD7), 

  /* RSA-PKCS1-based Composite (for signature_algorithms_cert ONLY) */
  mldsa44_rsa2048_pkcs1_sha256 (TBD8),
  mldsa65_rsa3072_pkcs1_sha512 (TBD9),
  mldsa65_rsa4096_pkcs1_sha512 (TBD10),

  /* RSA-PSS-based Composite (for CertificateVerify and Certificates) */
  mldsa44_rsa2048_pss_pss_sha256 (TBD11),
  mldsa65_rsa3072_pss_pss_sha512 (TBD12),
  mldsa87_rsa3072_pss_pss_sha512 (TBD13), 
  mldsa65_rsa4096_pss_pss_sha512 (TBD14), 
  mldsa87_rsa4096_pss_pss_sha512 (TBD15)  
  
} SignatureScheme;

]]></artwork>
      <t>The SignatureScheme names defined in this document follow the TLS IANA naming convention. In composite ML-DSA schemes, the trailing portion of the name corresponds to the traditional signature algorithm variant, including its associated hash function (for example, RSASSA-PSS with SHA-256). The pre-hash function in the composite ML-DSA algorithm names defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> is not used in the TLS name. The explicit RSA key size (for example, RSA2048, RSA3072, or RSA4096) is included to uniquely identify the composite construction and to align with the composite algorithm definitions in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The hash function indicated in the name applies only to the traditional signature component; ML-DSA internally defines its own hashing as specified in <xref target="FIPS204"/>.</t>
      <t>Each entry specifies a unique combination of an ML-DSA parameter set (ML-DSA-44, ML-DSA-65, or ML-DSA-87, as defined in <xref target="FIPS204"/>) and a traditional signature algorithm. The mldsa* identifiers refer to the pure ML-DSA variants and MUST NOT be confused with prehashed variants (for example, HashML-DSA-44).</t>
      <t>ML-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over a signing input derived from the handshake transcript, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against the side-channel attack. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 2 and Algorithm 3 of <xref target="FIPS204"/> MUST be set to the empty string.</t>
      <t>The signature in the CertificateVerify message MUST be computed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>When a composite ML-DSA signature scheme defined in this document is negotiated, the TLS 1.3 CertificateVerify signing input constructed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/> MUST be provided as the message input M to the Composite-ML-DSA.Sign function defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The composite signature construction then applies its domain separation, labeling, and pre-hash function as specified by the composite algorithm identifier. Any pre-hash function applied as part of the composite signature construction is determined by the composite algorithm identifier defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and is independent of the TLS SignatureScheme name.</t>
      <t>The traditional signature algorithm and its associated parameters including the specific hash function are fully determined by the negotiated composite algorithm identifier (OID). The Trad.Sign operation, as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, MUST be performed using the hash function implicitly bound to that OID.</t>
      <t>Upon receipt of the CertificateVerify message, the peer MUST verify the signature by applying the corresponding Composite-ML-DSA.Verify function to the received signature and the locally constructed TLS 1.3 CertificateVerify signing input, in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are a restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> need
to be taken into account.</t>
      <t>Ed25519 and Ed448 ensure SUF security, which may remain secure even if ML-DSA is broken, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such scenarios, an attacker with access to a CRQC could forge a traditional server certificate and impersonate the server. If the client continues to accept traditional-only certificates for backward compatibility, it remains exposed to this risk.</t>
      <t>While broader deployment of composite or post-quantum certificates will reduce this exposure, clients remain vulnerable unless stricter authentication continuity policies are enforced. A coordinated “flag day” in which all traditional-only certificates are simultaneously phased out is unlikely due to real-world deployment constraints. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> addresses this deployment challenge by allowing clients to cache and enforce a server’s support for post-quantum or composite authentication, thereby preventing fallback to traditional-only authentication in subsequent connections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD9</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD10</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD11</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD12</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD13</td>
            <td align="left">mldsa87_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD14</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD15</td>
            <td align="left">mldsa87_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   As the Internet transitions toward post-quantum cryptography (PQC),
   many TLS servers will continue supporting traditional certificates to
   maintain compatibility with legacy clients.  However, this
   coexistence introduces a significant vulnerability: an undetected
   rollback attack, where a malicious actor strips the PQC or Composite
   certificate and forces the use of a traditional certificate once
   quantum-capable adversaries exist.

   To defend against this, this document defines a TLS extension that
   allows a client to cache a server's declared commitment to present
   PQC or composite certificates for a specified duration.  On
   subsequent connections, clients enforce that cached commitment and
   reject traditional-only certificates that conflict with it.  This
   mechanism, inspired by HTTP Strict Transport Security (HSTS) but
   operating at the TLS layer provides PQC downgrade protection without
   requiring changes to certificate authority (CA) infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
        </reference>
      </references>
    </references>
    <?line 229?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, Yaron Sheffer, Daniel Van Geest, Samuel Lee, and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
