<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-08"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="02"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="RFC9794"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature scheme standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with a traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="RFC9794"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
        <t>In this document, “composite ML-DSA” refers to a composite ML-DSA signature scheme as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes">
      <name>ML-DSA SignatureSchemes</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature schemes for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureScheme values for composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  /* ECDSA-based Composite */ 
  mldsa44_ecdsa_secp256r1_sha256 (TBD1),
  mldsa65_ecdsa_secp256r1_sha512 (TBD2), 
  mldsa65_ecdsa_secp384r1_sha512 (TBD3), 
  mldsa87_ecdsa_secp384r1_sha512 (TBD4), 

  /* EdDSA-based Composite */
  mldsa44_ed25519_sha512 (TBD5),
  mldsa65_ed25519_sha512 (TBD6),
  mldsa87_ed448_shake256 (TBD7),

  /* RSA-PKCS1-based Composite (for signature_algorithms_cert ONLY) */
  mldsa44_rsa2048_pkcs1_sha256 (TBD8),
  mldsa65_rsa3072_pkcs1_sha512 (TBD9),
  mldsa65_rsa4096_pkcs1_sha512 (TBD10),

  /* RSA-PSS-based Composite (for CertificateVerify and Certificates) */
  mldsa44_rsa2048_pss_pss_sha256 (TBD11),
  mldsa65_rsa3072_pss_pss_sha512 (TBD12),
  mldsa87_rsa3072_pss_pss_sha512 (TBD13), 
  mldsa65_rsa4096_pss_pss_sha512 (TBD14), 
  mldsa87_rsa4096_pss_pss_sha512 (TBD15)  
  
} SignatureScheme;

]]></artwork>
      <t>This document follows the existing TLS SignatureScheme naming convention. SignatureScheme names are used only as identifiers for negotiation and registry purposes and do not imply TLS-level processing semantics.</t>
      <t>Unlike traditional TLS signature schemes such as RSA or ECDSA, TLS does not apply or select a hash function when using Composite ML-DSA. Composite ML-DSA is treated as an opaque signature algorithm, similar to Ed25519 and Ed448, which are specified in TLS 1.3 as "PureEdDSA" algorithms (<xref section="4.2.3" sectionFormat="of" target="RFC8446"/>). Any hash functions used as part of the composite signature construction are fully determined by the composite algorithm associated with the negotiated TLS SignatureScheme and are internal to the Composite ML-DSA algorithm.</t>
      <t>In composite ML-DSA schemes, the trailing portion of the SignatureScheme name identifies the traditional signature algorithm used as part of the composite construction. This identification is for algorithm selection
and interoperability purposes only and does not imply any TLS-level processing of the traditional component.</t>
      <t>The explicit RSA key size (for example, RSA2048, RSA3072, or RSA4096) is included in the SignatureScheme name solely to uniquely identify the composite algorithm and to align with the composite algorithm definitions
in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Each entry specifies a unique combination of an ML-DSA parameter set (ML-DSA-44, ML-DSA-65, or ML-DSA-87, as defined in <xref target="FIPS204"/>) and a traditional signature algorithm. The mldsa* identifiers refer to the pure ML-DSA variants and MUST NOT be confused with prehashed variants (for example, HashML-DSA-44).</t>
      <t>Sections <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.3" sectionFormat="bare"/> of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> define a context string parameter for signing and verification using Composite ML-DSA. When Composite ML-DSA signature algorithms are used in TLS, both
signing and verification MUST use an empty context string. TLS already provides protocol-level domain separation by signing a protocol-specific context string together with the handshake transcript (<xref section="4.4.3" sectionFormat="of" target="RFC8446"/>).</t>
      <t>The signature in the CertificateVerify message MUST be computed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>When a composite ML-DSA signature scheme defined in this document is negotiated, the TLS 1.3 CertificateVerify signing input constructed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/> MUST be provided as the message input M to the Composite-ML-DSA.Sign function defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The composite signature construction then applies its domain separation, labeling, and pre-hash function as specified by the composite algorithm identifier. Any pre-hash function applied as part of the composite signature construction is determined by the composite algorithm identifier defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and is independent of the TLS SignatureScheme name.</t>
      <t>The Trad.Sign operation, as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, MUST be performed using the
parameters associated with the composite algorithm corresponding to the negotiated TLS SignatureScheme.</t>
      <t>Upon receipt of the CertificateVerify message, the peer MUST verify the signature by applying the corresponding Composite-ML-DSA.Verify function to the received signature and the locally constructed TLS 1.3 CertificateVerify signing input, in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST use the First AlgorithmID and Second AlgorithmID respectively as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are a restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
      <section anchor="mapping-tls-signatureschemes-to-composite-ml-dsa">
        <name>Mapping TLS SignatureSchemes to Composite ML-DSA</name>
        <t>The following table provides a mapping between the TLS <tt>SignatureScheme</tt>
identifiers defined in this document and the corresponding composite
algorithm identifiers defined in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>. Each composite algorithm combines
ML-DSA with a traditional signature algorithm and hash function.</t>
        <table>
          <thead>
            <tr>
              <th align="left">TLS SignatureScheme</th>
              <th align="left">Composite ML-DSA Algorithm Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
              <td align="left">id-MLDSA44-ECDSA-P256-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P256-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA87-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_ed25519_sha512</td>
              <td align="left">id-MLDSA44-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ed25519_sha512</td>
              <td align="left">id-MLDSA65-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ed448_shake256</td>
              <td align="left">id-MLDSA87-Ed448-SHAKE256</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PSS-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pss_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa3072_pss_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pss_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa4096_pss_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PKCS15-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pkcs1_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PKCS15-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pkcs1_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PKCS15-SHA512</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> need
to be taken into account.</t>
      <t>Ed25519 and Ed448 provide SUF security properties which, when used as a component in a composite construction, may continue to provide resilience even if weaknesses are later discovered in ML-DSA, at least until CRQCs
emerge. Applications that prioritize SUF security may benefit from using them in composite with ML-DSA to
mitigate risks if ML-DSA is eventually broken.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such scenarios, an attacker with access to a CRQC could forge a traditional server certificate and impersonate the server. If the client continues to accept traditional-only certificates for backward compatibility, it remains exposed to this risk.</t>
      <t>While broader deployment of composite or post-quantum certificates will reduce this exposure, clients remain vulnerable unless stricter authentication continuity policies are enforced. A coordinated “flag day” in which all traditional-only certificates are simultaneously phased out is unlikely due to real-world deployment constraints. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> addresses this deployment challenge by allowing clients to cache and enforce a server’s support for post-quantum or composite authentication, thereby preventing fallback to traditional-only authentication in subsequent connections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">mldsa44_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">mldsa65_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">mldsa87_ed448_shake256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD9</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD10</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD11</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD12</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD13</td>
            <td align="left">mldsa87_rsa3072_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD14</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD15</td>
            <td align="left">mldsa87_rsa4096_pss_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha512, and mldsa65_rsa4096_pkcs1_sha512 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   As the Internet transitions toward post-quantum cryptography (PQC),
   many TLS servers will continue supporting traditional certificates to
   maintain compatibility with legacy clients.  However, this
   coexistence introduces a significant vulnerability: an undetected
   rollback attack, where a malicious actor strips the PQC or Composite
   certificate and forces the use of a traditional certificate once
   quantum-capable adversaries exist.

   To defend against this, this document defines a TLS extension that
   allows a client to cache a server's declared commitment to present
   PQC or composite certificates for a specified duration.  On
   subsequent connections, clients enforce that cached commitment and
   reject traditional-only certificates that conflict with it.  This
   mechanism, inspired by HTTP Strict Transport Security (HSTS) but
   operating at the TLS layer provides PQC downgrade protection without
   requiring changes to certificate authority (CA) infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
        </reference>
      </references>
    </references>
    <?line 267?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, Yaron Sheffer, Daniel Van Geest, Samuel Lee, and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
