<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-slhdsa-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Use of SLH-DSA in TLS 1.3">Use of SLH-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="13"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>SLH-DSA</keyword>
    <keyword>FIPS205</keyword>
    <abstract>
      <?line 71?>

<t>This memo specifies how the post-quantum signature scheme SLH-DSA <xref target="FIPS205"/> is used for authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> is a quantum-resistant digital signature scheme standardized by the US National Institute of Standards and Technology (NIST) PQC project.</t>
      <t>This memo specifies how SLH-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
        <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
        <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
      </section>
    </section>
    <section anchor="slh-dsa-signatureschemes-types">
      <name>SLH-DSA SignatureSchemes Types</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in TLS at each level.</t>
      <t>This document specifies the use of the SLH-DSA algorithm in TLS at three security levels. Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce any new hardness assumptions beyond those inherent to its underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the ongoing security of systems and protocols that use SLH-DSA for digital signatures.</t>
      <t>However, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as in signature size, making it a recommended choice for end-entity certificates. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes. Given its well-established hardness assumption, SLH-DSA may be preferred for TLS applications where high confidence in security is a priority, such as for long-lived TLS sessions and deployments where computational costs of signature generation and validation are minor compared to data transmission and processing demands of user data. The findings in <xref target="PQ-TLS-TTLB"/> shows that while PQ algorithms increase the TLS 1.3 handshake data size, their effect on connection performance is minimal for large data transfers, especially in low-loss networks. Additionally, SLH-DSA is suitable for use in CA certificates due to its strong cryptographic assurances and smaller key sizes. Its robustness against emerging quantum attacks makes it a dependable choice for trust anchors and long-term security, even though it has larger signature sizes.</t>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for the negotiation of signature scheme for authentication via the "signature_algorithms" and "signature_algorithms_cert" extensions. This document adds new SignatureSchemes types for the SLH-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  slhdsa_sha2_128s (0x0911),
  slhdsa_sha2_128f (0x0912),
  slhdsa_sha2_192s (0x0913),
  slhdsa_sha2_192f (0x0914),
  slhdsa_sha2_256s (0x0915),
  slhdsa_sha2_256f (0x0916),
  slhdsa_shake_128s (0x0917),
  slhdsa_shake_128f (0x0918),
  slhdsa_shake_192s (0x0919),
  slhdsa_shake_192f (0x091A),
  slhdsa_shake_256s (0x091B),
  slhdsa_shake_256f (0x091C)
} SignatureScheme;
]]></artwork>
      <t>It is important to note that the slhdsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variant HashSLH-DSA, also defined in <xref target="FIPS205"/>.</t>
      <t>SLH-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time. While this eliminates dependence on an external random number generator (RNG), it may increase susceptibility to side-channel attacks, such as fault injection. The hedged mode mitigates this risk by incorporating both fresh randomness generated at signing time and precomputed randomness embedded in the private key, thereby offering stronger protection against such attacks. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The hedged signing mode can be leveraged to provide protection against side-channel attacks. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 22 and Algorithm 24 of <xref target="FIPS205"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST use id-slh-dsa-sha2-128s, id-slh-dsa-sha2-128f, id-slh-dsa-sha2-192s, id-slh-dsa-sha2-192f, id-slh-dsa-sha2-256s, id-slh-dsa-sha2-256f, id-slh-dsa-shake-128s, id-slh-dsa-shake-128f, id-slh-dsa-shake-192s, id-slh-dsa-shake-192f, id-slh-dsa-shake-256s and id-slh-dsa-shake-256f respectively as defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>}.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 8 of <xref target="I-D.ietf-lamps-x509-slhdsa"/> needs to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">slhdsa_sha2_128s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">slhdsa_sha2_128f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0913</td>
            <td align="left">slhdsa_sha2_192s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0914</td>
            <td align="left">slhdsa_sha2_192f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0915</td>
            <td align="left">slhdsa_sha2_256s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0916</td>
            <td align="left">slhdsa_sha2_256f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0917</td>
            <td align="left">slhdsa_shake_128s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0918</td>
            <td align="left">slhdsa_shake_128f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0919</td>
            <td align="left">slhdsa_shake_192s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091A</td>
            <td align="left">slhdsa_shake_192f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091B</td>
            <td align="left">slhdsa_shake_256s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091C</td>
            <td align="left">slhdsa_shake_256f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="11" month="April" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries that do not already have a
   "Comments" column.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-12"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PQ-TLS-TTLB" target="https://www.amazon.science/publications/the-impact-of-data-heavy-post-quantum-tls-1-3-on-the-time-to-last-byte-of-real-world-connections">
          <front>
            <title>The impact of data-heavy, post-quantum TLS 1.3 on the time-to-last-byte of real-world connections.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
      </references>
    </references>
    <?line 179?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, John Mattsson, D.J. Bernstein, Alicja Kario, and Peter Campbell for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
