<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-slhdsa-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Use of SLH-DSA in TLS 1.3">Use of SLH-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="18"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>SLH-DSA</keyword>
    <keyword>FIPS205</keyword>
    <abstract>
      <?line 73?>

<t>This memo specifies how the post-quantum signature scheme SLH-DSA <xref target="FIPS205"/> is used for authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> is a quantum-resistant digital signature scheme standardized by the US National Institute of Standards and Technology (NIST) PQC project.</t>
      <t>This memo specifies how SLH-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
        <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
        <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
      </section>
    </section>
    <section anchor="applicability-of-slh-dsa">
      <name>Applicability of SLH-DSA</name>
      <t>Applications that use SLH-DSA need to be aware that the signature sizes of the algorithms specified in this document are generally large. SLH-DSA offers three security levels: 1, 3, and 5, and two parameter variants for each level:</t>
      <ul spacing="normal">
        <li>
          <t>Small (s) variant, which are optimized for minimal signature size, have signature sizes ranging from 7856 bytes (128-bit) to 29792 bytes (256-bit).</t>
        </li>
        <li>
          <t>Fast (f) variant, optimized for faster key generation and signing, have signature sizes ranging from 17088 bytes (128-bit) to 29792 bytes (256-bit). However, they are slower at signature verification.</t>
        </li>
      </ul>
      <t>Despite offering trade-offs between size and performance, all SLH-DSA variants produce significantly larger signatures than traditional signature algorithms. While SLH-DSA increases the size of the TLS 1.3 handshake, its impact on connection performance is minimal in the context of large data transfers, especially over low-loss networks. For instancee, TLS-based protocols are increasingly used to secure long-lived interfaces in critical infrastructure, such as telecommunication networks. In particular, DTLS-in-SCTP has been mandated in 3GPP for interfaces such as N2 that use long-lived TLS connections.</t>
      <t>In deployments aiming to minimize handshake size, SLH-DSA may still be adopted for signing X.509 certificates while avoiding its use in the CertificateVerify message, which involves generating a signature over the entire TLS handshake transcript. This helps avoid performance concerns related to large signatures or expensive verification. SLH-DSA is well suited for enhancing the post-quantum security of root and intermediate certificates without affecting TLS handshake performance.</t>
      <t>Mechanisms such as Abridged TLS Certificate Chains <xref target="I-D.ietf-tls-cert-abridge"/> and Suppressing CA Certificates <xref target="I-D.kampanakis-tls-scas-latest"/> reduce handshake size by limiting certificate exchange to only end-entity certificates. In such cases, intermediate certificates are assumed to be known to the peer, allowing the use of larger signature algorithms like SLH-DSA for those certificates without adding overhead to the handshake.</t>
    </section>
    <section anchor="slh-dsa-signatureschemes-types">
      <name>SLH-DSA SignatureSchemes Types</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide the equivalent of AES-128, AES-192, and AES-256 level of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>).</t>
      <t>This document specifies the use of the SLH-DSA algorithm in TLS at three security levels. Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce any new hardness assumptions beyond those inherent to its underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the ongoing security of systems and protocols that use SLH-DSA for digital signatures.</t>
      <t>However, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as in signature size, making it a recommended choice for end-entity certificates. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes. Given its well-established hardness assumption, SLH-DSA may be preferred for TLS applications where high confidence in security is a priority, such as for long-lived TLS sessions and deployments where computational costs of signature generation and validation are minor compared to data transmission and processing demands of user data. The findings in <xref target="PQ-TLS-TTLB"/> shows that while PQ algorithms increase the TLS 1.3 handshake data size, their effect on connection performance is minimal for large data transfers, especially in low-loss networks. Additionally, SLH-DSA is suitable for use in CA certificates due to its strong cryptographic assurances and smaller key sizes. Its robustness against emerging quantum attacks makes it a dependable choice for trust anchors and long-term security, even though it has larger signature sizes.</t>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for the negotiation of signature scheme for authentication via the "signature_algorithms" and "signature_algorithms_cert" extensions. This document adds new SignatureSchemes types for the SLH-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  slhdsa_sha2_128s (0x0911),
  slhdsa_sha2_128f (0x0912),
  slhdsa_sha2_192s (0x0913),
  slhdsa_sha2_192f (0x0914),
  slhdsa_sha2_256s (0x0915),
  slhdsa_sha2_256f (0x0916),
  slhdsa_shake_128s (0x0917),
  slhdsa_shake_128f (0x0918),
  slhdsa_shake_192s (0x0919),
  slhdsa_shake_192f (0x091A),
  slhdsa_shake_256s (0x091B),
  slhdsa_shake_256f (0x091C)
} SignatureScheme;
]]></artwork>
      <t>It is important to note that the slhdsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variant HashSLH-DSA, also defined in <xref target="FIPS205"/>.</t>
      <t>SLH-DSA supports two signing modes: deterministic and hedged. In the deterministic mode, the signature is derived solely from the message and the private key, without requiring fresh randomness at signing time, this eliminates dependence on an external random number generator (RNG). It instead uses a precomputed randomness embedded in the private key.  The hedged mode incorporates both fresh randomness generated at signing time, as well as the precomputed randomness, thereby offering somewhat stronger assurances. In the context of TLS, authentication signatures are computed over unique handshake transcripts, making each signature input distinct for every session. This property allows the use of either signing mode. The choice between deterministic and hedged modes does not affect interoperability, as the verification process is the same for both. In both modes, the context parameter defined in Algorithm 22 and Algorithm 24 of <xref target="FIPS205"/> MUST be set to the empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST use id-slh-dsa-sha2-128s, id-slh-dsa-sha2-128f, id-slh-dsa-sha2-192s, id-slh-dsa-sha2-192f, id-slh-dsa-sha2-256s, id-slh-dsa-sha2-256f, id-slh-dsa-shake-128s, id-slh-dsa-shake-128f, id-slh-dsa-shake-192s, id-slh-dsa-shake-192f, id-slh-dsa-shake-256s and id-slh-dsa-shake-256f respectively as defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>}.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="slh-dsa-variant-selection-guidance">
      <name>SLH-DSA Variant Selection Guidance</name>
      <t>When deploying SLH-DSA in TLS 1.3, the choice of variant involves trade-offs among signing speed, verification cost, signature size, and the underlying hash function. The decision depends heavily on the characteristics and constraints of the target environment. If SHAKE is supported and offers acceptable performance, SHAKE-based variants are generally recommended for their performance and flexibility. In environments where SHAKE is unavailable or performs poorly, SHA-2 based variants offer comparable security and are a suitable alternative.</t>
      <t>The choice between "fast" and "small" variants depends on whether signing or verification performance is more critical in the target environment. Fast variants provide significantly faster signing but incur higher verification costs. Conversely, small variants enable more efficient verification but have slower signing performance.</t>
      <t>Security level requirements also guide the selection. If 128-bit security is sufficient, 128-bit variants can be used. For applications requiring higher assurance, 192-bit or 256-bit variants may be more appropriate.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 9 of <xref target="I-D.ietf-lamps-x509-slhdsa"/> need to be taken into account.</t>
      <t>SLH-DSA imposes an upper bound of 2^64 signatures per key. If a key pair were used to sign 10 billion messages per second, it would take over 58 years to sign 2^64 messages. While this limit is extremely large, it may need to be considered if a single SLH-DSA private key was shared between a huge number of TLS servers all making extremely frequent negotiations.</t>
      <section anchor="key-lifetime-management">
        <name>Key Lifetime Management</name>
        <t>In order to maintain cryptographic safety in high-scale environments, deployments MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Rotate SLH-DSA certificates and keys based on expected signature usage, ensuring ample margin from the 2^64 signature limit.</t>
          </li>
          <li>
            <t>Monitor the number of signatures generated per SLH-DSA private key to ensure it <br/>
remains well below the 2^64 signature limit.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests twelve new entries to the TLS Named
Group (or Supported Group) registry, according to the procedures in
Section 6 of <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">slhdsa_sha2_128s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">slhdsa_sha2_128f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0913</td>
            <td align="left">slhdsa_sha2_192s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0914</td>
            <td align="left">slhdsa_sha2_192f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0915</td>
            <td align="left">slhdsa_sha2_256s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0916</td>
            <td align="left">slhdsa_sha2_256f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0917</td>
            <td align="left">slhdsa_shake_128s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0918</td>
            <td align="left">slhdsa_shake_128f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0919</td>
            <td align="left">slhdsa_shake_192s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091A</td>
            <td align="left">slhdsa_shake_192f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091B</td>
            <td align="left">slhdsa_shake_256s</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091C</td>
            <td align="left">slhdsa_shake_256f</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PQ-TLS-TTLB" target="https://www.amazon.science/publications/the-impact-of-data-heavy-post-quantum-tls-1-3-on-the-time-to-last-byte-of-real-world-connections">
          <front>
            <title>The impact of data-heavy, post-quantum TLS 1.3 on the time-to-last-byte of real-world connections.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-cert-abridge">
          <front>
            <title>Abridged Compression for WebPKI Certificates</title>
            <author fullname="Dennis Jackson" initials="D." surname="Jackson">
              <organization>Mozilla</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This draft defines a new TLS Certificate Compression scheme which
   uses a shared dictionary of root and intermediate WebPKI
   certificates.  The scheme smooths the transition to post-quantum
   certificates by eliminating the root and intermediate certificates
   from the TLS certificate chain without impacting trust negotiation.
   It also delivers better compression than alternative proposals whilst
   ensuring fair treatment for both CAs and website operators.  It may
   also be useful in other applications which store certificate chains,
   e.g.  Certificate Transparency logs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-cert-abridge-02"/>
        </reference>
        <reference anchor="I-D.kampanakis-tls-scas-latest">
          <front>
            <title>Suppressing CA Certificates in TLS 1.3</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="5" month="January" year="2023"/>
            <abstract>
              <t>   A TLS client or server that has access to the complete set of
   published intermediate certificates can inform its peer to avoid
   sending certificate authority certificates, thus reducing the size of
   the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
    <?line 213?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, John Mattsson, D.J. Bernstein, Alicja Kario, and Peter Campbell for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
