<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="PQC Recommendations for Applications">Post-Quantum Cryptography Recommendations for Internet Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>Hybrid</keyword>
    <abstract>
      <?line 50?>

<t>Post-quantum cryptography brings some new challenges to applications, end users, and system administrators.
This document describes characteristics unique to application protocols and best practices for deploying
Quantum-Ready usage profiles for applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet largely consists of services that employ a client-server architecture in which a client communicates with an application service.  When a client communicates with an application service using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or a protocol built on those (QUIC <xref target="RFC9001"/> being a notable example), the client and server can perform ephemeral public-key exchange mechanism, such as ECDH, to derive the shared secret for forward secrecy. They can validate each other's identity using X.509 certificates to establish secure communication.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. This means there is a requirement to update protocols and infrastructure to use post-quantum algorithms, which are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The industry has successfully upgraded TLS versions while deprecating old versions (e.g., SSLv2), and many
protocols have transitioned from RSA to Elliptic Curve Cryptography (ECC) improving security while also reducing key sizes. The transition to post-quantum crypto brings different challenges, most significantly, the new Post-Quantum algorithms:</t>
      <ol spacing="normal" type="1"><li>
          <t>are not fully trusted</t>
        </li>
        <li>
          <t>use larger key sizes</t>
        </li>
        <li>
          <t>have higher CPU and memory utilization</t>
        </li>
      </ol>
      <t>All applications transmitting messages over untrusted networks can be susceptible to active or passive attacks by adversaries using CRQCs, with varying degrees of significance for both users and the underlying systems. This document explores Quantum-Ready usage profiles for applications specifically designed to defend against passive and on-path attacks employing CRQCs. TLS client and server implementations, as well as applications, can mitigate the impact of these challenges through various techniques described in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this
document, it is helpful to be able to divide cryptographic algorithms
into three classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based
on integer factorisation, finite field discrete logarithms or elliptic
curve discrete logarithms. In the context of TLS, examples of
traditional key exchange algorithms include Elliptic Curve
Diffie-Hellman (ECDH); which is almost always used in the ephemeral mode referred to 
as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include the Module-Lattice Key Encapsulation Mechanism (ML-KEM), which is widely known as Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two component
key exchange algorithms -- one traditional algorithm and one
Post-Quantum algorithm.  The final shared secret key is secure when at
least one of the component key exchange algorithms remains
unbroken. It is referred to as PQ/T Hybrid Scheme in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>The same categories also apply to digital signature algorithms as used in X.509 certificates, Certificate Transparency SCTs, OCSP statements, Remote Attestations, and any other mechanism that contributes signatures to a TLS handshake.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for transition</name>
      <t>The timeline and driving motivation for Quantum-Ready transition differ between data confidentiality and data authentication (e.g., signature). Digital signatures are used within X.509 certificates, Certificate Revocation Lists (CRLs), and to sign messages.</t>
      <t>Encrypted payloads transmitted via Transport Layer Security (TLS) can be susceptible to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange and the transmitted ciphertext. TLS implementations commonly utilize Diffie-Hellman schemes for key exchange. If an attacker has copies of an entire set of encrypted payloads, including the TLS setup, it could employ CRQCs to potentially decrypt the payload by determining the private key.</t>
      <t>For data confidentiality, we are concerned with the so-called "Harvest Now, Decrypt Later" attack where a malicious actor with adequate resources can launch an attack to store encrypted data today that can be decrypted once a CRQC is available. This implies that, even today, encrypted data is susceptible to the attack by not implementing quantum-safe strategies, as it corresponds to data being deciphered in the future. The storage time and effective security lifetime of this encrypted data might vary from seconds to decades.</t>
      <t>In client/server certificate-based authentication, it's common for the certificate's signature in the handshake to have a very short lifetime. This means that the time between the certificate signing the CertificateVerify message and its verification by the peer during the TLS handshake is limited. However, it's worth questioning the security lifetime of the digital signatures on X.509 certificates, including those issued by root Certificate Authorities (CAs). Root CAs can have lifetimes of 20 years or more. Additionally, root Certificate Revocation Lists (CRLs) may have lifetimes of a year or more, while delegated credentials like CRL Signing Certificates or OCSP response signing certificates can have lifetimes that fall anywhere in between.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>The migration to PQC is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve, will fall to quantum cryptanalysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues (when certified implementations will be commercially available), unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types. The primary goal of a hybrid key exchange mechanism is to facilitate
the establishment of a shared secret which remains secure as long as as one of the component key exchange mechanisms remains unbroken.</t>
      <t><xref target="I-D.ietf-tls-hybrid-design"/> provides a construction for hybrid key exchange in TLS 1.3. It fulfils the primary goal of hybrid key exchange, with additional objectives discussed in Section 1.5 of the same document.</t>
      <t>Applications <bcp14>MUST</bcp14> migrate to TLS 1.3 and support the hybrid key exchange, as defined in <xref target="I-D.ietf-tls-hybrid-design"/>. In the future, we anticipate a shift away from traditional cryptographic algorithms in favor of post-quantum algorithms. This transition is expected to provide benefits in terms of CPU efficiency and reduced data transmission overhead compared to hybrid key exchange.</t>
      <t>The client initiates the TLS handshake by sending a list of key agreement methods it supports in the key_share extension. One of the challenges during the PQC migration is that the client may not know whether the server supports the Hybrid key exchange. To address this uncertainty, the client can adopt one of two strategies:</t>
      <ol spacing="normal" type="1"><li>
          <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the first ClientHello message, the client can send both traditional and hybrid key exchange algorithm key shares to the server, avoiding the need for multiple round trips. However, this approach requires the client to perform additional computations.</t>
        </li>
        <li>
          <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message.</t>
        </li>
      </ol>
      <t>In order to avoid fragmentation of ClientHello message, the client would have to prevent the duplication of PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>While CRQCs could decrypt previous TLS sessions, client/server authentication based on certificates cannot be retroactively broken. However, given the multi-year lead-time required to establish, certify, and embed new root CAs, it would be difficult to react in a timely manner if CRQCs come online sooner than anticipated. So while PQ migration of X.509 certificates has more time than key exchanges, we should not delay this work for too long.</t>
      <t>The Quantum-Ready authentication property can be utilized in scenarios where an on-path attacker possesses network devices equipped with CRQCs, capable of breaking traditional authentication protocols. If an attacker uses CRQC to determine the private key of a server certificate before the certificate expiry, the attacker can create a fake server, and then every user will think that their connection is legitimate. The server impersonation leads to various security threats, including impersonation, data disclosure, and the interception of user data and communications.</t>
      <t>The Quantum-Ready authentication property ensures authentication through either a pure Post-Quantum or a PQ/T hybrid Certificate. A Post-Quantum X.509 Certificate using Module-Lattice Digital Signature Algorithm (ML-DSA), also called Dilithium, is defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The PQ/T Hybrid Authentication property is currently still under active exploration and discussion in the LAMPS WG, and consensus may evolve over time regarding its adoption.</t>
      <t>To decide whether and when to support a Post-Quantum Certificate (PQC) or a PQ/T hybrid scheme for client and server authentication, it is important to consider factors such as the frequency and duration of system upgrades, as well as the anticipated availability of CRQCs. For example, applications that have extremely short key lifetimes -- for example less than an hour -- may decide that it is an acceptable risk to leave those on Traditional algorithms for the foreseeable future under the assumption that quantum key factoring attacks take longer to run than the key lifetimes. It may be advantageous to explore heterogeneous PKI architectures where the long-lived CAs are using Post-Quantum algorithms but the server and client certificates are not.</t>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. This page or alert should be served over the same TLS session. The message can inform the end-user that their client is not compatible with the PQC security features offered by the server.</t>
      <t>Similarly, when the client detects that the server doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. The message can inform the end-user that the server is not compatible with the PQC security features offered by the client.</t>
    </section>
    <section anchor="application-protocols">
      <name>Application Protocols</name>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks for end users exchanging DNS messages in clear text are discussed in <xref target="RFC7518"/>. Transport Layer Security (TLS) is employed to ensure privacy for DNS. DNS encryption provided by TLS (e.g., DNS-over-HTTPS, DNS-over-TLS, DNS-over-QUIC) eliminates opportunities for eavesdropping and on-path tampering while in transit through the network.</t>
        <t>Encrypted DNS messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted DNS messages, including the TLS setup, it could use a CRQC to potentially decrypt the message content by determining the ephemeral key exchange private key.</t>
        <t>Encrypted DNS protocols will have to support the Quantum-Ready usage profile discussed in {#confident}.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke">
        <name>Hybrid public-key encryption (HPKE)</name>
        <t>Hybrid public-key encryption (HPKE) is a scheme that provides public key encryption of arbitrary-sized plaintexts given a recipient's public key. HPKE utilizes a non-interactive ephemeral-static Diffie-Hellman exchange to establish a shared secret.  The motivation for standardizing a public key encryption scheme is explained in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>. Kyber, which is a KEM does not support the static-ephemeral key exchange that allows HPKE based on DH based KEMs.</t>
        <section anchor="ech">
          <name>Interaction with Encrypted Client Hello</name>
          <t>Client TLS libraries and applications can use Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity in the TLS handshake which requires also deploying encrypted DNS (DNS over TLS), otherwise a passive listener can observe DNS queries (or responses) and infer same server identity that was being protected with ECH. ECH uses HPKE for public key encryption.</t>
          <t>ECH <bcp14>MUST</bcp14> incorporate support for hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
        </section>
        <section anchor="oblivious-http">
          <name>Oblivious HTTP</name>
          <t>Oblivious HTTP <xref target="I-D.ietf-ohai-ohttp"/> allows clients to encrypt messages exchanged with an Oblivious Target Resource (target). The messages are encapsulated in encrypted messages to an Oblivious Gateway Resource (gateway), which offers Oblivious HTTP access to the target. The gateway is accessed via an Oblivious Relay Resource (relay), which proxies the encapsulated messages to hide the identity of the client. Overall, this architecture is designed in such a way that the relay cannot inspect the contents of messages, and the gateway and target cannot learn the client's identity from a single transaction. Oblivious HTTP uses HPKE for encapsulating binary HTTP messages to protect their contents.</t>
          <t>Oblivious HTTP is vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the HPKE. If an attacker possesses copies of an entire set of encapsulated HTTP messages, it could use CRQC to potentially decrypt the message content by determining the private key. The attacker can potentially be the Oblivious Relay Resource.</t>
          <t>The "ohttp" SvcParamKey defined in <xref target="I-D.ietf-ohai-svcb-config"/> is used to indicate that a service described in an SVCB RR can be accessed as a target using an associated gateway. For the "dns" scheme, as defined in <xref target="I-D.draft-ietf-add-svcb-dns"/>, the presence of the "ohttp" parameter means that the DNS server being described has a DNS over HTTP (DoH) <xref target="RFC8484"/> service that can be accessed using Oblivious HTTP.</t>
          <t>Oblivious HTTP and DNS over Oblivious HTTP <bcp14>MUST</bcp14> incorporate support for hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
        </section>
        <section anchor="mls">
          <name>MLS</name>
          <t>TODO</t>
        </section>
      </section>
      <section anchor="webrtc">
        <name>WebRTC</name>
        <t>In WebRTC, secure channels are setup via DTLS and DTLS-SRTP <xref target="RFC5763"/> keying for SRTP <xref target="RFC3711"/> for media channels and the Stream Control Transmission Protocol (SCTP) over DTLS <xref target="RFC8261"/> for data channels.</t>
        <t>Secure channels may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the DTLS key exchange. If an attacker possesses copies of an entire set of encrypted media, including the DTLS setup, it could use CRQC to potentially decrypt the media by determining the private key.</t>
        <t>WebRTC media and data channels <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>The other challenge with WebRTC is that PQC KEMs often come with large public keys and PQC Signature schemes come with large signatures in comparison with traditional algorithms (as discussed in Section 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). In many cases, UDP datagrams are restricted to sizes smaller than 1500 bytes. If IP fragmentation needs to be avoided, each DTLS handshake message must be fragmented over several DTLS records, with each record intended to fit within a single UDP datagram. This approach could potentially lead to increased time to complete the DTLS handshake and involve multiple round-trips in lossy networks. It may also extend the time required to set up secure WebRTC channels. One potential mitigation strategy to avoid the delay is to prevent the duplication PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      </section>
      <section anchor="https">
        <name>HTTPS</name>
        <t>HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP used for secure data exchange over the web. HTTPS primarily relies on the TLS (Transport Layer Security) protocol to provide encryption, integrity, and authenticity for data in transit.</t>
        <t>HTTP messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted HTTP messages, including the TLS setup, it could use CRQC to potentially decrypt the message content by determining the private key. This traffic can include sensitive information, such as login credentials, personal data, or financial details, depending on the nature of the communication.</t>
        <t>If an attacker can decrypt the message content before the expiry of the login credentials, the attacker can steal the credentials. The theft of login credentials is a serious security concern that can have a wide range of consequences for individuals and organizations. The most immediate and obvious challenge is that the attacker gains unauthorized access to the victim's accounts, systems, or data. This can lead to data breaches, privacy violations, and various forms of cybercrime.</t>
        <t>Applications using HTTPS to exchange sensitive data <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}. If the data is genuinely non-sensitive and has no privacy or security implications, the motivation for an attacker to invest resources in capturing and later decrypting it would likely be very low. In such cases, the "Harvest Now, Decrypt Later" attack may not be relevant. In similar lines, reverse proxies operated between clients and origin servers will also have to support {#confident}.</t>
      </section>
      <section anchor="email-submission">
        <name>Email Submission</name>
        <t>TLS support for Email Submission/Access is described in <xref section="3.3" sectionFormat="of" target="RFC8314"/>.  There are no specific recommendations for SUBMISSION beyond <xref target="ech"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Post-quantum algorithms selected for standardization are relatively
new and they they have not been subject to the same depth of study as
traditional algorithms. PQC implementations will also be new and
therefore more likely to contain implementation bugs than the
battle-tested crypto implementations that we rely on today. In
addition, certain deployments may need to retain traditional
algorithms due to regulatory constraints, for example FIPS
<xref target="SP-800-56C"/> or PCI compliance. Hybrid key exchange enables
potential security against "Harvest Now, Decrypt Later" attack provide
for time to react in the case of the announcement of a devastating
attack against any one algorithm, while not fully abandoning
traditional cryptosystems.</t>
      <t>Implementing hybrid modes improperly can introduce security issues at the cryptographic layer, for example how the Traditional and PQ schemes are combined; at the algorithm selection layer, mismatched security levels for example if 192-bit KEM is used with a 128-bit secure combiner; or at the protocol layer in how the upgrade/downgrade mechanism works. Hybrid mechanisms should be implemented carefully and all relevant specifications implemented correctly.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting wider document scope. Thanks to Mike Ounsworth for early review and feedback.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.draft-ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC5763">
          <front>
            <title>Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)</title>
            <author fullname="J. Fischl" initials="J." surname="Fischl"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies how to use the Session Initiation Protocol (SIP) to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signaling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5763"/>
          <seriesInfo name="DOI" value="10.17487/RFC5763"/>
        </reference>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC8261">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a transport protocol originally defined to run on top of the network protocols IPv4 or IPv6. This document specifies how SCTP can be used on top of the Datagram Transport Layer Security (DTLS) protocol. Using the encapsulation method described in this document, SCTP is unaware of the protocols being used below DTLS; hence, explicit IP addresses cannot be used in the SCTP control chunks. As a consequence, the SCTP associations carried over DTLS can only be single-homed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8261"/>
          <seriesInfo name="DOI" value="10.17487/RFC8261"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for Dilithium</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="7" month="August" year="2023"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using Dilithium quantum-resistant
   signatures in Internet X.509 certificates and certificate revocation
   lists.  The conventions for the associated post-quantum signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-02"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00-02">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-17"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-ohttp">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>   This document describes Oblivious HTTP, a protocol for forwarding
   encrypted HTTP messages.  Oblivious HTTP allows a client to make
   multiple requests to an origin server without that server being able
   to link those requests to the client or to identify the requests as
   having come from the same client, while placing only limited trust in
   the nodes used to forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-10"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-svcb-config">
          <front>
            <title>Discovery of Oblivious Services via Service Binding Records</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="6" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a parameter that can be included in SVCB and
   HTTPS DNS resource records to denote that a service is accessible
   using Oblivious HTTP, by offering an Oblivious Gateway Resource
   through which to access the target.  This document also defines a
   mechanism to learn the key configuration of the discovered Oblivious
   Gateway Resource.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-07"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
