<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="PQC Recommendations for Applications">Post-Quantum Cryptography Recommendations for Internet Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="05"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 51?>

<t>Post-quantum cryptography brings some new challenges to applications, end users, and system administrators.
This document describes characteristics unique to application protocols and best practices for deploying
Quantum-Ready usage profiles for applications using TLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet largely consists of services that employ a client-server architecture in which a client communicates with an application service.  When a client communicates with an application service using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or a protocol built on those (QUIC <xref target="RFC9001"/> being a notable example), the client and server can perform ephemeral public-key exchange mechanism, such as ECDH, to derive the shared secret for forward secrecy. They can validate each other's identity using X.509 certificates to establish secure communication.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. This means there is a requirement to update protocols and infrastructure to use post-quantum algorithms, which are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The industry has successfully upgraded TLS versions while deprecating old versions (e.g., SSLv2), and many
protocols have transitioned from RSA to Elliptic Curve Cryptography (ECC) improving security while also reducing key sizes. The transition to post-quantum crypto brings different challenges, most significantly, the new Post-Quantum algorithms:</t>
      <ol spacing="normal" type="1"><li>
          <t>are still being evaluated against both classical and post-quantum attacks,</t>
        </li>
        <li>
          <t>use larger key sizes (which increases handshake packet size), and</t>
        </li>
        <li>
          <t>have higher CPU utilization than traditional algorithms.</t>
        </li>
      </ol>
      <t>All applications transmitting messages over untrusted networks can be susceptible to active or passive attacks by adversaries using CRQCs, with varying degrees of significance for both users and the underlying systems. This document explores Quantum-Ready usage profiles for applications specifically designed to defend against passive and on-path attacks employing CRQCs. TLS client and server implementations, as well as applications, can mitigate the impact of these challenges through various techniques described in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this
document, it is helpful to be able to divide cryptographic algorithms
into three classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based
on integer factorisation, finite field discrete logarithms or elliptic
curve discrete logarithms. In the context of TLS, examples of
traditional key exchange algorithms include Elliptic Curve
Diffie-Hellman (ECDH); which is almost always used in the ephemeral mode referred to
as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include the Module-Lattice Key Encapsulation Mechanism (ML-KEM), which is widely known as Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two component
key exchange algorithms -- one traditional algorithm and one
Post-Quantum algorithm.  The final shared secret key is secure when at
least one of the component key exchange algorithms remains
unbroken. It is referred to as PQ/T Hybrid Scheme in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>The same categories also apply to digital signature algorithms as used in X.509 certificates, Certificate Transparency SCTs, OCSP statements, Remote Attestations, and any other mechanism that contributes signatures to a TLS handshake.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for transition</name>
      <t>The timeline and driving motivation for Quantum-Ready transition differ between data confidentiality and data authentication (e.g., signature). Digital signatures are used within X.509 certificates, Certificate Revocation Lists (CRLs), and to sign messages.</t>
      <t>Encrypted payloads transmitted via Transport Layer Security (TLS) can be susceptible to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange and the transmitted ciphertext. TLS implementations commonly utilize Diffie-Hellman schemes for key exchange. If an attacker has copies of an entire set of encrypted payloads, including the TLS setup, it could employ CRQCs to potentially decrypt the payload by determining the private key.</t>
      <t>For data confidentiality, we are concerned with the so-called "Harvest Now, Decrypt Later" attack where a malicious actor with adequate resources can launch an attack to store encrypted data today that can be decrypted once a CRQC is available. This implies that, even today, encrypted data is susceptible to the attack by not implementing quantum-safe strategies, as it corresponds to data being deciphered in the future. The storage time and effective security lifetime of this encrypted data might vary from seconds to decades.</t>
      <t>In client/server certificate-based authentication, it's common for the certificate's signature in the handshake to have a very short lifetime. This means that the time between the certificate signing the CertificateVerify message and its verification by the peer during the TLS handshake is limited. However, it's worth questioning the security lifetime of the digital signatures on X.509 certificates, including those issued by root Certificate Authorities (CAs). Root CAs can have lifetimes of 20 years or more. Additionally, root Certificate Revocation Lists (CRLs) may have lifetimes of a year or more, while delegated credentials like CRL Signing Certificates or OCSP response signing certificates can have lifetimes that fall anywhere in between.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may need to be protected for lifetimes measured in years.
The possibility of CRQCs being developed means that we need to move away from traditional algorithms,
but at the same time uncertainty about post-quantum algorithm implementation security, lag in standardization, regulatory requirements, and maturity of cryptanalysis may require the continued use of mature traditional algorithms alongside the new post-quantum primitives.</t>
      <t>The primary goal of a hybrid key exchange mechanism is to facilitate
the establishment of a shared secret which remains secure as long as one of the component key exchange mechanisms remains unbroken.</t>
      <t><xref target="I-D.ietf-tls-hybrid-design"/> provides a construction for hybrid key exchange in TLS 1.3. It fulfils the primary goal of hybrid key exchange, with additional objectives discussed in Section 1.5 of the same document.</t>
      <t>Applications that use (D)TLS and susceptible to CRQC attack <bcp14>MUST</bcp14> migrate to (D)TLS 1.3 and support the hybrid key exchange, as defined in <xref target="I-D.ietf-tls-hybrid-design"/>. In the future, we anticipate a shift away from traditional cryptographic algorithms in favor of post-quantum algorithms. This transition is expected to provide benefits in terms of CPU efficiency and reduced data transmission overhead compared to hybrid key exchange.</t>
      <t>The client initiates the TLS handshake by sending a list of key agreement methods it supports in the key_share extension. One of the challenges during the PQC migration is that the client may not know whether the server supports the Hybrid key exchange. To address this uncertainty, the client can adopt one of two strategies:</t>
      <ol spacing="normal" type="1"><li>
          <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the first ClientHello message, the client can send both traditional and hybrid key exchange algorithm key shares to the server, avoiding the need for multiple round trips. However, this approach requires the client to perform additional computations and increases handshake traffic.</t>
        </li>
        <li>
          <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message.</t>
        </li>
      </ol>
      <t>Clients <bcp14>MAY</bcp14> use information from completed handshakes to cache the server's preferences for key exchange algorithms (<xref target="RFC8446"/>, section 4.2.7).</t>
      <t>In order to avoid fragmentation of ClientHello message, the client would have to prevent the duplication of PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>While CRQCs could decrypt previous TLS sessions, client/server authentication based on certificates cannot be retroactively broken. However, given the multi-year lead-time required to establish, certify, and embed new root CAs, it would be difficult to react in a timely manner if CRQCs come online sooner than anticipated. So while PQ migration of X.509 certificates has more time than key exchanges, we should not delay this work for too long.</t>
      <t>The Quantum-Ready authentication property can be utilized in scenarios where an on-path attacker possesses network devices equipped with CRQCs, capable of breaking traditional authentication protocols. If an attacker uses CRQC to determine the private key of a server certificate before the certificate expiry, the attacker can create a fake server, and then every user will think that their connection is legitimate. The server impersonation leads to various security threats, including impersonation, data disclosure, and the interception of user data and communications.</t>
      <t>The Quantum-Ready authentication property ensures authentication through either a pure Post-Quantum or a PQ/T hybrid Certificate. A Post-Quantum X.509 Certificate using Module-Lattice Digital Signature Algorithm (ML-DSA), also called Dilithium, is defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. The PQ/T Hybrid Authentication property is currently still under active exploration and discussion in the LAMPS WG, and consensus may evolve over time regarding its adoption.</t>
      <t>To decide whether and when to support a Post-Quantum Certificate (PQC) or a PQ/T hybrid scheme for client and server authentication, it is important to consider factors such as the frequency and duration of system upgrades, as well as the anticipated availability of CRQCs. For example, applications that have extremely short key lifetimes -- for example less than an hour -- may decide that it is an acceptable risk to leave those on Traditional algorithms for the foreseeable future under the assumption that quantum key factoring attacks take longer to run than the key lifetimes. It may be advantageous to explore heterogeneous PKI architectures where the long-lived CAs are using Post-Quantum algorithms but the server and client certificates are not.</t>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client doesn't support PQC or hybrid key exchange, it can send an 'insufficient_security' fatal alert to the client. The client can inform the end-users that the server they are trying to access requires a level of security that the client cannot provide due to the lack of PQC support. Furthermore, the client may log the event for diagnostic and security auditing purposes and report the security-related issue to the client development team.</t>
      <t>Similarly, when the client detects that the server doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. The message can inform the end-user that the server is not compatible with the PQC security features offered by the client.</t>
    </section>
    <section anchor="application-protocols">
      <name>Application Protocols</name>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks for end users exchanging DNS messages in clear text are discussed in <xref target="RFC7518"/>. Transport Layer Security (TLS) is employed to ensure privacy for DNS. DNS encryption provided by TLS (e.g., DNS-over-HTTPS, DNS-over-TLS, DNS-over-QUIC) eliminates opportunities for eavesdropping and on-path tampering while in transit through the network.</t>
        <t>Encrypted DNS messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted DNS messages, including the TLS setup, it could use a CRQC to potentially decrypt the message content by determining the ephemeral key exchange private key.</t>
        <t>Encrypted DNS protocols will have to support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>Note that post-quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a separate issue from the requirements for encrypted DNS transports.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke">
        <name>Hybrid public-key encryption (HPKE)</name>
        <t>Hybrid public-key encryption (HPKE) is a scheme that provides public key encryption of arbitrary-sized plaintexts given a recipient's public key. HPKE utilizes a non-interactive ephemeral-static Diffie-Hellman exchange to establish a shared secret.  The motivation for standardizing a public key encryption scheme is explained in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>. Kyber, which is a KEM does not support the static-ephemeral key exchange that allows HPKE based on DH based KEMs.</t>
        <section anchor="ech">
          <name>Interaction with Encrypted Client Hello</name>
          <t>Client TLS libraries and applications can use Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity in the TLS handshake which requires also deploying encrypted DNS (DNS over TLS), otherwise a passive listener can observe DNS queries (or responses) and infer same server identity that was being protected with ECH. ECH uses HPKE for public key encryption.</t>
          <t>ECH <bcp14>MUST</bcp14> incorporate support for PQ/T Hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
        </section>
        <section anchor="oblivious-http">
          <name>Oblivious HTTP</name>
          <t>Oblivious HTTP <xref target="I-D.ietf-ohai-ohttp"/> allows clients to encrypt messages exchanged with an Oblivious Target Resource (target). The messages are encapsulated in encrypted messages to an Oblivious Gateway Resource (gateway), which offers Oblivious HTTP access to the target. The gateway is accessed via an Oblivious Relay Resource (relay), which proxies the encapsulated messages to hide the identity of the client. Overall, this architecture is designed in such a way that the relay cannot inspect the contents of messages, and the gateway and target cannot learn the client's identity from a single transaction. Oblivious HTTP uses HPKE for encapsulating binary HTTP messages to protect their contents.</t>
          <t>Oblivious HTTP is vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the HPKE. If an attacker possesses copies of an entire set of encapsulated HTTP messages, it could use CRQC to potentially decrypt the message content by determining the private key. The attacker can potentially be the Oblivious Relay Resource.</t>
          <t>The "ohttp" SvcParamKey defined in <xref target="I-D.ietf-ohai-svcb-config"/> is used to indicate that a service described in an SVCB RR can be accessed as a target using an associated gateway. For the "dns" scheme, as defined in <xref target="I-D.draft-ietf-add-svcb-dns"/>, the presence of the "ohttp" parameter means that the DNS server being described has a DNS over HTTP (DoH) <xref target="RFC8484"/> service that can be accessed using Oblivious HTTP.</t>
          <t>Oblivious HTTP and DNS over Oblivious HTTP <bcp14>MUST</bcp14> incorporate support for PQ/T Hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack.</t>
        </section>
        <section anchor="mls">
          <name>MLS</name>
          <t>TODO</t>
        </section>
      </section>
      <section anchor="webrtc">
        <name>WebRTC</name>
        <t>In WebRTC, secure channels are set up via DTLS and DTLS-SRTP <xref target="RFC5763"/> keying for SRTP <xref target="RFC3711"/> for media channels and the Stream Control Transmission Protocol (SCTP) over DTLS <xref target="RFC8261"/> for data channels.</t>
        <t>Secure channels may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the DTLS key exchange. If an attacker possesses copies of an entire set of encrypted media, including the DTLS setup, it could use CRQC to potentially decrypt the media by determining the private key.</t>
        <t>WebRTC media and data channels <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>The other challenge with WebRTC is that PQC KEMs often come with large public keys and PQC Signature schemes come with large signatures in comparison with traditional algorithms (as discussed in Section 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). In many cases, UDP datagrams are restricted to sizes smaller than 1500 bytes. If IP fragmentation needs to be avoided, each DTLS handshake message must be fragmented over several DTLS records, with each record intended to fit within a single UDP datagram. This approach could potentially lead to increased time to complete the DTLS handshake and involve multiple round-trips in lossy networks. It may also extend the time required to set up secure WebRTC channels. One potential mitigation strategy to avoid the delay is to prevent the duplication PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      </section>
      <section anchor="https">
        <name>HTTPS</name>
        <t>HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP used for secure data exchange over the web. HTTPS primarily relies on the TLS (Transport Layer Security) protocol to provide encryption, integrity, and authenticity for data in transit.</t>
        <t>HTTP messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted HTTP messages, including the TLS setup, it could use CRQC to potentially decrypt the message content by determining the private key. This traffic can include sensitive information, such as login credentials, personal data, or financial details, depending on the nature of the communication.</t>
        <t>If an attacker can decrypt the message content before the expiry of the login credentials, the attacker can steal the credentials. The theft of login credentials is a serious security concern that can have a wide range of consequences for individuals and organizations. The most immediate and obvious challenge is that the attacker gains unauthorized access to the victim's accounts, systems, or data. This can lead to data breaches, privacy violations, and various forms of cybercrime.</t>
        <t>Applications using HTTPS to exchange sensitive data <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}. If the data is genuinely non-sensitive and has no privacy or security implications, the motivation for an attacker to invest resources in capturing and later decrypting it would likely be very low. In such cases, the "Harvest Now, Decrypt Later" attack may not be relevant. In similar lines, reverse proxies operated between clients and origin servers will also have to support {#confident}.</t>
      </section>
      <section anchor="email-submission">
        <name>Email Submission</name>
        <t>Email often contains information that needs protection from passive monitoring or active modification. While some standards exist for protecting integrity and for encrypting content of messages themselves (see <xref target="RFC8551"/>), transport encryption is also frequently used. TLS support for Email Submission/Access is described in <xref section="3.3" sectionFormat="of" target="RFC8314"/>. The Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Post-quantum algorithms selected for standardization are relatively
new and they they have not been subject to the same depth of study as
traditional algorithms. PQC implementations will also be new and
therefore more likely to contain implementation bugs than the
battle-tested crypto implementations that we rely on today. In
addition, certain deployments may need to retain traditional
algorithms due to regulatory constraints, for example FIPS
<xref target="SP-800-56C"/> or PCI compliance. Hybrid key exchange enables
potential security against "Harvest Now, Decrypt Later" attack provide
for time to react in the case of the announcement of a devastating
attack against any one algorithm, while not fully abandoning
traditional cryptosystems.</t>
      <t>Implementing PQ/T hybrid schemes improperly can introduce security issues at the cryptographic layer, for example how the Traditional and PQ schemes are combined; at the algorithm selection layer, mismatched security levels for example if 192-bit KEM is used with a 128-bit secure combiner; or at the protocol layer in how the upgrade/downgrade mechanism works. PQ/T hybrid schemes should be implemented carefully and all relevant specifications implemented correctly.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting wider document scope. Thanks to Mike Ounsworth and Thom Wiggers for early review and feedback.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC5763">
          <front>
            <title>Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)</title>
            <author fullname="J. Fischl" initials="J." surname="Fischl"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies how to use the Session Initiation Protocol (SIP) to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signaling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5763"/>
          <seriesInfo name="DOI" value="10.17487/RFC5763"/>
        </reference>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC8261">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a transport protocol originally defined to run on top of the network protocols IPv4 or IPv6. This document specifies how SCTP can be used on top of the Datagram Transport Layer Security (DTLS) protocol. Using the encapsulation method described in this document, SCTP is unaware of the protocols being used below DTLS; hence, explicit IP addresses cannot be used in the SCTP control chunks. As a consequence, the SCTP associations carried over DTLS can only be single-homed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8261"/>
          <seriesInfo name="DOI" value="10.17487/RFC8261"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for Dilithium</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="7" month="August" year="2023"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using Dilithium quantum-resistant
   signatures in Internet X.509 certificates and certificate revocation
   lists.  The conventions for the associated post-quantum signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-02"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00-02">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-17"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-ohttp">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>   This document describes Oblivious HTTP, a protocol for forwarding
   encrypted HTTP messages.  Oblivious HTTP allows a client to make
   multiple requests to an origin server without that server being able
   to link those requests to the client or to identify the requests as
   having come from the same client, while placing only limited trust in
   the nodes used to forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-10"/>
        </reference>
        <reference anchor="I-D.ietf-ohai-svcb-config">
          <front>
            <title>Discovery of Oblivious Services via Service Binding Records</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="6" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a parameter that can be included in SVCB and
   HTTPS DNS resource records to denote that a service is accessible
   using Oblivious HTTP, by offering an Oblivious Gateway Resource
   through which to access the target.  This document also defines a
   mechanism to learn the key configuration of the discovered Oblivious
   Gateway Resource.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-07"/>
        </reference>
        <reference anchor="RFC8551">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8551"/>
          <seriesInfo name="DOI" value="10.17487/RFC8551"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
