<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="PQC Recommendations for Applications">Post-Quantum Cryptography Recommendations for Internet Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-03"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="04"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 51?>

<t>Post-quantum cryptography brings some new challenges to applications, end users, and system administrators.
This document describes characteristics unique to application protocols and best practices for deploying
Quantum-Ready usage profiles for applications using TLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet largely consists of services that employ a client-server architecture in which a client communicates with an application service.  When a client communicates with an application service using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or a protocol built on those (QUIC <xref target="RFC9001"/> being a notable example), the client and server can perform ephemeral public-key exchange mechanism, such as ECDH, to derive the shared secret for forward secrecy. They can validate each other's identity using X.509 certificates to establish secure communication.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. This means there is a requirement to update protocols and infrastructure to use post-quantum algorithms, which are public-key algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>The industry has successfully upgraded TLS versions while deprecating old versions (e.g., SSLv2), and many
protocols have transitioned from RSA to Elliptic Curve Cryptography (ECC) improving security while also reducing key sizes. The transition to post-quantum crypto brings different challenges, most significantly, the new Post-Quantum algorithms:</t>
      <ol spacing="normal" type="1"><li>
          <t>are still being evaluated against both classical and post-quantum attacks,</t>
        </li>
        <li>
          <t>typically use larger key sizes (which increases handshake packet size). For example, the public key sizes of ML-KEM is much larger than ECDH (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>) and the public key sizes of Dilithium/Falcon are much larger than P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>), and</t>
        </li>
        <li>
          <t>While certain post-quantum (PQ) algorithms are comparatively slower than their traditional counterparts, it's important to note that specific PQ algorithms also showcase faster performance. For instance, ML-KEM utilizes less CPU than X25519, and both Dilithium and Falcon exhibit faster signature verification times than Ed25519, although with slower signature generation times.</t>
        </li>
      </ol>
      <t>All applications transmitting messages over untrusted networks can be susceptible to active or passive attacks by adversaries using CRQCs, with varying degrees of significance for both users and the underlying systems. This document explores Quantum-Ready usage profiles for applications specifically designed to defend against passive and on-path attacks employing CRQCs. TLS client and server implementations, as well as applications, can mitigate the impact of these challenges through various techniques described in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this
document, it is helpful to be able to divide cryptographic algorithms
into three classes:</t>
      <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based
on integer factorisation, finite field discrete logarithms or elliptic
curve discrete logarithms. In the context of TLS, examples of
traditional key exchange algorithms include Elliptic Curve
Diffie-Hellman (ECDH); which is almost always used in the ephemeral mode referred to
as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include the Module-Lattice Key Encapsulation Mechanism (ML-KEM), which is widely known as Kyber.</t>
      <t>"Hybrid" key exchange, in this context, means the use of two component
key exchange algorithms -- one traditional algorithm and one
Post-Quantum algorithm.  The final shared secret key is secure when at
least one of the component key exchange algorithms remains
unbroken. It is referred to as PQ/T Hybrid Scheme in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>The same categories also apply to digital signature algorithms as used in X.509 certificates, Certificate Transparency SCTs, OCSP statements, Remote Attestations, and any other mechanism that contributes signatures to a TLS handshake.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for transition</name>
      <t>The timeline and driving motivation for Quantum-Ready transition differ between data confidentiality and data authentication (e.g., signature). Digital signatures are used within X.509 certificates, Certificate Revocation Lists (CRLs), and to sign messages.</t>
      <t>Encrypted payloads transmitted via Transport Layer Security (TLS) can be susceptible to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange and the transmitted ciphertext. TLS implementations commonly utilize Diffie-Hellman schemes for key exchange. If an attacker has copies of an entire set of encrypted payloads, including the TLS setup, it could employ CRQCs to potentially decrypt the payload by determining the private key.</t>
      <t>For data confidentiality, we are concerned with the so-called "Harvest Now, Decrypt Later" attack where a malicious actor with adequate resources can launch an attack to store encrypted data today that can be decrypted once a CRQC is available. This implies that, even today, encrypted data is susceptible to the attack by not implementing quantum-safe strategies, as it corresponds to data being deciphered in the future. The storage time and effective security lifetime of this encrypted data might vary from seconds to decades.</t>
      <t>For data authentication, our concern lies with an on-path attacker who possesses devices equipped with CRQCs capable of breaking traditional authentication protocols. For instance, the attacker can fake the identity of the target, leading victims to connect to the attacker's device instead of connecting to the actual target, resulting in an impersonation attack. While not an immediate threat, it is still a concern when compared to the 'Harvest Now, Decrypt Later' attack.</t>
      <t>In client/server certificate-based authentication, it's common for the certificate's signature in the TLS handshake to have a short lifetime. This means that the time between the certificate signing the CertificateVerify message and its verification by the peer during the TLS handshake is limited. However, it's worth questioning the security lifetime of the digital signatures on X.509 certificates, including those issued by root Certificate Authorities (CAs). Root CAs can have lifetimes of 20 years or more. Additionally, root Certificate Revocation Lists (CRLs) may have lifetimes of a year or more, while delegated credentials like CRL Signing Certificates or OCSP response signing certificates can have lifetimes that fall anywhere in between.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may need to be protected for lifetimes measured in years.
The possibility of CRQCs being developed means that we need to move away from traditional algorithms,
but at the same time uncertainty about post-quantum algorithm implementation security, lag in standardization, regulatory requirements, and maturity of cryptanalysis may require the continued use of mature traditional algorithms alongside the new post-quantum primitives.</t>
      <t>The primary goal of a hybrid key exchange mechanism is to facilitate
the establishment of a shared secret which remains secure as long as one of the component key exchange mechanisms remains unbroken.</t>
      <t><xref target="I-D.ietf-tls-hybrid-design"/> provides a construction for hybrid key exchange in TLS 1.3. It fulfils the primary goal of hybrid key exchange, with additional objectives discussed in Section 1.5 of the same document.</t>
      <t>Applications that use (D)TLS and susceptible to CRQC attack <bcp14>MUST</bcp14> migrate to (D)TLS 1.3 and support the hybrid key exchange, as defined in <xref target="I-D.ietf-tls-hybrid-design"/>. In the future, we anticipate a shift away from traditional cryptographic algorithms in favor of post-quantum algorithms. This transition is expected to provide benefits in terms of CPU efficiency and reduced data transmission overhead compared to hybrid key exchange.</t>
      <t>The client initiates the TLS handshake by sending a list of key agreement methods it supports in the key_share extension. One of the challenges during the PQC migration is that the client may not know whether the server supports the Hybrid key exchange. To address this uncertainty, the client can adopt one of three strategies:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sending Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client has the option to send both traditional and hybrid key exchange algorithm key shares to the server, eliminating the need for multiple round trips. It's important to note that the size of the hybrid key exchange algorithm key share may exceed the MTU, leading to the possibility of splitting the ClientHello message across multiple packets. However, this approach necessitates additional computations on the client side and results in increased handshake traffic. During the TLS handshake, the server responds to the ClientHello by providing its public key and ciphertext. If the combined size of these components exceeds the MTU, there's a chance that the ServerHello message may be fragmented across multiple TCP packets. This fragmentation raises the risk of lost packets and potential delays due to retransmission. However, this approach has a disadvantage that a faulty middlebox may drop the split ClientHello message since it's uncommon for a ClientHello message to be split.</t>
        </li>
        <li>
          <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
        </li>
        <li>
          <t><xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism for servers to communicate key share preferences in DNS responses. TLS clients can use this information to reduce TLS handshake round-trips.</t>
        </li>
      </ol>
      <t>Clients <bcp14>MAY</bcp14> use information from completed handshakes to cache the server's preferences for key exchange algorithms (<xref target="RFC8446"/>, section 4.2.7). In order to avoid multiple packets to send ClientHello message, the client would have to prevent the duplication of PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>While CRQCs could decrypt previous TLS sessions, client/server authentication based on certificates cannot be retroactively broken. However, given the multi-year lead-time required to establish, certify, and embed new root CAs, it would be difficult to react in a timely manner if CRQCs come online sooner than anticipated. So while PQ migration of X.509 certificates has more time than key exchanges, we should not delay this work for too long.</t>
      <t>The Quantum-Ready authentication property can be utilized in scenarios where an on-path attacker possesses network devices equipped with CRQCs, capable of breaking traditional authentication protocols. If an attacker uses CRQC to determine the private key of a server certificate before the certificate expiry, the attacker can create a fake server, and then every user will think that their connection is legitimate. The server impersonation leads to various security threats, including impersonation, data disclosure, and the interception of user data and communications.</t>
      <t>The Quantum-Ready authentication property ensures authentication through either a pure Post-Quantum or a PQ/T hybrid Certificate.</t>
      <ul spacing="normal">
        <li>
          <t>A Post-Quantum X.509 Certificate using Module-Lattice Digital Signature Algorithm (ML-DSA) is defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/> and using SLH-DSA is defined in <xref target="I-D.ietf-lamps-cms-sphincs-plus"/>.</t>
        </li>
        <li>
          <t>The PQ/T Hybrid Authentication property is currently still under active exploration and discussion in the LAMPS and PQUIP WGs, and consensus may evolve over time regarding its adoption.  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Signature: The hybrid signature refers to the output of a hybrid signature scheme's signature
generation process. For instance, NIST defines a dual signature as "two or more signatures on a common message". The objective of this approach is to establish a signature format that necessitates the verification of both contained signatures. This concept is discussed in the document titled "Composite Signatures For Use In Internet PKI" <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
            </li>
            <li>
              <t>The non-composite hybrid authentication discussed in <xref target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>
enables peers to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms.</t>
            </li>
            <li>
              <t>In <xref target="I-D.okubo-certdiscovery"/>, the Primary Certificate uses a widely adopted cryptographic algorithm
while the Secondary Certificate uses the algorithm that is new and not widely adopted. In TLS, peers can request that both traditional and PQ certificate be used for authentication. For instance, traditional certificates can be exchanged during the TLS handshake and PQ certificates can be exchanged after the session has been established using the mechanism defined in <xref target="RFC9261"/>.</t>
            </li>
            <li>
              <t><xref target="I-D.bonnell-lamps-chameleon-certs"/> allows a relying party to extract information sufficient to
construct the paired certificate and perform certification path validation using the constructed certificate.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>To decide whether and when to support a Post-Quantum Certificate (PQC) or a PQ/T hybrid scheme for client and server authentication, it is important to consider factors such as the frequency and duration of system upgrades, as well as the anticipated availability of CRQCs. For example, applications that have extremely short key lifetimes -- for example less than an hour -- may decide that it is an acceptable risk to leave those on Traditional algorithms for the foreseeable future under the assumption that quantum key factoring attacks take longer to run than the key lifetimes. It may be advantageous to explore heterogeneous PKI architectures where the long-lived CAs are using Post-Quantum algorithms but the server and client certificates are not. In summary, if the signature is not post-quantum secure, further evaluation is needed to determine whether the attempt to achieve post-quantum security using short-lived keys is effective or not.</t>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client doesn't support PQC or hybrid key exchange, it can send an 'insufficient_security' fatal alert to the client. The client can inform the end-users that the server they are trying to access requires a level of security that the client cannot provide due to the lack of PQC support. Furthermore, the client may log the event for diagnostic and security auditing purposes and report the security-related issue to the client development team.</t>
      <t>Similarly, when the client detects that the server doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. The message can inform the end-user that the server is not compatible with the PQC security features offered by the client.</t>
    </section>
    <section anchor="application-protocols">
      <name>Application Protocols</name>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks for end users exchanging DNS messages in clear text are discussed in <xref target="RFC7518"/>. Transport Layer Security (TLS) is employed to ensure privacy for DNS. DNS encryption provided by TLS (e.g., DNS-over-HTTPS, DNS-over-TLS, DNS-over-QUIC) eliminates opportunities for eavesdropping and on-path tampering while in transit through the network.</t>
        <t>Encrypted DNS messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted DNS messages, including the TLS setup, it could use a CRQC to potentially decrypt the message content by determining the ephemeral key exchange private key.</t>
        <t>Encrypted DNS protocols will have to support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>Note that post-quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a separate issue from the requirements for encrypted DNS transports.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke">
        <name>Hybrid public-key encryption (HPKE)</name>
        <t>Hybrid public-key encryption (HPKE) is a scheme that provides public key encryption of arbitrary-sized plaintexts given a recipient's public key. HPKE utilizes a non-interactive ephemeral-static Diffie-Hellman exchange to establish a shared secret.  The motivation for standardizing a public key encryption scheme is explained in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>. Kyber, which is a KEM does not support the static-ephemeral key exchange that allows HPKE based on DH based KEMs. Note that X25519Kyber768Draft00 is IND-CCA2 secure (Section 4 of <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00-02"/>).</t>
        <section anchor="ech">
          <name>Interaction with Encrypted Client Hello</name>
          <t>Client TLS libraries and applications can use Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity in the TLS handshake which requires also deploying Encrypted DNS (DNS over TLS), otherwise a passive listener can observe DNS queries (or responses) and infer same server identity that was being protected with ECH. ECH uses HPKE for public key encryption.</t>
          <t>ECH <bcp14>MUST</bcp14> incorporate support for PQ/T Hybrid post-quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack. ECH uses HPKE for public key encryption. HPKE can be extended to support PQ/T Hybrid post-quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.connolly-cfrg-xwing-kem"/>.</t>
          <t>To use ECH the client needs to learn the ECH configuration for a server before it attempts a connection to the server. Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings specification <xref target="I-D.draft-ietf-tls-svcb-ech"/> provides a mechanism for conveying the ECH configuration information via DNS, using a SVCB or HTTPS record. The "ech" SvcParamKey is used in SVCB or HTTPS or DNS records, and is intended to serve as the primary bootstrap mechanism for ECH. The value of the parameter is an ECHConfigList (Section 4 of <xref target="I-D.ietf-tls-esni"/>). The public_key in HpkeKeyConfig structure would carry the concatenation of traditional and PQC KEM public keys which would increase DNS resposnse size that could exceed the path MTU. It would require the use of reliable transport and Encrypted DNS (e.g., DoT, DoH or DoQ).</t>
        </section>
      </section>
      <section anchor="webrtc">
        <name>WebRTC</name>
        <t>In WebRTC, secure channels are set up via DTLS and DTLS-SRTP <xref target="RFC5763"/> keying for SRTP <xref target="RFC3711"/> for media channels and the Stream Control Transmission Protocol (SCTP) over DTLS <xref target="RFC8261"/> for data channels.</t>
        <t>Secure channels may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the DTLS key exchange. If an attacker possesses copies of an entire set of encrypted media, including the DTLS setup, it could use CRQC to potentially decrypt the media by determining the private key.</t>
        <t>WebRTC media and data channels <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>The other challenge with WebRTC is that PQC KEMs often come with large public keys and PQC Signature schemes come with large signatures in comparison with traditional algorithms (as discussed in Section 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). In many cases, UDP datagrams are restricted to sizes smaller than 1500 bytes. If IP fragmentation needs to be avoided, each DTLS handshake message must be fragmented over several DTLS records, with each record intended to fit within a single UDP datagram. This approach could potentially lead to increased time to complete the DTLS handshake and involve multiple round-trips in lossy networks. It may also extend the time required to set up secure WebRTC channels.</t>
      </section>
      <section anchor="https">
        <name>HTTPS</name>
        <t>HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP used for secure data exchange over the web. HTTPS primarily relies on the TLS (Transport Layer Security) protocol to provide encryption, integrity, and authenticity for data in transit.</t>
        <t>HTTP messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted HTTP messages, including the TLS setup, it could use CRQC to potentially decrypt the message content by determining the private key. This traffic can include sensitive information, such as login credentials, personal data, or financial details, depending on the nature of the communication.</t>
        <t>If an attacker can decrypt the message content before the expiry of the login credentials, the attacker can steal the credentials. The theft of login credentials is a serious security concern that can have a wide range of consequences for individuals and organizations. The most immediate and obvious challenge is that the attacker gains unauthorized access to the victim's accounts, systems, or data. This can lead to data breaches, privacy violations, and various forms of cybercrime.</t>
        <t>Applications using HTTPS to exchange sensitive data <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}. If the data is genuinely non-sensitive and has no privacy or security implications, the motivation for an attacker to invest resources in capturing and later decrypting it would likely be very low. In such cases, the "Harvest Now, Decrypt Later" attack may not be relevant. In similar lines, reverse proxies operated between clients and origin servers will also have to support {#confident}.</t>
      </section>
      <section anchor="email-submission">
        <name>Email Submission</name>
        <t>Email often contains information that needs protection from passive monitoring or active modification. While some standards exist for protecting integrity and for encrypting content of messages themselves (see <xref target="RFC8551"/>), transport encryption is also frequently used. TLS support for Email Submission/Access is described in <xref section="3.3" sectionFormat="of" target="RFC8314"/>. The Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Post-quantum algorithms selected for standardization are relatively
new and they they have not been subject to the same depth of study as
traditional algorithms. PQC implementations will also be new and
therefore more likely to contain implementation bugs than the
battle-tested crypto implementations that we rely on today. In
addition, certain deployments may need to retain traditional
algorithms due to regulatory constraints, for example FIPS
<xref target="SP-800-56C"/> or PCI compliance. Hybrid key exchange enables
potential security against "Harvest Now, Decrypt Later" attack provide
for time to react in the case of the announcement of a devastating
attack against any one algorithm, while not fully abandoning
traditional cryptosystems.</t>
      <t>Implementing PQ/T hybrid schemes improperly can introduce security issues at the cryptographic layer, for example how the Traditional and PQ schemes are combined; at the algorithm selection layer, mismatched security levels for example if 192-bit KEM is used with a 128-bit secure combiner; or at the protocol layer in how the upgrade/downgrade mechanism works. PQ/T hybrid schemes should be implemented carefully and all relevant specifications implemented correctly.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting wider document scope. Thanks to Mike Ounsworth, Scott Fluhrer,
Bas Westerbaan and Thom Wiggers for review and feedback.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="5" month="April" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="3" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-00"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC5763">
          <front>
            <title>Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)</title>
            <author fullname="J. Fischl" initials="J." surname="Fischl"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies how to use the Session Initiation Protocol (SIP) to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signaling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5763"/>
          <seriesInfo name="DOI" value="10.17487/RFC5763"/>
        </reference>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC8261">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a transport protocol originally defined to run on top of the network protocols IPv4 or IPv6. This document specifies how SCTP can be used on top of the Datagram Transport Layer Security (DTLS) protocol. Using the encapsulation method described in this document, SCTP is unaware of the protocols being used below DTLS; hence, explicit IP addresses cannot be used in the SCTP control chunks. As a consequence, the SCTP associations carried over DTLS can only be single-homed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8261"/>
          <seriesInfo name="DOI" value="10.17487/RFC8261"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="5" month="February" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using the Module-Lattice-Based Digital
   Signatures (ML-DSA) in Internet X.509 certificates and certificate
   revocation lists.  The conventions for the associated signatures,
   subject public keys, and private key are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-03"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cms-sphincs-plus">
          <front>
            <title>Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="28" month="May" year="2024"/>
            <abstract>
              <t>   SLH-DSA is a stateless hash-based signature scheme.  This document
   specifies the conventions for using the SLH-DSA signature algorithm
   with the Cryptographic Message Syntax (CMS).  In addition, the
   algorithm identifier and public key syntax are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cms-sphincs-plus-05"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite Signatures For Use In Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>D-Trust GmbH</organization>
            </author>
            <date day="24" month="May" year="2024"/>
            <abstract>
              <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-05"/>
        </reference>
        <reference anchor="I-D.okubo-certdiscovery">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.bonnell-lamps-chameleon-certs">
          <front>
            <title>A Mechanism for Encoding Differences in Paired Certificates</title>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="D. Hook" initials="D." surname="Hook">
              <organization>KeyFactor</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <date day="4" month="January" year="2024"/>
            <abstract>
              <t>   This document specifies a method to efficiently convey the
   differences between two certificates in an X.509 version 3 extension.
   This method allows a relying party to extract information sufficient
   to construct the paired certificate and perform certification path
   validation using the constructed certificate.  In particular, this
   method is especially useful as part of a key or signature algorithm
   migration, where subjects may be issued multiple certificates
   containing different public keys or signed with different CA private
   keys or signature algorithms.  This method does not require any
   changes to the certification path validation algorithm as described
   in RFC 5280.  Additionally, this method does not violate the
   constraints of serial number uniqueness for certificates issued by a
   single certification authority.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonnell-lamps-chameleon-certs-03"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00-02">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-18"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="March" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-02"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-svcb-ech">
          <front>
            <title>Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="23" month="May" year="2024"/>
            <abstract>
              <t>   To use TLS Encrypted ClientHello (ECH) the client needs to learn the
   ECH configuration for a server before it attempts a connection to the
   server.  This specification provides a mechanism for conveying the
   ECH configuration information via DNS, using a SVCB or HTTPS record.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-svcb-ech-02"/>
        </reference>
        <reference anchor="RFC8551">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8551"/>
          <seriesInfo name="DOI" value="10.17487/RFC8551"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
