<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="PQC Recommendations for Applications">Post-Quantum Cryptography Recommendations for Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-04"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="18"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 51?>

<t>Post-quantum cryptography introduces new challenges for applications, end users, and system administrators. This document outlines characteristics unique to application protocols and provides best practices for deploying Quantum-Ready usage profiles in applications utilizing TLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet largely consists of services that employ a client-server architecture in which a client communicates with an application service.  When a client communicates with an application service using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or a protocol built on those (QUIC <xref target="RFC9001"/> being a notable example), the client and server can perform ephemeral public-key exchange mechanism, such as ECDH, to derive the shared secret for forward secrecy. They can validate each other's identity using X.509 certificates to establish secure communication.</t>
      <t>The presence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art, traditional public-key algorithms deployed today obsolete and insecure, since the assumptions about the intractability of the mathematical problems for these algorithms that offer confident levels of security today no longer apply in the presence of a CRQC. This means there is a requirement to update protocols and infrastructure to use PQC algorithms, which are public-key algorithms designed to be secure against CRQCs and classical computers. The traditional cryptographic primitives that need to be replaced by PQC are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected a set of algorithms, ML-KEM, SLH-DSA, and ML-DSA, as candidates for use in protocols.</t>
      <t>The industry has successfully upgraded TLS versions while deprecating old versions (e.g., SSLv2), and many
protocols have transitioned from RSA to Elliptic Curve Cryptography (ECC) improving security while also reducing key sizes. The transition to PQC brings different challenges, most significantly, the new PQC algorithms:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized the selection of certain PQC algorithms, the correctness and security of implementations remain critical, as bugs in implementations can introduce vulnerabilities, regardless of the strength of the underlying algorithm.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Post-quantum algorithms often require larger key and signature sizes, which can significantly increase handshake packet sizes and impact network performance. For example: The public key sizes of ML-KEM are much larger than ECDH (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>), and the public key sizes of SLH-DSA and ML-DSA are much larger than P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, the signature sizes of PQC algorithms like SLH-DSA and ML-DSA are considerably larger than those of traditional algorithms like Ed25519 or ECDSA-P256. Larger signatures can pose challenges in constrained environments (e.g., IoT) or increase handshake times over high-latency and lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQ algorithms exhibit slower operations compared to their traditional counterparts, others demonstrate specific advantages. For example: ML-KEM utilizes less CPU than X25519. ML-DSA features faster signature verification times than Ed25519 but are slower in signature generation.</t>
        </li>
      </ol>
      <t>All applications transmitting messages over untrusted networks can be susceptible to active or passive attacks by adversaries using CRQCs, with varying degrees of significance for both users and the underlying systems. This document explores Quantum-Ready usage profiles for applications specifically designed to defend against passive and on-path attacks employing CRQCs. TLS client and server implementations, as well as applications, can mitigate the impact of these challenges through various techniques described in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this
document, it is helpful to be able to divide cryptographic algorithms
into three classes:</t>
      <ul spacing="normal">
        <li>
          <t>"Traditional Algorithm": An asymmetric cryptographic algorithm based
 on integer factorisation, finite field discrete logarithms or elliptic
 curve discrete logarithms. In the context of TLS, examples of
 traditional key exchange algorithms include Elliptic Curve
 Diffie-Hellman (ECDH); which is almost always used in the ephemeral mode referred to
 as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks 
 using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include the 
 Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>"Hybrid" key exchange, in this context, means the use of two component
key exchange algorithms -- one traditional algorithm and one
Post-Quantum algorithm.  The final shared secret key is secure when at
least one of the component key exchange algorithms remains
unbroken. It is referred to as PQ/T Hybrid Scheme in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
        </li>
        <li>
          <t>PQ/T Hybrid Digital Signature:  A multi-algorithm digital signature
scheme made up of two or more component digital signature
algorithms where at least one is a Post-Quantum algorithm and at
least one is a traditional algorithm.</t>
        </li>
      </ul>
      <t>Digital signature algorithms are used in X.509 certificates, Certificate Transparency SCTs, OCSP statements, 
Remote Attestations, and any other mechanism that contributes signatures to a TLS handshake.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for transition</name>
      <t>The timeline and driving motivation for Quantum-Ready transition differ between data confidentiality and data authentication (e.g., signature). The risk posed by 'Harvest Now, Decrypt Later' attacks necessitates immediate action to provide data confidentiality, while the threat to authentication systems, though less immediate, requires proactive planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted via Transport Layer Security (TLS) can be susceptible to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange and the transmitted ciphertext. TLS implementations commonly utilize Diffie-Hellman schemes for key exchange. If an attacker has copies of an entire set of encrypted payloads, including the TLS setup, it could employ CRQCs to potentially decrypt the payload by determining the private key.</t>
      <t>For data confidentiality, we are concerned with the so-called "Harvest Now, Decrypt Later" attack where a malicious actor with adequate resources can launch an attack to store encrypted data today that can be decrypted once a CRQC is available. This implies that, even today, encrypted data is susceptible to the attack by not implementing quantum-safe strategies, as it corresponds to data being deciphered in the future. The storage time and effective security lifetime of this encrypted data might vary from seconds to decades.</t>
      <t>For data authentication, our concern lies with an on-path attacker who possesses devices equipped with CRQCs capable of breaking traditional authentication protocols. For instance, the attacker can fake the identity of the target, leading victims to connect to the attacker's device instead of connecting to the actual target, resulting in an impersonation attack. While not an immediate threat, it is still a concern when compared to the 'Harvest Now, Decrypt Later' attack.</t>
      <t>In client/server certificate-based authentication, the time between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is short. However, it's worth questioning the security lifetime of the digital signatures on X.509 certificates, including those issued by root Certificate Authorities (CAs). Root CAs can have lifetimes of 20 years or more. Additionally, root Certificate Revocation Lists (CRLs) may have validity periods of a year or more, while delegated credentials like CRL Signing Certificates or OCSP response signing certificates often have shorter validity periods that fall somewhere in between.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may need protection for years. The potential development of CRQCs necessitates a shift away from traditional algorithms. However, uncertainty about the security of PQC algorithm implementations, regulatory requirements, and the maturity of cryptanalysis may justify the continued use of well-established traditional algorithms alongside new PQC primitives for a transitional period.</t>
      <t>Applications using (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> migrate to (D)TLS 1.3 and support one of the following approaches:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: This approach combines traditional and PQC key exchange algorithms, providing resilience even if one   <br/>
algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid key exchange ensures continued security during the transition to PQC. For TLS 1.3, <xref target="I-D.kwiatkowski-tls-ecdhe-mlkem"/> introduces hybrid Post-Quantum key exchange groups:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum key encapsulation mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum key encapsulation mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments requiring a purely Post-Quantum key exchange, <xref target="I-D.connolly-tls-mlkem-key-agreement"/><br/>
defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as standalone NamedGroups for achieving Post-Quantum key agreement in TLS 1.3.</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is preferred over pure PQC because it provides defense in depth by combining classical and PQC algorithms, ensuring security even if one algorithm is compromised. However, Pure PQC key exchange may be necessary for deployments that are mandated to use post-quantum cryptography exclusively, such as those with specific regulatory or compliance requirements.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of key agreement methods it supports in the key_share extension. One of the challenges during the PQC migration is that the client may not know whether the server supports the Hybrid key exchange. To address this uncertainty, the client can adopt one of three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Sending Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client has the option to send both traditional and hybrid key exchange algorithm key shares to the server, eliminating the need for multiple round trips. It's important to note that the size of the hybrid key exchange algorithm key share may exceed the MTU, leading to the possibility of splitting the ClientHello message across multiple packets. However, this approach necessitates additional computations on the client side and results in increased handshake traffic. During the TLS handshake, the server responds to the ClientHello by providing its public key and ciphertext. If the combined size of these components exceeds the MTU, there's a chance that the ServerHello message may be fragmented across multiple TCP packets. This fragmentation raises the risk of lost packets and potential delays due to retransmission. However, this approach has a disadvantage that a faulty middlebox may drop the split ClientHello message since it's uncommon for a ClientHello message to be split.</t>
          </li>
          <li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t><xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism for servers to communicate key share preferences in DNS responses. TLS clients can use this information to reduce TLS handshake round-trips.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> use information from completed handshakes to cache the server's preferences for key exchange algorithms (<xref target="RFC8446"/>, section 4.2.7). In order to avoid multiple packets to send ClientHello message, the client would have to prevent the duplication of PQC KEM public key shares in the ClientHello, avoiding duplication of key shares is discussed in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      </section>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt previous TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, due to the multi-year process involved in establishing, certifying, and embedding new root CAs, responding quickly to the emergence of CRQCs, should they arrive earlier than expected, would be challenging. While the migration to Post-Quantum X.509 certificates has more time compared to key exchanges, delaying this work for too long should be avoided.</t>
      <t>The Quantum-Ready authentication property can be utilized in scenarios where an on-path attacker possesses network devices equipped with CRQCs, capable of breaking traditional authentication protocols. If an attacker uses CRQC to determine the private key of a server certificate before the certificate expiry, the attacker can create a fake server, and then every user will think that their connection is legitimate. The server impersonation leads to various security threats, including impersonation, data disclosure, and the interception of user data and communications.</t>
      <t>The Quantum-Ready authentication property ensures authentication through either a pure Post-Quantum or a PQ/T hybrid Certificate.</t>
      <ul spacing="normal">
        <li>
          <t>A Post-Quantum X.509 Certificate using the Module-Lattice Digital Signature Algorithm (ML-DSA) is defined in 
   <xref target="I-D.ietf-lamps-dilithium-certificates"/>, and one using SLH-DSA is defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. <xref target="I-D.tls-westerbaan-mldsa"/> discusses how ML-DSA is used for authentication in TLS 1.3, while <xref target="I-D.reddy-tls-slhdsa"/> explains how 
   SLH-DSA is used for authentication in TLS 1.3. The pros and cons of SLH-DSA in comparison with ML-DSA are discussed in Section 2 of <xref target="I-D.reddy-tls-slhdsa"/>.</t>
        </li>
        <li>
          <t>A composite X.509 certificate is defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. It defines Composite ML-DSA that is applicable to any application that would otherwise use ML-DSA, but wants the protection against breaks or catastrophic bugs in ML-DSA. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how the Post-Quantum signature scheme ML-DSA, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3.</t>
        </li>
      </ul>
      <t>To determine whether and when to support a PQC certificate or a PQ/T hybrid scheme for client and server authentication, several factors should be considered, including the frequency and duration of system upgrades and the anticipated timeline for the availability of CRQCs. Deployments with limited flexibility to enable or disable algorithms benefit from hybrid signatures that combine a PQC algorithm with a traditional one. This approach mitigates risks associated with fallback strategies, where delays in transitioning to PQC leave systems exposed to attacks.</t>
      <t>Hybrid signatures provide immediate protection against zero-day vulnerabilities and enhance resilience during the adoption of PQC, reducing exposure to unforeseen threats. For example, Telecom networks, which already handle high-throughput data, are better positioned to manage the overhead of larger PQC keys and signatures, enabling earlier adoption of PQC signature algorithms. Additionally, their centralized infrastructure, internal CA, fewer entities involved, and closer relationships with vendors make it easier to coordinate, implement, and deploy PQC digital signatures. Conversely, the Web PKI ecosystem may defer adoption until smaller and more efficient PQC signature algorithms, such as MAYO, UOC, HAWK, or SQISign, become available.</t>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client doesn't support PQC or hybrid key exchange, it can send an 'insufficient_security' fatal alert to the client. The client can inform the end-users that the server they are trying to access requires a level of security that the client cannot provide due to the lack of PQC support. Furthermore, the client may log the event for diagnostic and security auditing purposes and report the security-related issue to the client development team.</t>
      <t>Similarly, when the client detects that the server doesn't support PQC or hybrid key exchange, it can send an alert or error page to the client. The message can inform the end-user that the server is not compatible with the PQC security features offered by the client.</t>
      <t>Note that such alerts should be carefully designed to avoid overwhelming users with unnecessary warnings.</t>
    </section>
    <section anchor="pqc-enhancements-for-internet-protocols-and-applications">
      <name>PQC Enhancements for Internet Protocols and Applications</name>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks for end users exchanging DNS messages in clear text are discussed in <xref target="RFC9076"/>. Transport Layer Security (TLS) is employed to ensure privacy for DNS. DNS encryption provided by TLS (e.g., DNS-over-HTTPS, DNS-over-TLS, DNS-over-QUIC) eliminates opportunities for eavesdropping and on-path tampering while in transit through the network.</t>
        <t>Encrypted DNS messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted DNS messages, including the TLS setup, it could use a CRQC to potentially decrypt the message content by determining the ephemeral key exchange private key.</t>
        <t>Encrypted DNS protocols <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>Note that Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a separate issue from the requirements for encrypted DNS transports.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke">
        <name>Hybrid public-key encryption (HPKE)</name>
        <t>Hybrid public-key encryption (HPKE) is a scheme that provides public key encryption of arbitrary-sized plaintexts given a recipient's public key. HPKE utilizes a non-interactive ephemeral-static Diffie-Hellman exchange to establish a shared secret.  The motivation for standardizing a public key encryption scheme is explained in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid Post-Quantum Key Encapsulation Mechanisms (KEMs) as defined in <xref target="I-D.connolly-cfrg-xwing-kem"/>.</t>
        <section anchor="ech">
          <name>Interaction with Encrypted Client Hello</name>
          <t>Client TLS libraries and applications can use Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity in the TLS handshake which requires also deploying Encrypted DNS (e.g., DNS-over-TLS), otherwise a passive listener can observe DNS queries (or responses) and infer same server identity that was being protected with ECH. ECH uses HPKE for public key encryption.</t>
          <t>ECH deployments will have to incorporate support for PQ/T Hybrid Post-Quantum KEMs to protect against the 'Harvest Now, Decrypt Later' attack. The public_key in HpkeKeyConfig structure would have to carry the concatenation of traditional and PQC KEM public keys.</t>
        </section>
      </section>
      <section anchor="webrtc">
        <name>WebRTC</name>
        <t>In WebRTC, secure channels are set up via DTLS and DTLS-SRTP <xref target="RFC5763"/> keying for SRTP <xref target="RFC3711"/> for media channels and the Stream Control Transmission Protocol (SCTP) over DTLS <xref target="RFC8261"/> for data channels.</t>
        <t>Secure channels may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the DTLS key exchange. If an attacker possesses copies of an entire set of encrypted media, including the DTLS setup, it could use CRQC to potentially decrypt the media by determining the private key.</t>
        <t>WebRTC media and data channels <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}.</t>
        <t>The other challenge with WebRTC is that PQC KEMs often come with large public keys and PQC Signature schemes come with large signatures in comparison with traditional algorithms (as discussed in Section 12 and 13 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). In many cases, UDP datagrams are restricted to sizes smaller than 1500 bytes. If IP fragmentation needs to be avoided, each DTLS handshake message must be fragmented over several DTLS records, with each record intended to fit within a single UDP datagram. This approach could potentially lead to increased time to complete the DTLS handshake and involve multiple round-trips in lossy networks. It may also extend the time required to set up secure WebRTC channels.</t>
      </section>
      <section anchor="https">
        <name>HTTPS</name>
        <t>HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP used for secure data exchange over the web. HTTPS primarily relies on the TLS (Transport Layer Security) protocol to provide encryption, integrity, and authenticity for data in transit.</t>
        <t>HTTP messages transmitted using Transport Layer Security (TLS) may be vulnerable to decryption if an attacker gains access to the traditional asymmetric public keys used in the TLS key exchange. If an attacker possesses copies of an entire set of encrypted HTTP messages, including the TLS setup, it could use CRQC to potentially decrypt the message content by determining the private key. This traffic can include sensitive information, such as login credentials, personal data, or financial details, depending on the nature of the communication.</t>
        <t>If an attacker can decrypt the message content before the expiry of the login credentials, the attacker can steal the credentials. The theft of login credentials is a serious security concern that can have a wide range of consequences for individuals and organizations. The most immediate and obvious challenge is that the attacker gains unauthorized access to the victim's accounts, systems, or data. This can lead to data breaches, privacy violations, and various forms of cybercrime.</t>
        <t>Applications using HTTPS to exchange sensitive data <bcp14>MUST</bcp14> support the Quantum-Ready usage profile discussed in {#confident}. Similarly, reverse proxies operated between clients and origin servers will also have to support {#confident}.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/> needs to be taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and PQC implementations are also new, making them more prone to implementation bugs compared to the battle-tested cryptographic implementations in use today. Additionally, certain deployments may need to retain traditional algorithms due to regulatory requirements, such as FIPS <xref target="SP-800-56C"/> or PCI compliance. Hybrid key exchange offers a practical solution, providing protection against "Harvest Now, Decrypt Later" attacks while allowing time to respond to a catastrophic vulnerability in any single algorithm, without fully abandoning traditional cryptosystems.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting wider document scope. Thanks to Mike Ounsworth, Scott Fluhrer, Bas Westerbaan and Thom Wiggers for review and feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="October" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
        </reference>
        <reference anchor="I-D.kwiatkowski-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="9" month="September" year="2024"/>
            <abstract>
              <t>   This draft defines two hybrid key agreements for TLS 1.3:
   X25519MLKEM768 and SecP256r1MLKEM768, which combine a post-quantum
   KEM with an elliptic curve Diffie-Hellman (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-02"/>
        </reference>
        <reference anchor="I-D.connolly-tls-mlkem-key-agreement">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as a
   standalone NamedGroups for use in TLS 1.3 to achieve post-quantum key
   agreement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-tls-mlkem-key-agreement-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-05"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-03"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="25" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies how the post-quantum signature scheme ML-DSA
   [FIPS204], in combination with traditional algorithms RSA-
   PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for
   authentication in TLS 1.3.  The composite ML-DSA approach is
   beneficial in deployments where operators seek additional protection
   against potential breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-01"/>
        </reference>
        <reference anchor="RFC5763">
          <front>
            <title>Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)</title>
            <author fullname="J. Fischl" initials="J." surname="Fischl"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies how to use the Session Initiation Protocol (SIP) to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signaling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5763"/>
          <seriesInfo name="DOI" value="10.17487/RFC5763"/>
        </reference>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC8261">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>The Stream Control Transmission Protocol (SCTP) is a transport protocol originally defined to run on top of the network protocols IPv4 or IPv6. This document specifies how SCTP can be used on top of the Datagram Transport Layer Security (DTLS) protocol. Using the encapsulation method described in this document, SCTP is unaware of the protocols being used below DTLS; hence, explicit IP addresses cannot be used in the SCTP control chunks. As a consequence, the SCTP associations carried over DTLS can only be single-homed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8261"/>
          <seriesInfo name="DOI" value="10.17487/RFC8261"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The advent of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both classical and quantum attacks.  This document
   explains why engineers need to be aware of and understand post-
   quantum cryptography, detailing the impact of CRQCs on existing
   systems and the challenges involved in transitioning.  Unlike
   previous cryptographic updates, this shift may require significant
   protocol redesign due to the unique properties of post-quantum
   algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-06"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="11" month="December" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-05"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+Vd63LbRpb+z6fAyj8sTZG05dhOop2djCIpK5VviqlsZmpq
agokmmSvQIBBA5KZlN9ln2WfbL/vnG6gQVKxs5vdPztVM5YgoPv0uV97RqPR
oLZ1bk6Sg+vS1aPvm7Som1VyVm3Wdbmo0vVyk7w3s3K1MkWW1rYsXDIvq+R0
vc7tTB8cDNLptDJ3XOT7s894HT+YRVltThJXZ4NBVs6KdAUYsiqd16PKZNlm
1NTpaP3TbJSu16Mc77t64JrpyjqHNerNGq9fXdx8Nyia1dRUJwPsZk4GM6xv
Cte4k6SuGjMATF8M0sqkgC2GIUmLDICm+ejGrkxyijcOBvdldbuoymaNl7H9
weDWbPAsOxkkowQn4z/nbyf850czfX8jDy6vX13w34vJ2yt978lNcrmZVhYn
uzNFA6iSpLdskij8Bz9iQ1sskn/lX/l8ldpc3/qzNfV8XFYLPk6r2RKPl3W9
didPnvAtPrJ3Zhxee8IHT6ZVee/ME3z/5GAwGLgax/xHmpcFdtsYN1jbk+Rv
dTkbJq6s6srMHX7arPwPdWVn9TBR6tV4AsKsgH+A+PfBIG3qZVkRF4AoSeZN
nivVbmzVrNLcuPu0Ak5BPHkBQKWF/VnwfZK8LW9tKs9ntgbhv02LBQCrjDyr
zELeepVWRVqnt/7NsilqcslVkfmPjcfQbVlkta3+vODvY0DM4xZltcJ2d8D4
wBbz7rckmVyPvnr6dPTi5dmJrJMEru8zq/DqK7MZnZvK3umjNwbnzlxiC/nL
BZA6za1bEkfJZLY0K+MO/KJptTD1SRIIVdzl62bqxoV19XhR3j3hD3zyZLI2
M5vm1820Zcknb68mN+PJ9dgDWj0br7O5LizMnczT3JnBCDLL/0nSKSiWzurB
QET3Jy+6s1h0LRBYZs3MuKQw98lsmea5KRZGpTKNJGKYAAlJ40yFHykdbuNq
s0rSbGUJdpXWZeXGyc3SOjJGI+cvmzq3BZbDyoQFaHO1nbmkKexPjUnqMt4k
WVcluK/MVf7w253N8PEU0o3f8L2dedAys87LDYXDq6QRpDXbAMB0Yfjl3ILj
SJT4EElT29z+zM9uXk/GiqeVzbLcDAaPwEeKDb47GNwsTXJnnZ3mBqidmaSc
JzWe4S1TFaZOcpIz3yRUKjiW4wvAz50AWS/TGuxIKJM0meUW6Bjxr6YSebW1
mdVNZQji/dLOlu1bImDAD7WgS+5tjT/1jhE2GSfJj0tT/PYPgSWioMO2a7i/
I1KS4/EXyS+/fPP+u7Ovnj9/+fHjMDnvP/76+PmXfEwGaddIpo3NQe8CBy+d
SQ6//+HqLHzw9Onxx4+gIjdNk6KkhJjEfEiBHnM0FKz6IwhnKZZmAH5tKspp
YtaUoyrNk7WIxAiqFwuAq8CsycrwB+tWw/YkF2fnl0OyV0ZJNbKFAw8aLj+r
QD1yEf4LpeQfzTbkXqzLje/S3FKqEpNiwRKfV4/BThlghH7yCPzL+MXTr5OZ
qWo791jHjiZoAC5LCndkAQ3GyljrysAQKVOlsTnFa3lOm5qbOzB20lrccrVu
wHjJ4dn778+OkvuyyTMoxgIHhGrG5qNyPgKco7SCkoY8Zpb79VGW5rCrYIyV
8xIEfNRllm6ScurK3ODApIAtFHTg0xJIYi91rlmtvXWcQrDlKRUI5DKdQq6A
Fy8iUKygF8474/ZVCXKvVG7xHNwRgSFyUs7nJHhZzAXDCc5uci9PgIMrK5RF
mcBaLYzqJuov2W8Lm0CQV0Qrkxbcw1DQADcQ9lNjKyPKCbRq1kLkvt6BbahS
aLRGBZSvAWa6Lh3cwyC0eOEh/Dq7KAS/YP3AC+kiBXJrgVF3m+XArCBq5kks
WtT0SDiLGQTg2pWl6fLoK0y7TQWqQldlyXSjEGPPzLpZ45zhySiSV6Nz8Qvg
PzV2LV4UdD7UNLamYBMqYpUGRxaZ0E+AnHhrTXRBxblkCUFzYFTo9Qy4daYW
AkRIevN69OrizTCZvL4cnU9OdW081J8dRS0TOVPuIJ5tZAa8sNgia0CPjW7Y
zLg5/QvI4Ro4ybA7VRSUhhP2BGmgX8DgEGpADEktISvtnw/NeDEGTJPXd8+O
FKRVWmwGHRcs0zvBP/Q6D4z151W5St5PTonmizy3EIRZctZAUfV94cOLMwin
XYntwsYt/ypMsNAlaAQbwz+SY5z92XQE9xtyFyIeXmKxACtZyodo+NZAD5MV
rHpCHhPlU9T5RjUpDXmfWeHvwEk4Hien4VHyJq0FrhOYEAImtCZ65xb8BpiU
BZS6hAiEpaID9+5IgqjvsgKy64JsoTrcnxvfWap5Spw3whW9tAI8bUVBCCNM
m4VY6+13qYtbJyW5a/ICVkCUjSUO4BiCL3Pu6lUP+AT4genzvzdUkLl4Ci3M
40QQ8mxMj03AnQCNqUj7hPQ4SXouUyTV5byGxfVaRD2ASugoh25XEaoGHcEz
9OiEE8HepGB2mK0MZukWSiSd3ZpaP1QttMIjynbNuCNYwrSg3f8OsuLN54mw
jqqgjqF4epU90QArWkUPLDRGIeYxOXTGJDdii198lmo46nTDvg29kEcyvn/z
62cvXsabv/y8zcegzYqRTWD0LXQThD5rJrkFZh8AS7y2jNwEgsTgqQND9okU
8PaiF9mzFy+Ov6YTBFxOTkc81Dh5reu0kCkDr7lg5FuT+bE71rfULaa4s1VZ
SFAVlNNVeXPExfdwSo2IFIeli7S0i6VEv8VMOTAvndsEnqH6BJt/MU6uO+ZJ
bqgwR+/mcxdk35Urmrf4jObD0k4t2DEv77FPCe4LAgkjJW4UVBSIYKu+nWJI
Ziq8wfhQ3CZawpWeFpbWMbCBHCBuoHsDZ91tsbNnW/XUcVAR7rPrH5Q4fxG0
jwMh58ajeQ6DHSOe2l6dMlGngjLlfE+4KRwYsoE/oS2ibxem8OcFBk/zvB9D
iJqG/RXDgnUZcXh6MB6FpQJ2AgmE/jT/jZsZGA3yO4OeGc03Cbym9cePaV1D
AzjabaAGaEsraDjvaIq3MFSX/i6tRJtlZlEZ5fpOuYC+tKNTYF5jtVZgIz2o
kdtOrGY+rBlwu1+PqLbjwpai4rbGTk9m5gwZg8fTHhTPymK0Thme+ENrnNSe
dCzmfDci2DIOYjjuDenjtmJVYp0u0oI8J36qalM1Cn1prJdV2SwEsbZs8Dui
CYlOxYeDlZqq5+QQmEPvEyanRpEChrDxrCzuGBeEvNG5gREViXDqv1BLMlHk
koM3P0xuDob6b/L2nfz8/gLB0vuLc/48uTx9/br9YeDfmFy+++H1efdT9+XZ
uzdvLt6e68d4mvQeDQ7enP71QLX2wbvrm6t3b09fH6jXHJM+VTd3Kv48xBfx
ET06N+gh4Nuz6//8j+PnUNX/hKju2fHx14jq9Jevjr98jl/uEY4OPYXzjf8V
CN8MQB6TipgB7yDP2tbwhYSCblneFwlddKDzD38jZv5+kvxxOlsfP/+Tf8AD
9x4GnPUeCs52n+x8rEjc82jPNi02e8+3MN2H9/Svvd8D3qOHf/yGWZFkdPzV
N38akEdiYkBuyYSVxBBzsRC2GOyzj/VoKYnEEd+2RZmXi83Hj6pP1UhXND3e
N7JuEPYYJtDt2HNp8jUcaU/71CunzDLtshVzdMZhAB6h7of20eDF0MH8Q3Jw
ExmC1tM8OElOQXS3Wa0ME4gPLZtMYeUy2qtSPD5DOzqHzOLPTsR6mIhYQcNZ
A3eeUQ35FDYPPqD3zmBHvHPOlWbin+95cZxcFd5txU4fRC9A5QyDFSLGuEBs
2noZh8hUwkLnDdDVjwr49TncdmtGlwAJppehwfnl0T97p5DRaC4ufJrfpxtq
epUygtWlO1ZlxqAO7r/aXK7L9EY/BNna6aL9XPa8OBoLfXoZ/N9OIAk1LbNx
UMx3DwW2QaUTUDVebeIxhLex2t4b/V50VBCP7lOoJ8q43xtECbkZvQYMzHLR
ub8ooGtck4dcrU8UJYfqZihmkgNNyB/0dhq2etJzybBLJ0ikSqm6LwVwxIhF
TRAeAnU0Al+b/S6lV5jCMz0aRQGLePkSm22lsbihdYEK95IPFEhyuI21bOoj
oRbOB4HUwMwJ6YppVd6aApIiRI9YkGSLqhg+x00dhe9+g5oSzMcLndsFrUIX
jJ0kySnCh7y2ow5ZmX+rdde4rVMYVnBtk2YdKAN1sCqr+OR7P44wcC+ZorSO
sCdpo/1kEcJtY1ve30tnnPh8e/94c1rhoAV2U4vD5Kz7jV584eiI0/OfnN3g
z+/OJteaCfTlmcF7ON5497Rmeaz1mQhzsVHnvEudqniT02HvGyZkoiCGRBef
rI1CxnR8WBsTQyaZvS578cuj2v/lozpA4VfZPKuspEYAW6ih8Pu+1xmtptkP
qJr63oC7s7ROu1ShTSXvKOvyD6xC8bF3/H001R7lSDMtMCm3EpVJnuzxZQol
CvK9Le+H8N5EASKUA7s+bvVZYZh1srXkqix0ZWZJh3QW8jW+WrEXvqFP/1AM
aThTST5uwerdcjpM4o9K4NPuNAxJB8edfPywztOiIC6xWuvuzhthLJ6RDio0
IM+Do67TTV6mWRTB4OGdTT0zlRUPvQGqJyF5cwiaHz0QwmSKJ0Ju51JoEEzh
c8IJdy/zJQjx6RMxD0CXJA41duxLSWeAutxC3yqSAfuqy8c28XlmFsavorrW
KGInoVSuVuKc+gBz23aqJtE4J94MirB/SibLZuXaqpnCX0hKBpSaBTU7aB96
eyX08sfBy81avLGZ5PN9wUizw2QqyK8wkcRWypji2ema5N7MqFoNy66lMilB
B6hPV/ABjjQhDTJjOctTS/Iq5YjRHB4dPCwZBx4TQWVC94JoEkCJ0+aJn4EZ
CA34tmyqmU+I5GlTzJYdOnlUV1NVd2gTqDXrr6pJudBjwdBizkzgLirdO5a9
wZw+riXhrc+Qw7FDhKarDbf3oPXss7aUOxSwKWsOdcdFkUMzculc8o3sVpBs
JDhCKAlDCXEqMiGh7KG1L8Au3NmxtMqqKiUigKE2laWwtoHeUzlvs6m5nRv5
u/fot8+ysotlLSkCzVjjwxYOMwM1XMwTfQU0TEChwA+J4C7UEPvxOpj/fkne
pOvvJEzWmmdf8JWJ4X5JXAGAp1B80s/Qk/u+EuxS/xLF0KVkVmMY0cSXBueS
C2NoH4py3s/RKvuQJllkDbABZYIDHA56vO7TWCp7egTZD59Jtlvf9dpVXp/V
DSAO64PIdE3wd0a1krqG94pDyUF07bFPsZGH5JVgN9QKhDjMQRflSdoiX9y4
rUzb55gpEBeBjSZOnoQyauc1jCTG2iF77S10a2L5oMuBtZn11mfxzBv5I//G
bNsmZMM0f127fhJuulH9ZABU1lSxGuySm1byARWU92V5D6GtiCLQ5x7PlgmT
MlwrfPuAXJhdP88xrNznVMU6mWla61yjbkFVgmixz3UqHS5SeUgOz04dnIn3
8s6pajWpGgVIxCo8e5psTFq54ImOk9MscD6z2DtbvDd3pUfXa2kpODx7/9od
QbludHmpS/PE4DXLthOpeHKTsMewLX/lhv4ATCKYSBW/T15jTXGyJeEWV6+x
hHiRqr+c0pxv9WrcWgMRcIRWoOcOWKKy58z1MLusNsIWgcPEezynCjrbcuR+
edQaKviO8gq5Tb1BQYMUO6kmfGGKhlqQrFq0tZgUaZOXa+1DmXt11HPjUsBv
55BMBOCqL/en/CNmbApfBaPT2VbB42pXrwSxm7KszILRaAkNHdWiXVdZWfnK
nOggingKYDaOxWxA+e8NBGC+aZMXtiC3+miUQfWobT+g5thfwWDH14LFj7ZW
GFWUJcEb+d+s4AtRmQvv9dJIdH94fkQJFnrTnwglOrWkn+FAuEQSfLBcUiDA
R35JdpxI8rdZi28ahbLzMs/Le6nprcUbXvoclI8kJfL3jtuJugPhRarVqbQk
9ZCDfX4l0zD03j13hGxYKlhYC3Eq4PwSMv5nkMSU11oJuMpC6ULy43Qe06Zt
nFznLkTImj9nEV4f9AFi56LUlFrCt4wXKdSdMrKaUo/SYdj69h6G6La8d7dW
IDCzbGlGq/zWrD5+jBvDPCS9ELgHljQvapH5eOwrNG9ev7p48+XLr07YuOLx
vTRRukdf6y/UeqCanBnh+z3b9jI6bfw6HkhBF6ELK3HV8ScBaN/8PWEAC17T
Qva+6HPjd233mhb8VAtoa9Qa38LTfxDVLfHonEAGNkI5oRnbT0YpS0JcFhQk
NyrDuXCWF8fPhtG52m4M/n789NlzycZLrwdbQpO3KbwV6T31WmG2tEZC9x0A
243J257TgI094ki5WLfZJKmarQVjbHeAiyotIHXX+ydVJG0LAdZAm+nGi7DY
pZacQYJjoRV56XVhxBL7sKi22v46QNZvN4MenhpvSsTV3iJpqwxXxGWtLhwP
tn6wEROL5w3rY3QLQhObeiTCkW3dNLIfZSVg51bqfrE1oX19lLxDRLPSbscz
cQkZ45YC7V7CKOUugy+mqRtfhZOClna47fhsoIgzRaYsDMsj5rbPFavQJFsH
de6CF4kX/yEpTeAAppstOuPkXZS27Cp1kZIjUdRkSALC4zxqJBRXAd7VbVHe
05+WbJfaanGLWzD47HJX2cKbKBG+ZpXkK2hBItPfa1mk65dm5TqyUCyNdIEh
NOMxNZOi6FvWZm+2bM8+epx2/TuhXKFUyHvk9D53D6Rlqucq18EMkEBaFt42
e/sMTSca0uBB6rRJG8UfhCsHcxXaXqVtR2yTohPKqAheD7zbhj5NZdcsuNCL
hzcEnKfae1eUEgd5srGFI5D8M0ESGuMF45uV3tz80EV9HloGqbZrTnSQlroF
eQ8aoeQqfNIdQvtyYhew7rkTfYcyizohWM7wrlJZxNQRz4uo1whS+558n0cW
N3pU6RwiP07OH4iWhjFDxzmH7cNBQjsHhoFZ1L4jPYhR0uyqrRZMxVmJCOOi
VLrzmHcd6qXN8jHdatJsFhF3IiD2Ee216LxKF1QRjEu3UH9zdt2hX5y48LJK
fZVa5xWSJHQBZF5Kp4F8oz3kUTiQs8yWadd5ZXzS0KnCeYC6FKSUFcS2XcUr
d8Q2AHPjm8en5Qc5T1aVa6UJ+Wwvf2lDrcS0UCiSjPQu9763fYmNq0GnPxvL
qINEihPvFT+gzU+gPtimLhMOeV9hEVKvSaQXza/oohX3SqA0YrB68Bl10UhK
Q6rLVm4vSlqW29bMe4CQhMk9kyU0p6K6udR7UHPz3kh6QKmrP6afrUo0+mtx
pLFkpOCZMdHT/xYF5Y+uWbj9Z/98xpPFvECJaqVm9X3gXYtkpIKE43fSSHC+
7vp9LtpnrdbpdzQR4fS/YrTA01+Md2IherKy4AiwZlbCfDi0wZlNo6IVeVV3
8/m9dgAiooK6m4zYRNWev520CY5eq5FmcZSxmEAOI0JqQaVrd9v1ETqM1MQN
Bmd+mTenf/WtzN0KwmDirklvTbuEws0INkLdY9cDersWEcfyh74Bx89q+M6k
5Pn42fjLI+lzKCuOCLDedFeCituWrfUOPuVUKKdpa3QpbCRN9My2Nd2Iic+A
sIUv7hFV/giJw26noUIl2fH+KvFnrt/DPgmH5HufiKQl1XTay3iyp8/X2HyO
Wk62r9bSCosWa8RYsL2sl2HdSmFrkhU/9JJmYC26o9KiX4cCXr55IPDwVkry
QVL/lgxf6Lu3xV2Z3yku2nQPUDj0W27kZykhrKYmE+wy01P5bOUwOAtazbCz
23wTtmPjyCLMUvi+Q7cUBLGRC2GNzNMAHODAd8yaD2uZARh6Hpl2Xjt2CDlw
OUzrsjM1EUeRe2ZpqAOlfi+Z3ViPxcLAOUQqOvWQrKSKb7UiXeq0SICfLU5k
NpP5uYJ+yXm3ErEGNJtQePL1Qm0FnJmC3YJtw8CeEklXHgkt3L9SJhn+D+ok
W3VJaR+TopgUfbQ4aLZLg5o33i0R4KRzQTnlPnoMEttqs6cMQ7eVdXCtx4Tg
wCczCwbc1UZaUdVsg0LFbWvHbNWWWTSKyxEwgdpY0dfE2sbPqLRCF1/UVujY
7IaEpKrSy+r3Ph1q3YvKBJ6iDDiFtKs0PkoRUNWPgKxVMjrI8QiX+03sE5J2
W38PXafGSmSa+ixILBLiFUqDjDfAUa5eW7v/wAaZPWIUlxQ0TStOer89aqfd
JhoPOdT+6iNRvV3WUjt8On2bp6u1G2UMr5YWmIjFN0wSMShWGEIjvn0wE6rr
fcARRi5fZi5lN6N/gbr93rDLe5qmxWiVy59bwwB1gUDft4Vb3zggjnUf711+
KhRK/Po6Vs5dwtbSES1tC1yaZ49O8On1fT0CMY1noaI3JWFDhc+CO1UVRNMJ
e+3dM7V33+wHN2IJidIceyV31Oonsb/+adR+PoINdaTBVd26X2ft2h7c0Bfo
O7BDh3ux6Y2eyltqHqTz6B4WT5ykMA3Ghvz7tPAZmajAEzoLRS1KjQpLcj6v
lAbFMDmk64x3ydmdJvCMT6Z5npF0UixD0VyJtpUFEJVkU+v1kKaK95dY3nMk
5NXZ5NHx3fH4xVB+nUyGOiwyDFMIKiEX2fPnX7Vm5jP4SosNg5tYv4cUFxeU
8jHdOh/RpeKSxUywo1r8Sbnxbt/9dsHYUavjvNqe6yL7GoZq6Av0u13mEpOF
OZWs6WrLfpDcj/J1Ewspd7RrzZ/2Os34R+32aBM7fm7gPMrCCnmYpOIC89x8
CHkgzugWamwrCbGmec+lnpoCvF6ryx7wEzXDaaOcpEc8artgyLc8xVwBBTje
qkGFXi2nXVqcrS1nVk4qC7BwOmX7Sdxdoq6GT2N0RdFQDteJQdhGlmW1lYwK
TJrcKI9abOuS8tGJQuta156wR/x+NlU5YjfO1hCe+pnF0ieh2+JYlKyV7GgX
HAy7CUgBMAzZMloyThsQxI73JoOGyQ2HEUGSMFvTzuDmlVhgxlSgpAxFefO6
hlKhER+KUp2aulbPLIx1sm8uLTStY6QasfTtH34izCf/XX++T2oLdLt5BO8J
bx1yb4vndv3fu0CGQ9TBuYxnj4fqlpCLzqA15oajStLtYk0XBgz9HHHpJA2o
VSkEBGsvA4jTMorpShosakDsrEaEsxLBIdUZdwqVal1O6xlykt1mirHOvFSu
TS39aKbJ9aurBATy8iz5MMawHWYaQI5lVgwNVFOJe2+Y5RSd8xDeupIIQut3
w+SHd2Ciy9MfX8ktBJPvr+jDDFk/4ihb1wmmlzowCCelfpCBKE+etseR9gwY
87rhiu0fbjCQixWiXAYV7azeLTNkpXHF47aqIUvvz59pl1/qs0j49zHEqglH
/0fwYR9D+GuxJVDXISh7ICml+QUN24pspANfXUZdIfdRG9PJG68ofBdm21Ca
6sB9f95+66A+fm27XLsANaeiCkyvaIDgNhXNkTakbOUe81LVgiYQpHhm00VR
8maQ/vBw2lBaeFVFmGTRtLmgOm68GAnbU35Ivz7aeo0gtUlZpo0mSe8Dpdu3
tygdOOC/T2mlJVVZVcnI38Lso2xI+j5A2h2IYFFIkpln4DwqXgstAhbbIUm5
ZkGbm6K9B4O3bSVGxYzg9qw62Efn7eP5Pk0nUWcChblImHKgQNEUXX30Pq1o
o6QsKaBdqLlQO00GaO9Uue7dxBD3m0hJs2tm5kVL/iYNBLVwK9SScrH2oppA
EYLGrF87rElHLmdGRYZ/9t2RINeWfPmSvu8nuqNtGF9UrGi410JFeLD1WPb3
zZo+PKQcCS3o1/lGdbw1IkZHlzc315Pod5lOan/j5SpHbQWOlBWebAo1DIIE
+AGO9Yi11GWjocs6ZUjMpxr/RP1VISjVep5Y2V4HeQ+Jcde1BnifwJSv+PQ7
hB5uI/9f6BjfSZZ0SZrPauWOz/857dyMb9I2GfNQM3cr9xwzggba09TdDYT1
8sD9Xu8+nbrbLKS/Kqiteidx0Rvw3RKEqBuvpyf68VLU/YadJxftxT9fvHzO
NIC6aW1LRxtOiHJSAYFSn3FCdqjzM84gMNZolfq8rc7ETQ5e1uMz14EBfQeE
d3XjO4M6ETzk1WxHrT/8ay95oDRGEgS0h4mS3NFnZKNqagFPtRk58ewklUB9
45KFvZNrmyr2g1MHP47XGcudcd0APG9MKkbiCPqxj5YbRjLWM9ueYWj5o3cb
UdqfHPMzZVtTOK696iV0JO07nseEdSFF0omcje7Q8ukKuTPqq6eSoZCj+VBX
+j0yVZudVe3mwXabqPYP87nk8NXFG3dE/7CX2vim1yo1m1eL0Qd2DY6kx423
gDx69Ehtj5/jEdPVyZEWKrTGCGHAhh9DlUfkPbfTSuf0Zaoq7o4MpaQHFju8
OLs86k3LSQ+eK+zHj3F5JUzNl1Ma/V4/NjlC0BfcgdAHHym/rlKlMti5fLyI
prtEra86to0RtfcwStukLVjs9mGjuBxXYTSyBGJ9wcthWXXFtqNwvRKrvOnK
7ECuSSJeB2PCBWV6uZDS5exyzP/RFLdwEll2L4tSHeLNrJcPyPO2fAXdXcKl
rLYL3w/zHzjMj3kRpjYsrj+zMz+6puUfMrNZJJfrWwO2lhboRdJdONUvtMH5
qtp+XyZvio4L9nSw9gtvXg/66yg5HKA/Dtu7ycAhBe/aSr29a9YyEiZ3vsll
BvhhNHl/c+0n/V98+fILsCjWJoWIsuiPX3x5zJvepAuImYRoeZ/UmdSI1Xmb
GdVErh6Db8Jofb/kcHJ2c32kzYECiK9xPnsZVteRJr84/fmt0/zfuxrnv7ev
IQjcdjLOH/IyPu1jkByfHBdT7vBvt0OVLVp/N0+CwqADqG17n8q4ByA09HmO
DjMHEt5rXo/pmR4xggBMtrK3buerKPO1Jwn/QEL3MH2gCH38TLY+/iJKzv/q
LUYQQl43BsF29CJ/OL8WLC+q1M8AAzC5atVbRnECQtJE6q3HL54+BS1ro9W/
q+utxqhC+7LKqOI51IsMz/tGoe3Faly91YwlwhcSvfJZ66EJmmQ5fdRZImw5
lwYdlvnocIDLwAnxEbdTobu1d5b3vIr2LXFS/9X2Dmmf6EShO4paFkmIbXUg
ansGSbZ1OxKrGlQUYgvVGVHJ53beUioJVC96lelZNNI+9DQZr8G94T9wGjdr
badTBUd71yo3VVVHyuLt9Qn+cjryENfoygD+7yKHrV9X+sROcm+mY91bRjjA
xznnSmR4r+zcgMOHIrOj7gLPaIS5M6OagFxUMjEqPs627571R3TGioP/11Fi
DwGfGyb+DkFirMpVynwHqc8o6WUZvP9aRn3i9qQuwZqXC7mbrx0ZGya+gJ77
TDrvTbVFWsy0q7JObS49GGvfQub5zivh7vKJ3h2oWxgmgL962q4rQTsRwrp7
wN1pUeBIZ65QdO/5KxeXZl5r4+jWOiEO3eowCBOa7UiyuGkpVB7vaVHhlNlR
vSoqdG+xyRKi1aTeFYovv/agyF0w0cUCfGuqzUedjYwb3bdEoCn0Bm4JNvvy
oBOwj0VMeEGb3OrtLxvwIuwZRoazvf7VweXKyHTVsM1oAaQ8vksiNGGQl0Qy
ZpupqWbQRmb/xJiqK4amQZ11LCl7/k5eRnxdIKOpyslXH0SA5UI7pt/8yGvo
AFTiWDJD6CuUuEFsRHDJA2xbTs2juKjgLxeMbgGLeSj642+8nrVn3GtYPrkt
qQykZVD70N2V7VWt/UDfzyuL45H7fmG2iw1bl2r7DoW08jeZylsr36y0ZNGn
lNynXHVTbn2nlfrtdtQp2Dg3I95QIqOq8d1D2/ta353JMf7tUlq4nDSO+Npx
UW34TtVM7fPu2q7wB4Yzg3b87uqa0Uh3XTwIwqjx7CoaxRnvmyfR5LuTK7Pl
InMW1Mq8Ue3bdefvqbx+1hBluF/Wz0UGl8k3+ukNLr2+ibiMu9ER9k1w2FrM
qLPHMVfN/6dT8IQvOO9cTxzuFZSOyxkHb3KTLRSFg19O9P+JwWT/ciAX1R/I
3TBpcSvMfA7F82OIKF2zWHDQmylqCkp3N5qDAZZqevjuDeeZ3zWFkwHxYTKZ
lXWdfJc3y4p9aN+CZj+2TUPC0DfLcoWtsEOlupktnuZe/jYHs0x1jn7wX3wE
WAr8YgAA

-->

</rfc>
