<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-05"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="January" day="30"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for applications, end users, and system administrators. This document highlights the unique characteristics of applications and offers best practices for implementing quantum-ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries equipped with CRQCs. The degree of vulnerability varies in significance depending on the application and underlying systems. This document outlines quantum-ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, along with essential supporting applications, can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum-ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality, while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking traditional authentication mechanisms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may require protection for years, making the potential emergence of CRQCs a critical concern. This necessitates a shift away from traditional algorithms. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.kwiatkowski-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.connolly-tls-mlkem-key-agreement"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include high-security environments or sectors governed by stringent cryptographic standards.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the key challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets. This fragmentation increases the risk of packet loss and retransmissions, leading to potential delays. During the TLS handshake, the server will respond to the ClientHello with its public key and ciphertext. If these components also exceed the MTU, the ServerHello message may be fragmented, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <t>The quantum-ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
      <t>The quantum-ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      <ol spacing="normal" type="1"><li>
          <t>Post-Quantum X.509 Certificates</t>
        </li>
      </ol>
      <ul spacing="normal">
        <li>
          <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.tls-westerbaan-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
        </li>
        <li>
          <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. <xref target="I-D.reddy-tls-slhdsa"/> details how SLH-DSA is used in TLS 1.3 and compares its advantages and disadvantages with ML-DSA in Section 2 of the document</t>
        </li>
      </ul>
      <ol spacing="normal" type="1"><li>
          <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
        </li>
      </ol>
      <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
      <ul spacing="normal">
        <li>
          <t>Frequency and duration of system upgrades</t>
        </li>
        <li>
          <t>The expected timeline for CRQC availability</t>
        </li>
        <li>
          <t>Operational flexibility to enable or disable algorithms</t>
        </li>
      </ul>
      <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
      <t>Hybrid signatures enhance resilience during the adoption of PQC by:</t>
      <ul spacing="normal">
        <li>
          <t>Providing defense-in-depth: They maintain security even if one algorithm is compromised.</t>
        </li>
        <li>
          <t>Reducing exposure to unforeseen vulnerabilities: They offer immediate protection against potential weaknesses in PQC algorithms.</t>
        </li>
      </ul>
      <t>For example, telecom networks—characterized by centralized infrastructure, internal CAs, and close relationships with vendors are well-positioned to manage the overhead of larger PQC keys and signatures. These networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively.</t>
      <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns, as it could allow attackers to correlate separate TLS sessions, compromising anonymity for cases where this is a concern.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify end-users that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the client development team for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user. This message should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. It is also important to note that notifications to end-users may not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to decryption if an attacker gains access to the public keys used in the TLS key exchange. If an attacker obtains a complete set of encrypted DNS messages, including the TLS handshake details, they could potentially use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum-ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid Post-Quantum Key Encapsulation Mechanisms (KEMs), as described in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This extension ensures compatibility with Post-Quantum Cryptography (PQC) while maintaining the resilience provided by hybrid cryptographic approaches.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while maintaining the ability to respond to potential catastrophic vulnerabilities in any single algorithm. This approach enables a gradual transition to PQC without the need to completely abandon traditional cryptosystems.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Bas Westerbaan, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.kwiatkowski-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="24" month="December" year="2024"/>
            <abstract>
              <t>   This draft defines three hybrid key agreements for TLS 1.3:
   X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which
   combine a post-quantum KEM with an elliptic curve Diffie-Hellman
   (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-03"/>
        </reference>
        <reference anchor="I-D.connolly-tls-mlkem-key-agreement">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as a
   standalone NamedGroups for use in TLS 1.3 to achieve post-quantum key
   agreement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-tls-mlkem-key-agreement-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-06"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="25" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies how the post-quantum signature scheme ML-DSA
   [FIPS204], in combination with traditional algorithms RSA-
   PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for
   authentication in TLS 1.3.  The composite ML-DSA approach is
   beneficial in deployments where operators seek additional protection
   against potential breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-01"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="24" month="January" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-07"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
