<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-07"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="February" day="26"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for applications, end users, and system administrators. This document highlights the unique characteristics of applications and offers best practices for implementing quantum-ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries equipped with CRQCs. The degree of vulnerability varies in significance depending on the application and underlying systems. This document outlines quantum-ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, along with essential supporting applications, can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum-ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality, while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking traditional authentication mechanisms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may require protection for years, making the potential emergence of CRQCs a critical concern. This necessitates a shift away from traditional algorithms. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.kwiatkowski-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.connolly-tls-mlkem-key-agreement"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include high-security environments or sectors governed by stringent cryptographic standards.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the key challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets. This fragmentation increases the risk of packet loss and retransmissions, leading to potential delays. During the TLS handshake, the server will respond to the ClientHello with its public key and ciphertext. If these components also exceed the MTU, the ServerHello message may be fragmented, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="use-of-external-psk-with-traditional-key-exchange-for-data-confidentiality">
      <name>Use of External PSK with Traditional Key Exchange for Data Confidentiality</name>
      <t><xref target="RFC8772"/> provides an alternative approach for ensuring data confidentiality by combining an external pre-shared key (PSK)
with a traditional key exchange mechanism, such as ECDHE. The external PSK is incorporated into the TLS 1.3 key schedule,
where it is mixed with the (EC)DHE-derived secret to strengthen confidentiality.</t>
      <t>While using an external PSK in combination with (EC)DHE can enhance confidentiality, it has the following limitations:</t>
      <ul spacing="normal">
        <li>
          <t>Key Management Complexity: Unlike ephemeral ECDHE keys, external PSKs require secure provisioning and lifecycle management.</t>
        </li>
        <li>
          <t>Limited Forward Secrecy: If an external PSK is static and reused across sessions, its compromise can retroactively expose
past communications if the traditional key exchange is broken by a CRQC.</t>
        </li>
        <li>
          <t>Scalability Challenges: Establishing unique PSKs for many clients can be impractical, especially in large-scale deployments.</t>
        </li>
        <li>
          <t>Quantum Resistance Dependence: While PSKs can provide additional secrecy against quantum threats, they must be
generated using a secure key-management technique. If a weak PSK is used, it may not offer sufficient security against
brute-force attacks.</t>
        </li>
      </ul>
      <t>Despite these limitations, external PSKs can serve as a complementary mechanism in PQC transition strategies, providing additional
confidentiality protection when combined with traditional key exchange.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <t>The quantum-ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
      <t>The quantum-ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      <ol spacing="normal" type="1"><li>
          <t>Post-Quantum X.509 Certificates</t>
        </li>
      </ol>
      <ul spacing="normal">
        <li>
          <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.tls-westerbaan-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
        </li>
        <li>
          <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. <xref target="I-D.reddy-tls-slhdsa"/> details how SLH-DSA is used in TLS 1.3 and compares its advantages and disadvantages with ML-DSA in Section 2 of the document</t>
        </li>
      </ul>
      <ol spacing="normal" type="1"><li>
          <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
        </li>
      </ol>
      <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
      <ul spacing="normal">
        <li>
          <t>Frequency and duration of system upgrades</t>
        </li>
        <li>
          <t>The expected timeline for CRQC availability</t>
        </li>
        <li>
          <t>Operational flexibility to enable or disable algorithms</t>
        </li>
      </ul>
      <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
      <t>Hybrid signatures enhance resilience during the adoption of PQC by:</t>
      <ul spacing="normal">
        <li>
          <t>Providing defense-in-depth: They maintain security even if one algorithm is compromised.</t>
        </li>
        <li>
          <t>Reducing exposure to unforeseen vulnerabilities: They offer immediate protection against potential weaknesses in PQC algorithms.</t>
        </li>
      </ul>
      <t>For example, telecom networks—characterized by centralized infrastructure, internal CAs, and close relationships with vendors are well-positioned to manage the overhead of larger PQC keys and signatures. These networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively.</t>
      <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns, as it could allow attackers to correlate separate TLS sessions, compromising anonymity for cases where this is a concern.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify end-users that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the client development team for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user. This message should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. It is also important to note that notifications to end-users may not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to decryption if an attacker gains access to the public keys used in the TLS key exchange. If an attacker obtains a complete set of encrypted DNS messages, including the TLS handshake details, they could potentially use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum-ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid Post-Quantum Key Encapsulation Mechanisms (KEMs), as described in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This extension ensures compatibility with Post-Quantum Cryptography (PQC) while maintaining the resilience provided by hybrid cryptographic approaches.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The adoption of PQC in TLS-based applications will not be a simple binary decision but rather a gradual transition that  demands a careful evaluation of
trade-offs and deployment considerations. Application providers will need to assess algorithm selection, performance impact,
interoperability, and security requirements tailored to their specific use cases. While the IETF defines cryptographic mechanisms for TLS and
provides guidance on PQC transition strategies, it does not prescribe a one-size-fits-all approach. Instead, this document outlines key
considerations to assist stakeholders in adopting PQC in a way that aligns with their operational and security requirements.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of
maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic
algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory
requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while
ensuring resilience to potential catastrophic vulnerabilities in any single algorithm. This approach allows for a gradual
transition to PQC, preserving the benefits of traditional cryptosystems without requiring their immediate replacement.</t>
      <section anchor="mitm-attacks-with-crqc">
        <name>MITM Attacks with CRQC</name>
        <t>A MITM attack is possible if an adversary possesses a CRQC capable of breaking traditional public-key signatures. The attacker can generate
a forged certificate and create a valid signature, enabling them to impersonate a TLS peer, whether a server or a client. This completely undermines the authentication guarantees of TLS when relying on traditional certificates.</t>
        <t>To mitigate such attacks, several steps need to be taken:</t>
        <ol spacing="normal" type="1"><li>
            <t>Revocation and Transition: Servers should revoke traditional certificates and migrate to PQC authentication.</t>
          </li>
          <li>
            <t>Client-Side Verification:  Clients should avoid establishing TLS sessions with servers that do not support PQC authentication.</t>
          </li>
          <li>
            <t>PKI Migration: Organizations should transition their PKI to post-quantum-safe certification authorities and discontinue issuing certificates based on traditional cryptographic methods.</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Russ Housley, Loganaden Velvindron, Bas Westerbaan, Richard Sohn, Andrei Popov, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.kwiatkowski-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="24" month="December" year="2024"/>
            <abstract>
              <t>   This draft defines three hybrid key agreements for TLS 1.3:
   X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which
   combine a post-quantum KEM with an elliptic curve Diffie-Hellman
   (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-03"/>
        </reference>
        <reference anchor="I-D.connolly-tls-mlkem-key-agreement">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as a
   standalone NamedGroups for use in TLS 1.3 to achieve post-quantum key
   agreement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-tls-mlkem-key-agreement-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-01"/>
        </reference>
        <reference anchor="RFC8772">
          <front>
            <title>The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP)</title>
            <author fullname="S. Hu" initials="S." surname="Hu"/>
            <author fullname="D. Eastlake" initials="D." surname="Eastlake"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="T. Chua" initials="T." surname="Chua"/>
            <author fullname="D. Huang" initials="D." surname="Huang"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>A Broadband Network Gateway (BNG) in a fixed wireline access network is an Ethernet-centric IP edge router and the aggregation point for subscriber traffic. Control and User Plane Separation (CUPS) for such a BNG improves flexibility and scalability but requires various communication between the User Plane (UP) and the Control Plane (CP). China Mobile, Huawei Technologies, and ZTE have developed a simple CUPS control channel protocol to support such communication: the Simple Control and User Plane Separation Protocol (S-CUSP). S-CUSP is defined in this document.</t>
              <t>This document is not an IETF standard and does not have IETF consensus. S-CUSP is presented here to make its specification conveniently available to the Internet community to enable diagnosis and interoperability.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8772"/>
          <seriesInfo name="DOI" value="10.17487/RFC8772"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="25" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies how the post-quantum signature scheme ML-DSA
   [FIPS204], in combination with traditional algorithms RSA-
   PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for
   authentication in TLS 1.3.  The composite ML-DSA approach is
   beneficial in deployments where operators seek additional protection
   against potential breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-01"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-23"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
