<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-08"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="July" day="03"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for applications, end users, and system administrators. This document highlights the unique characteristics of applications and offers best practices for implementing quantum-ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries equipped with CRQCs. The degree of vulnerability varies in significance depending on the application and underlying systems. This document outlines quantum-ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, along with essential supporting applications, can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum-ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality, while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking traditional authentication mechanisms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may require protection for years, making the potential emergence of CRQCs a critical concern. This necessitates a shift away from traditional algorithms. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.kwiatkowski-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.connolly-tls-mlkem-key-agreement"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include sectors governed by stringent cryptographic standards.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the key challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets. This fragmentation increases the risk of packet loss and retransmissions, leading to potential delays. During the TLS handshake, the server will respond to the ClientHello with its public key and ciphertext. If these components also exceed the MTU, the ServerHello message may be fragmented, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="use-of-external-psk-with-traditional-key-exchange-for-data-confidentiality">
      <name>Use of External PSK with Traditional Key Exchange for Data Confidentiality</name>
      <t><xref target="RFC8772"/> provides an alternative approach for ensuring data confidentiality by combining an external pre-shared key (PSK)
with a traditional key exchange mechanism, such as ECDHE. The external PSK is incorporated into the TLS 1.3 key schedule,
where it is mixed with the (EC)DHE-derived secret to strengthen confidentiality.</t>
      <t>While using an external PSK in combination with (EC)DHE can enhance confidentiality, it has the following limitations:</t>
      <ul spacing="normal">
        <li>
          <t>Key Management Complexity: Unlike ephemeral ECDHE keys, external PSKs require secure provisioning and lifecycle management.</t>
        </li>
        <li>
          <t>Limited Forward Secrecy: If an external PSK is static and reused across sessions, its compromise can retroactively expose
past communications if the traditional key exchange is broken by a CRQC.</t>
        </li>
        <li>
          <t>Scalability Challenges: Establishing unique PSKs for many clients can be impractical, especially in large-scale deployments.</t>
        </li>
        <li>
          <t>Quantum Resistance Dependence: While PSKs can provide additional secrecy against quantum threats, they must be
generated using a secure key-management technique. If a weak PSK is used, it may not offer sufficient security against
brute-force attacks.</t>
        </li>
      </ul>
      <t>Despite these limitations, external PSKs can serve as a complementary mechanism in PQC transition strategies, providing additional
confidentiality protection when combined with traditional key exchange.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <t>The quantum-ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
      <t>The quantum-ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      <ol spacing="normal" type="1"><li>
          <t>Post-Quantum X.509 Certificates</t>
        </li>
      </ol>
      <ul spacing="normal">
        <li>
          <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.tls-westerbaan-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
        </li>
        <li>
          <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. <xref target="I-D.reddy-tls-slhdsa"/> details how SLH-DSA is used in TLS 1.3 and compares its advantages and disadvantages with ML-DSA in Section 2 of the document</t>
        </li>
      </ul>
      <ol spacing="normal" type="1"><li>
          <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
        </li>
      </ol>
      <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
      <ul spacing="normal">
        <li>
          <t>Frequency and duration of system upgrades</t>
        </li>
        <li>
          <t>The expected timeline for CRQC availability</t>
        </li>
        <li>
          <t>Operational flexibility to enable or disable algorithms</t>
        </li>
      </ul>
      <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
      <t>Hybrid signatures enhance resilience during the adoption of PQC by:</t>
      <ul spacing="normal">
        <li>
          <t>Providing defense-in-depth: They maintain security even if one algorithm is compromised.</t>
        </li>
        <li>
          <t>Reducing exposure to unforeseen vulnerabilities: They offer immediate protection against potential weaknesses in PQC algorithms.</t>
        </li>
      </ul>
      <t>For example, telecom networks—characterized by centralized infrastructure, internal CAs, and close relationships with vendors are well-positioned to manage the overhead of larger PQC keys and signatures. These networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively.</t>
      <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns, as it could allow attackers to correlate separate TLS sessions, compromising anonymity for cases where this is a concern.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
          <li>
            <t>Trust Anchor Identifiers ({?I-D.ietf-tls-trust-anchor-ids}): This extension allows a client to signal a compact list of trusted root CAs using unique trust anchor identifiers rather than full Distinguished Names. This reduces the size of the "certificate_authorities" extension and helps the server select an appropriate certificate chain,
especially when multiple hierarchies are used (e.g., separate traditional and PQ roots). This mechanism can help reduce handshake size and improve efficiency in hybrid or PQC deployments.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify end-users that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the client development team for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user. This message should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. It is also important to note that notifications to end-users may not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to decryption if an attacker gains access to the public keys used in the TLS key exchange. If an attacker obtains a complete set of encrypted DNS messages, including the TLS handshake details, they could potentially use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum-ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid Post-Quantum Key Encapsulation Mechanisms (KEMs), as described in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This extension ensures compatibility with Post-Quantum Cryptography (PQC) while maintaining the resilience provided by hybrid cryptographic approaches.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The adoption of PQC in TLS-based applications will not be a simple binary decision but rather a gradual transition that  demands a careful evaluation of
trade-offs and deployment considerations. Application providers will need to assess algorithm selection, performance impact,
interoperability, and security requirements tailored to their specific use cases. While the IETF defines cryptographic mechanisms for TLS and
provides guidance on PQC transition strategies, it does not prescribe a one-size-fits-all approach. Instead, this document outlines key
considerations to assist stakeholders in adopting PQC in a way that aligns with their operational and security requirements.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of
maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic
algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory
requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while
ensuring resilience to potential catastrophic vulnerabilities in any single algorithm. This approach allows for a gradual
transition to PQC, preserving the benefits of traditional cryptosystems without requiring their immediate replacement.</t>
      <section anchor="mitm-attacks-with-crqc">
        <name>MITM Attacks with CRQC</name>
        <t>A MITM attack is possible if an adversary possesses a CRQC capable of breaking traditional public-key signatures. The attacker can generate
a forged certificate and create a valid signature, enabling them to impersonate a TLS peer, whether a server or a client. This completely undermines the authentication
guarantees of TLS when relying on traditional certificates.</t>
        <t>To mitigate such attacks, several steps should be taken:</t>
        <ol spacing="normal" type="1"><li>
            <t>Revocation and Transition: Servers should revoke traditional certificates and migrate to PQC authentication.</t>
          </li>
          <li>
            <t>Client-Side Verification:  Clients should avoid establishing TLS sessions with servers that do not support PQC authentication.</t>
          </li>
          <li>
            <t>PKI Migration: Organizations should transition their PKI to post-quantum-safe certification authorities and discontinue issuing certificates based on traditional cryptographic methods.</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Russ Housley, Loganaden Velvindron, Bas Westerbaan, Richard Sohn, Andrei Popov, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-13"/>
        </reference>
        <reference anchor="I-D.kwiatkowski-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="24" month="December" year="2024"/>
            <abstract>
              <t>   This draft defines three hybrid key agreements for TLS 1.3:
   X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which
   combine a post-quantum KEM with an elliptic curve Diffie-Hellman
   (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-03"/>
        </reference>
        <reference anchor="I-D.connolly-tls-mlkem-key-agreement">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as a
   standalone NamedGroups for use in TLS 1.3 to achieve post-quantum key
   agreement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-tls-mlkem-key-agreement-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-02"/>
        </reference>
        <reference anchor="RFC8772">
          <front>
            <title>The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP)</title>
            <author fullname="S. Hu" initials="S." surname="Hu"/>
            <author fullname="D. Eastlake" initials="D." surname="Eastlake"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="T. Chua" initials="T." surname="Chua"/>
            <author fullname="D. Huang" initials="D." surname="Huang"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>A Broadband Network Gateway (BNG) in a fixed wireline access network is an Ethernet-centric IP edge router and the aggregation point for subscriber traffic. Control and User Plane Separation (CUPS) for such a BNG improves flexibility and scalability but requires various communication between the User Plane (UP) and the Control Plane (CP). China Mobile, Huawei Technologies, and ZTE have developed a simple CUPS control channel protocol to support such communication: the Simple Control and User Plane Separation Protocol (S-CUSP). S-CUSP is defined in this document.</t>
              <t>This document is not an IETF standard and does not have IETF consensus. S-CUSP is presented here to make its specification conveniently available to the Internet community to enable diagnosis and interoperability.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8772"/>
          <seriesInfo name="DOI" value="10.17487/RFC8772"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="18" month="June" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory guidelines.  Composite ML-DSA is
   applicable in any application that uses X.509 or PKIX data structures
   that accept ML-DSA, but where the operator wants extra protection
   against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-06"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="June" year="2025"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-04"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="1" month="July" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-13"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="May" year="2025"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
