<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-vitap-ml-dsa-webauthn-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ml-dsa-webauthn">ML-DSA for Web Authentication</title>

    <author fullname="Aditya Mitra">
      <organization>VIT-AP University</organization>
      <address>
        <email>adityamitra5102@gmail.com</email>
      </address>
    </author>
    <author fullname="Sibi S. Chakkaravarthy">
      <organization>VIT-AP University</organization>
      <address>
        <email>chakkaravarthy.sibi@vitap.ac.in</email>
      </address>
    </author>
    <author fullname="Anisha Ghosh">
      <organization>VIT-AP University</organization>
      <address>
        <email>ghoshanisha2002@gmail.com</email>
      </address>
    </author>
    <author fullname="Devi Priya VS">
      <organization>VIT-AP University</organization>
      <address>
        <email>priya.21phd7042@vitap.ac.in</email>
      </address>
    </author>

    <date year="2025" month="April" day="02"/>

    
    
    <keyword>PQC</keyword> <keyword>COSE</keyword> <keyword>WebAuthn</keyword> <keyword>ML-DSA</keyword> <keyword>CBOR</keyword> <keyword>Passwordless</keyword> <keyword>Phishing-resistant</keyword>

    <abstract>


<?line 73?>
<t>This document describes implementation of Passwordless authentication in Web Authentication (WebAuthn) using Module-Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in FIPS 204.</t>



    </abstract>



  </front>

  <middle>


<?line 76?>

<section anchor="introduction"><name>Introduction</name>

<t>This document describes how to use ML-DSA keys and signature as described in <xref target="FIPS-204"/> with <xref target="WebAuthn"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Some examples in this specification are truncated with "..." for readability.</t>

</section>
<section anchor="background-on-post-quantum-cryptography"><name>Background on Post-Quantum Cryptography</name>

<t>This section describes a generic backround of Post-Quantum Cryptography, Web Authentication and Phishing Resistance.
Post-Quantum Cryptography is defined to be a set of cryptographic algorithms that are not vulnerable against a malicious actor in possession of a large scale Quantum Computer. <xref target="FIPS-204"/> has described Module-Lattice-Based Digital Signature Algorithm which is not vulnerable to attacks involving a large-scale quantum computer.</t>

<section anchor="motivation-for-ml-dsa-in-webauthn"><name>Motivation for ML-DSA in WebAuthn</name>

<t>With the wide range adoption of phishing-resistant passwordless authentication standard like Security Keys, Passkeys and Device attestation following the FIDO2 Specifications, the adopted cryptographic standards for authentication have been primarily ES256 (Elliptic Curve Digital Signature Algorithm with SHA-256) and RS256 (RSA with SHA-256) as defined in <xref target="FIPS-186-5"/>. Though most authenticators support other algorithms as well, the widely used default algorithms- ES256 and RS256 are deemed to be insecure against adversaries employing large-scale quantum computers.</t>

<t>Hence, the adoption of ML-DSA for WebAuthn would be necessary to secure digital identities and accounts from such adversaries.</t>

</section>
</section>
<section anchor="ml-dsa-integration-in-webauthn"><name>ML-DSA Integration in WebAuthn</name>

<t>This section describes the implementation of WebAuthn with ML-DSA.</t>

<section anchor="ml-dsa-key-representation-in-cose"><name>ML-DSA Key Representation in COSE</name>

<t><xref target="I-D.draft-ietf-cose-dilithium-05"/> describes CBOR Object Signing and Encryption (COSE) Serialization for ML-DSA. It is to be noted that the COSE representation of only 'Public key' or 'Verifying key' is used in WebAuthn. Hence, the COSE Representation of private keys are beyond the scope of this document.</t>

<t>ML-DSA Signature Scheme is parameterized to support different security levels. In this document, the abbreviations of ML-DSA-44, ML-DSA-65 and ML-DSA-87 are used to refer to ML-DSA with the parameter choices given in Table 1 of FIPS-204.</t>

<t>Along with <xref target="I-D.draft-ietf-cose-dilithium-05"/>, this document requests the registration of the following algorithms in <xref target="IANA.cose"/>:</t>

<texttable align="left" title="COSE algorithms for ML-DSA" anchor="cose-algorithms">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>ML-DSA-44</c>
      <c>TBD (requested assignment -48)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-44</c>
      <c>ML-DSA-65</c>
      <c>TBD (requested assignment -49)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-65</c>
      <c>ML-DSA-87</c>
      <c>TBD (requested assignment -50)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-87</c>
</texttable>

<t>In accordance with the Algorithm Key Paid Type section of <xref target="I-D.draft-ietf-cose-dilithium-05"/>, when present in AKP Keys, the "pub" parameter has the following constraints:</t>

<t>The "pub" parameter is the ML-DSA public key, as described in Section 5.3 of FIPS-204.</t>

<t>The size of "pub", and the associated signature for each of these algorithms is defined in Table 2 of FIPS-204, and repeated here for convenience:</t>

<texttable align="left" title="Sizes (in bytes) of keys and signatures of ML-DSA" anchor="fips-204-table-2">
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Private Key</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <c>ML-DSA-44</c>
      <c>2560</c>
      <c>1312</c>
      <c>2420</c>
      <c>ML-DSA-65</c>
      <c>4032</c>
      <c>1952</c>
      <c>3309</c>
      <c>ML-DSA-87</c>
      <c>4896</c>
      <c>2592</c>
      <c>4627</c>
</texttable>

<t>These algorithms are used to produce signatures as described in Algorithm 2 of FIPS-204.</t>

<t>Signatures are encoded as bytestrings using the algorithms defined in Section 7.2 of FIPS-204.</t>

</section>
<section anchor="signature-generation-and-verification"><name>Signature Generation and Verification</name>

<t>Signature generation is done in accordance with Section 5.2 of FIPS-204. Signature Verification is done in accordance with Section 5.3 of FIPS-204.</t>

<t>If small keys or signature is needed, ML-DSA might not be the ideal option. Furthermore, in usage scenarios expecting swifter processing, ML-DSA-87 might not be the best option. Therefore, using ML-DSA-44 and ML-DSA-65 with WebAuthn is advised.</t>

</section>
</section>
<section anchor="authenticator-behavior"><name>Authenticator Behavior</name>

<t>This section describes how an authenticator, roaming or platform would implement ML-DSA.</t>

<t>The authenticator <bcp14>MUST</bcp14> have a secure storage for storing cryptographic secrets which <bcp14>SHOULD NOT</bcp14> be able to export the secrets in an unauthorized manner.</t>

<section anchor="credential-creation"><name>Credential Creation</name>

<figure><artwork><![CDATA[
         +---------------+                    +--------+                                   +-----------+
         |               |                    |        |                                   |           |
         | Authenticator |                    | Client |                                   | RP Server |
         |               |                    |        |                                   |           |
         +-------+-------+                    +---+----+                                   +-----+-----+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |      Get Challenge                           |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                   Challenge                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |  Credential Creation Request   |                                              |
                 |<-------------------------------+                                              |
+----------------+   (Challenge)                  |                                              |
| Generate       |                                |                                              |
| Keypair        |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
+----------------+                                |                                              |
| Sign challenge |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
                 |  Assertion Response            |                                              |
                 +------------------------------->|                                              |
                 |  (Signed Challenge)            |     Assertion                                |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |  Verify            |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |   Save public key  |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |     Authentication response                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
]]></artwork></figure>

<t><xref target="WebAuthn"/> defines the credential creation API. This API takes a public key credential creation object, containing a cryptographic challenge, the Relying Party ID (RP ID), User details, and public key credential parameters. The public key credential parameters define the accepted algorithms.</t>

<t>An example of public key credential creation object is:</t>

<figure><artwork><![CDATA[
{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rp: { id: "example.com", name: "Example Corporation" },
  user: {
    id: new Uint8Array([79, 252, 83, 72, 214, 7, 89, 26]),
    name: "johndoe",
    displayName: "John Doe",
  },
  pubKeyCredParams: [{ type: "public-key", alg: -7 }, { type: "public-key", alg: -49 }],
}
]]></artwork></figure>

<t>The web application invokes the <spanx style="verb">Navigator.credentials.create()</spanx> function with the Public Key Credential Creation Object. The client web browser, or an application invokes the authenticator API defined in <xref target="CTAP"/>. The public key credential creation object is CBOR encoded and sent to the authenticator device over a chosen transport method which includes but is not limited to USB HID, BLE and NFC.</t>

<t>An example of CBOR Encoded Public Key Credential Creation object is:</t>

<figure><artwork><![CDATA[
h'A50158201637B26333915747DBDC6C630C0165405A64939AE8F6E4FC39414F853F702F1602A2626964696C6F63616C686F7374646E616D656B44656D6F2073657276657203A3626964504EC1D4219F294FB4A0BC0CD29D485AFC646E616D6566615F757365726B646973706C61794E616D6567412E20557365720481A263616C67382F64747970656A7075626C69632D6B657907A1627576F5'
]]></artwork></figure>

<t>The authenticator <bcp14>MUST</bcp14> verify whether any credential mentioned in the list of "excludeCredentials" in the public key credential creation object is already present on the authenticator, and in such cases it will return the error code in accordance with <xref target="CTAP"/>. Further authenticator <bcp14>MUST</bcp14> perform all additional checks involving authenticator PIN, User presence, user verification etc in accordance with Section 5.1 of CTAP.</t>

<t>The authenticator <bcp14>SHALL</bcp14> use ML-DSA-65 or ML-DSA-44 if included in <spanx style="verb">alg</spanx> -49 or -48 respectively are available in the public key credential parameters. If the parameters are not present, the authenticator <bcp14>SHALL</bcp14> behave in accordance with the "Backward Compatibility Considerations" section of this document.</t>

<t>The authenticator generates ML-DSA keypair in accordance with Section 5.1 of FIPS 204 and unique Key ID. The public key is COSE encoded following <xref target="I-D.draft-ietf-cose-dilithium-05"/> and is a part of the attestedCredentialData.</t>

<t>After passing all checks in accordance with section 5.1 of CTAP, the authenticator <bcp14>SHOULD</bcp14> create the attestation statement. The authData is created in accordance with WebAuthn and CTAP specifications and the clientDataHash is appended to it. This is signed with the private key of the generated keypair. The attestation statement is generated in accordance with CTAP and WebAuthn.</t>

<t>The ML-DSA private key is to be stored in accordance with the "Storage security and Key management" section of this document.</t>

<t>The attestation statement is encoded in CBOR and returned to the client application via the same transport method.</t>

</section>
<section anchor="authentication-flow"><name>Authentication Flow</name>

<figure><artwork><![CDATA[
      +---------------+                    +--------+                                   +-----------+
      |               |                    |        |                                   |           |
      | Authenticator |                    | Client |                                   | RP Server |
      |               |                    |        |                                   |           |
      +-------+-------+                    +---+----+                                   +-----+-----+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |      Get Challenge                           |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                   Challenge                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |   Assertion Request            |                                              |
              |<-------------------------------+                                              |
              |   (Challenge)                  |                                              |
+-------------+                                |                                              |
|Sign         |                                |                                              |
|Challenge    |                                |                                              |
|             |                                |                                              |
|             |                                |                                              |
+------------>|                                |                                              |
              |  Assertion Response            |                                              |
              +------------------------------->|                                              |
              |  (Signed Challenge)            |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |     Assertion                                |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              +--------------------+
              |                                |                                              |     Verify         |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |<-------------------+
              |                                |     Authentication response                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
]]></artwork></figure>

<t><xref target="WebAuthn"/> defines the credential request API. This API takes a public key credential request object, containing a cryptographic challenge, the Relying Party ID (RP ID) and optionally a list of allowed credentials.</t>

<t>An example of public key credential request object is:</t>

<figure><artwork><![CDATA[
{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rpId: "example.com",
}
]]></artwork></figure>

<t>The web application invokes the <spanx style="verb">Navigator.credentials.get()</spanx> function with the Public Key Credential Request Object. The client web browser, or an application invokes the authenticator API defined in <xref target="CTAP"/>. The public key credential request object is CBOR encoded and sent to the authenticator device over a chosen transport method which includes but is not limited to USB HID, BLE and NFC.</t>

<t>If a list of <spanx style="verb">allowedCredentials</spanx> is present, the authenticator must discover credentials bound to the same RP ID which is present in the list. If no such credential is present, it will return the error code in accordance with <xref target="CTAP"/>. Further authenticator <bcp14>MUST</bcp14> perform all additional checks involving authenticator PIN, User presence, user verification etc in accordance with Section 5.2 of CTAP.</t>

<t>The authenticator, on discovering a suitable credential for authentication <bcp14>SHOULD</bcp14> verify the algorithm. If it is not ML-DSA, the authenticator <bcp14>SHALL</bcp14> behave in accordance with the "Backward Compatibility Considerations" section of this document.</t>

<t>The credential is retrieved in accordance with the "Storage security and Key management" section of this document.</t>

<t>After passing all checks in accordance with section 5.2 of CTAP, the authenticator <bcp14>SHOULD</bcp14> create the assertion statement. The authData is created in accordance with WebAuthn and CTAP specifications and the clientDataHash is appended to it. This is signed with the decrypted ML-DSA private key. The assertion response is generated in accordance with CTAP and WebAuthn.</t>

<t>The assertion response is encoded in CBOR and returned to the client application via the same transport method.</t>

<t>All memory addresses used to handle the ML-DSA private key is immediately zeroized.</t>

<t>The authenticator <spanx style="verb">getNextAssertion()</spanx> function specification is to be similarly implemented in accordance with <xref target="CTAP"/>.</t>

</section>
<section anchor="backward-compatibility-consideration"><name>Backward Compatibility Consideration</name>

<t>The authenticator <bcp14>SHOULD</bcp14> default to using RS256 and ES256 algorithms following FIPS-186-5 if the Relying Party (RP) does not support ML-DSA, which can be verified by inpecting the Public Key Credential Parameters field during credential creation.</t>

</section>
</section>
<section anchor="client-and-platform-considerations"><name>Client and Platform Considerations</name>

<t>This section describes the considerations about the Client and Platform.</t>

<section anchor="cose-algorithm-support-in-webauthn-clients"><name>COSE Algorithm Support in WebAuthn Clients</name>

<t>The CTAP implementations on client, for example Windows Hello for Microsoft Windows based systems, iCloud Keychain for Apple systems, Google Password Manager, Dashlane, OnePassword and other browser based implementations for Linux <bcp14>SHOULD</bcp14> have support for ML-DSA Algorithms in accordance with COSE. Further, Platform Authenticators for such devices are <bcp14>RECOMMENDED</bcp14> to have support for ML-DSA Key Generation and signing in accordance with this document.</t>

</section>
<section anchor="handling-large-signatures-and-keys"><name>Handling large signatures and keys</name>

<t>It is considered that the chosen transport methods including but not limited to USB HID, BLE and NFC are able to perform exchanges of the CBOR encoded data which may be often over 2000 bytes. The use of attestion certificates may increase the length even more.</t>

</section>
<section anchor="error-handling-and-fallback-mechanisms"><name>Error Handling and Fallback mechanisms</name>

<t>In case of errors involving ML-DSA key generation and signing, the authenticator may fallback to using ES256 or RS256 algoritms. In case of errors involving communication with the client, the authenticator may handle it in accordance with <xref target="CTAP"/>.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of <xref target="RFC9053"/> applies to this specification as well.</t>

<t>A detailed security analysis of ML-DSA is beyond the scope of this specification, see <xref target="FIPS-204"/> for additional details.</t>

<section anchor="resistance-to-quantum-attacks"><name>Resistance to Quantum Attacks</name>

<t>See <xref target="FIPS-204"/> for details on resistance to quantum attacks.</t>

</section>
<section anchor="storage-security-and-key-management"><name>Storage security and Key management</name>

<t>It is to be noted that at the time of writing this draft, there is no suitable hardware security module (HSM), trusted platform module (TPM), Secure Element (SE), Trusted Execution Environment (TEE) with native support for ML-DSA. Hence, secure credential storage is a challenge. To overcome the same, the ML-DSA keys, also referred to as credentials, <bcp14>MUST</bcp14> be encrypted with Advanced Ecnryption Standard (AES), which is a Post Quantum Symmetric encryption algorithm in Galosis Counter Mode (GCM) with 256-bit keys.</t>

<t>The AES Keys <bcp14>MUST</bcp14> be generated and stored in secure storage, which may include a HSM, TPM, SE or TEE. The ML-DSA Keys may be generated on the standard computing environment, outside the secure storage. The ML-DSA Credential <bcp14>MUST</bcp14> be encrypted by AES as described above before being written to the Flash memory or Disk. Conversely, the same <bcp14>MUST</bcp14> be decrypted by AES in the secure storage before being used.</t>

<t>Any memory location, pointer or heap that has been used to handle the ML-DSA Credentials <bcp14>MUST</bcp14> be zeroized immediately after the operation is performed.</t>

<t>This section is to be updated when suitable secure storage modules supporting ML-DSA becomes widely available.</t>

</section>
<section anchor="implementation-best-practices"><name>Implementation Best Practices</name>

<t>If the amount of space in the secure storage permits, each ML-DSA Private key is <bcp14>RECOMMENDED</bcp14> to be encrypted with unique AES keys.
*       Prior to storage, each ML-DSA private key is to be encrypted independently using a distinct AES encryption key.
*       To guarantee robust encryption, the AES key size must be at least AES-256.
*       To avoid unwanted access, encrypted keys ought to be kept in Hardware Security Modules (HSMs), Secure Elements (SEs), or Trusted Platform Modules (TPMs).
*       NIST SP 800-57 recommendations should be followed by key management to provide secure AES key lifecycle management (creation, storage, rotation, and disposal).
*       Only in a trusted execution environment (TEE) or secure enclave should the private key be decrypted in order to avoid memory leakage.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>Along with <xref target="I-D.draft-ietf-cose-dilithium-05"/>, this document requests the registration of the following entries to the COSE Algorithm Registry.
The following completed registration templates are provided as described in RFC9053 and RFC9054.</t>

<section anchor="algorithms-to-be-added"><name>Algorithms to be added</name>

<section anchor="ml-dsa-44"><name>ML-DSA-44</name>

<t><list style="symbols">
  <t>Name: ML-DSA-44</t>
  <t>Value: TBD (requested assignment -48)</t>
  <t>Description: CBOR Object Signing Algorithm for ML-DSA-44</t>
  <t>Capabilities: <spanx style="verb">[kty]</spanx></t>
  <t>Reference: RFC XXXX</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ml-dsa-65"><name>ML-DSA-65</name>

<t><list style="symbols">
  <t>Name: ML-DSA-65</t>
  <t>Value: TBD (requested assignment -49)</t>
  <t>Description: CBOR Object Signing Algorithm for ML-DSA-65</t>
  <t>Capabilities: <spanx style="verb">[kty]</spanx></t>
  <t>Reference: RFC XXXX</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ml-dsa-87"><name>ML-DSA-87</name>

<t><list style="symbols">
  <t>Name: ML-DSA-87</t>
  <t>Value: TBD (requested assignment -50)</t>
  <t>Description: CBOR Object Signing Algorithm for ML-DSA-87</t>
  <t>Capabilities: <spanx style="verb">[kty]</spanx></t>
  <t>Reference: RFC XXXX</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
</section>
<section anchor="new-cose-key-types"><name>New COSE Key Types</name>

<t>IANA is requested to add the following entries to the COSE Key Types Registry.
The following completed registration templates are provided as described in RFC9053.</t>

<section anchor="akp"><name>AKP</name>

<t><list style="symbols">
  <t>Name: AKP</t>
  <t>Value: TBD (requested assignment 7)</t>
  <t>Description: COSE Key Type for Algorithm Key Pairs</t>
  <t>Capabilities: <spanx style="verb">[kty(7)]</spanx></t>
  <t>Reference: RFC XXXX</t>
</list></t>

</section>
</section>
<section anchor="new-cose-key-type-parameters"><name>New COSE Key Type Parameters</name>

<t>IANA is requested to add the following entries to the COSE Key Type Parameters.
The following completed registration templates are provided as described in RFC9053.</t>

<section anchor="ml-dsa-public-key"><name>ML-DSA Public Key</name>

<t><list style="symbols">
  <t>Key Type: TBD (requested assignment 7)</t>
  <t>Name: pub</t>
  <t>Label: -1</t>
  <t>CBOR Type: bstr</t>
  <t>Description: Public key</t>
  <t>Reference: RFC XXXX</t>
</list></t>

</section>
</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9679">
  <front>
    <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
    <author fullname="K. Isobe" initials="K." surname="Isobe"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="O. Steele" initials="O." surname="Steele"/>
    <date month="December" year="2024"/>
    <abstract>
      <t>This specification defines a method for computing a hash value over a CBOR Object Signing and Encryption (COSE) Key. It specifies which fields within the COSE Key structure are included in the cryptographic hash computation, the process for creating a canonical representation of these fields, and how to hash the resulting byte sequence. The resulting hash value, referred to as a "thumbprint", can be used to identify or select the corresponding key.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9679"/>
  <seriesInfo name="DOI" value="10.17487/RFC9679"/>
</reference>

<reference anchor="I-D.draft-ietf-cose-dilithium-05">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <author fullname="Rafael Misoczki" initials="R." surname="Misoczki">
         <organization>Google</organization>
      </author>
      <author fullname="Michael Osborne" initials="M." surname="Osborne">
         <organization>IBM</organization>
      </author>
      <author fullname="Christine Cloostermans" initials="C." surname="Cloostermans">
         <organization>NXP</organization>
      </author>
      <date day="18" month="December" year="2024"/>
      <abstract>
	 <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-05"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-cose-key-thumbprint">
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname="Kohei Isobe" initials="K." surname="Isobe">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <date day="6" month="September" year="2024"/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   CBOR Object Signing and Encryption (COSE) Key. It specifies which
   fields within the COSE Key structure are included in the
   cryptographic hash computation, the process for creating a canonical
   representation of these fields, and how to hash the resulting byte
   sequence.  The resulting hash value, referred to as a &quot;thumbprint,&quot;
   can be used to identify or select the corresponding key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-key-thumbprint-06"/>
   
</reference>

<reference anchor="I-D.draft-ietf-lamps-dilithium-certificates">
   <front>
      <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
      <author fullname="Jake Massimo" initials="J." surname="Massimo">
         <organization>AWS</organization>
      </author>
      <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
         <organization>AWS</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
         <organization>Cloudflare</organization>
      </author>
      <date day="2" month="February" year="2025"/>
      <abstract>
	 <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
   
</reference>

<reference anchor="FIPS-186-5" target="https://doi.org/10.6028/NIST.FIPS.186-5">
  <front>
    <title>Digital Signature Standard (DSS)</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="FIPS-204" target="https://doi.org/10.6028/NIST.FIPS.204">
  <front>
    <title>Module-Lattice-Based Digital Signature Standard</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2">
  <front>
    <title>Web Authentication: An API for accessing Public Key Credentials</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CTAP" target="https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html">
  <front>
    <title>Client To Authenticator Protocol (CTAP)</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SP-500-57" target="https://doi.org/10.6028/NBS.SP.500-57">
  <front>
    <title>Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>


<?line 501?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We express our sincere gratitude to Dr. S. V. Kota Reddy, Vice Chancellor, VIT-AP University, for his unwavering support and encouragement throughout this research. We also extend our heartfelt thanks to Dr. Jagadish Chandra Mudiganti, Registrar, VIT-AP University, for facilitating a conducive research environment. Our appreciation goes to Dr. Hari Seetha, Director, Centre of Excellence, Artificial Intelligence and Robotics (AIR), VIT-AP University, for her invaluable guidance and insightful discussions that significantly contributed to this work.</t>

<t>We also acknowledge Indominus Labs Private Limited and Digital Fortress Private Limited for their generous support, which played a crucial role in the successful execution of this research.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+0963LbNtb/PZN3wLo/ajeSqrtszba7siQ32iSOajnpt9Pp
TCASkrimSC5B2tHG6bP0Wfpk3zkHAC8S5Utqp9msPRPHAgmcg3MHdIBTLpef
7ERO5Iou2335ojyY9NjMD9lPYsp6cbQQXuRYPHJ8b/fJDp9OQ3EBLy7dsi15
+VJMObyDj+AdMffDVZfJyH6y82TH9i2PL2FUO+SzqHzhRDwor/UrV6tPdmQ8
XTpSAoRoFcD7o+HZ8ZMdL15ORdiFcWBg+M/yPSk8Gcsui8JYPNkBNBpPdr5i
PBQcMJoIKw6daLWLbZd+eD4P/TiAByPPFoGAX15EE/JDeOVcrOAdG8ZlZTb+
sU//919NhvQHzB3f9OiDool64ejVqerBpcT+rpBSNSwcuXC8eTkU0pER9yIk
ASdwBAT+wc8sdl1FlJ4NuHL20olCrp754Zx7zn+I1F32ZnRW7o3Za8+5EKGE
d9VLYskdt8s49V5i51atWv/7HJsrlr8sAjVxpg6bVFh/wc/PecgveBgtVncH
auX6VyQM+3fiaoVbFccrnKUHZOHsh4UvF3cHOMdunIaoV2+a5UBcOGwcOkDU
N5O7wwqwZ6VeCxZ2p9qs5ycG0uiHSxjnAiWRsVHvpAd4SBRW8ye2nx73D6ut
RtdIEjW0O4ddIzlsVB5UlD44IpqVsWPZdlwnWjjxslxtdbW4ldUIT3Ycb5YH
XTAACHM5WoC+wCS8SEEvPx8NCt53+TKQGYiWCCNnhgouQLES4MPTswlCZ+x4
NJ6Uawftcqur6GVMxcCZA4lckK65x6M4FGwCYm/z0GZ7g8lkf1e/zsO5AJwW
URTI7rff2r5TAb58W6tW2tX6wbcno8lZBYFUCEgGaL3aXAP50rdjV5Rf8AhM
kigfcSlsth2PO2MAEBV8o/9r8DdNIko4641HZDG5ZYE5ACPAxvHUdSz2XKxY
PxRoeRzuyi34XF5eVi4bhNLZ6beJZawrVPpnvfEaGn3XQVt25meRAfjj0I98
y3fZHnbaxoCZY/vcdR3uWYKAykBYkprLF/VKtezYQPraQbVe76hWi+CVI7/M
s/DKgYa30a2yiJauQn8yLreq1XKrszaHXgwWjAGf2PCCuzERk/kz1veXQRyJ
kBlzzkYjsGArGYklexO7ngj5FKXXEZK698FrhP5W4m4w+2hSmYwrCidEsYzu
j/5jfCrBnlpguc/AmjPwX/ESCW0LaYXOFAA6y8AV2Jbgm3UEjOdkgzlegRNl
e0a49llMwnJHqWZ7Skn3S4yzsS+j8o8xuJt4CaK2CiJ/HvJgsWJ74NT2ma2H
kckw0lrADGBOM8cDOIAjij4D0a8YOiwdG+aDn75iI6SuHVuIOrZso8zCv2SR
DzMS2oYwMEqKQylsLpMeBPn9e6PoHz6wS7BI0GKo8+ED4YM4nIlw6Xi+689X
CgWBg6OPtyUYhdeTs92S+p+dvKK/T4c/vh6dDgf49+RZ78WL5I8d/cbk2avX
LwbpX2nP/quXL4cnA9UZWlmuaWf3Ze+f8AQntvtqfDZ6ddJ7sYuTiXKUgaAE
6TEV8AjEOQhFBHPmcidHgKP++Pffak2Y9l/AU9RrtUMghPpwUOsQVUB0FDTf
c1f6I8jTaocHgeAhjgLazCweIKNlCYksgRseW4hQVHZ2vvkZKfNLl/11agW1
5ve6ASecazQ0yzUSzTZbNjorIhY0FYBJqJlrX6N0Ht/eP3OfDd0zjX/9mwvy
zMBT/e17EpuJD1Iu3nHUWJnwB22dcneoisSkMPbQ+9lKAHcrlcouWXOIKm1l
alYVJYdH3KKgkpixXfUSNZGC1CajJZzNBVgwcA1TGEsPNds+VKnIgKAwmHCT
nepwE2z5k53t1gBFU2u8kkoO2EUI20pfA7S4CyE80GEpgV5cibHnR+xCW14X
es6540l4xJYcnJzjxzAvC/0PEDnwpRQUyuPYnLlojsHmcOiYIKZNfCWv/4uc
dbilUewZfEEzHGuB81xDF6YLYwC1UQgufPcCqaYRKyvE/q0RswxixO6vAAeI
uhTNUSC0XVNWXS8Pnuz8hFID/AHxsQULuQfz5bYfGAcRbCwMWHCNz5DGyrvO
uUidIEQSoNrobBKzivGuJXByQkYGS9f1L3GCiNDxaPCqziZZiZdkOxR+QM88
7w1oqYKZPF4LfiFAboSHgfKShw4Yo+Gk3mqzvSEEEzBdi/XjEF66lklILLAg
Zei4T7M4VWOcAmHXHsqsj9KSQiEieAZ2tvDj+YItfRTEbFACWhcHgR+CbENr
mBVoGPFSuG4p4RZMIUaxAjg8dqPMu2U9txRDVARbgOe0E7MukTkZfbBxWQGU
AT0XYHX8FTLiOjmTJGjPBChvhi9abvIrcRI38HixayNwT2CkycMVIqPxMK7e
oXAziY8gKAUzEwFTQ38JxAElyWCqLZsGBs5egDRkgpdEzLcYNMR6MyhKEUaW
qsETpVKgMDQ+FeAWZdIRIJpFz/v35cwyCIxDChEXUuzV9F+ACokYqTOGkR5J
M0VY2GkflCeEqFsv/zIaXGGjCA2F4iOYC+QpGjucDHYF059DDGZEzvdrHdaD
Cn4Na0v29RuAMCM2UxOMSfKUIV2FZdhLY59ujA0KBVZG6IApRDVb+Z5NXaTl
BwJfykUXREtNyEyAqCI7eC+ARfoSAo7Q+Y+SV6MTtjObQVQANkgay+KKC+FK
oMlaBKMlkvZ7HGU8UrEsN5sl82e7RfTXnw46NAWiAwAOBcDDPzS2l8ZaJigy
a+GDHZNsDitcEoIzsts1hGbcA0245/pAaR0m5uWjtBZ9heLfMVhFJZ+hmDsY
2Bt6Y1tqKTMGguxMOVnQf/jQRbBX7AQwZerniuFqxXza8nO10TIg8Q1UEH1F
S46rlJTY4+xowPY02hQoYtRMcyk3D/b1sEWynxrXVMJhzAwAYNANAA7vDKDd
ygAAnl8PoFW9M4ADWJy977KvaH8ja8Rd6PXdritm0a5aTH63S3qVeScdZvcD
chBEG61gaGOYlIpgCheN0Zg7NjtbgbYZKweisilnGIAzrcEoML3nY+2cccjd
IJ7uZmQbY5q8uOEuJsgiLApk1yxm1ns5qpNWmSAxOqWNBdREo9qqNDbUBUeW
YADwAUFQywjSail9y6GgN12cIdUEB/egVAQWclnVyHljpaH1LEg1OBhOQcPi
2oNGhPmCWjtoBLU2pWS/wu06Mn3IgKvsrslV1q7BJLZoDXjmaqJ0tUatnnyo
N+vVDR1oVhvpG7XDVvqh0agebkh08+CwnQ7YOkxfb7brWj5nTiBx/uUIaVKu
FwoozkCyPaDcdAXR2j4SbnN5nLGvSm7P1rmQtawBLctFtvu6dKSUrm9IxyTT
DUYF/vg2aa1CMQpBWKXeoCCRSbHICIKRv05lEwL4+pSHP+CyJ12+kOPUoWUO
G7U+0vEAGnRP0Ap3TX1Tuc/DzUDMgrjdUJsqNJoxucTVNTELpDnVFlxoCAEk
M36QLZ35IqLVB0QVFBfZAsIxFdFV2HEcYkC69EOIBgCPWHJaGQkPAjEfQsZ3
AWIC5JaXzgzNAHBY7yeWMnK5AQaCoiiBcoaKNyMYenMpUZeMkwZtoLkncRrM
BoJCB0RLB4T5jcUjAeG/44fXBIK4/8O9fCxeYqHPl4gFjBG4PMKdbB3EJkFj
NjxEk5UbgdFOBa09uIlzJbQj6dC64N9kVfMLGWGFApy/WhKm+xC07tVrQiA3
BkQUY+nXUTiAL5760oZCpyX3vHQ9mG7l4p+J8P76669q75F+npbzP0+LIoSn
1z7d9jK+n4G0HmZshh3ZxsKn14xwlYOUl4ctkPS+9O0gnY4xQIeFyBqk7Rht
Nv6RORmqPr2JT0/vxqenG3y6Nba3mU729UcYnwTGDyLCr05dV+Dezj3DWDcX
1/98/7nT6ouEcQ3zPw7GX+/E9Edb8gjjEcZnCaMgImSnagvknmDcZCpuE5jk
YWx4HBxiL7Fx+wWd7gzjyiz40n2zmzp9BIznYhVwJ7z1EB8D465D/O/CWJer
7/9L9bxQP+4ZhtrewoQ6HVj8l/L8EcbtYXwp+lE0RE9KzCMk7ycDTNS9Zxg3
LZNuJuat5rGHailsVuwNFYx0rh8H4/qf/9H1YOG0P8nCh6md4lWu8dMALmh8
BPxFAS6K3r+U5fyfqbJsgl8JpN+Mfuly9Aj4ywd8z7ZiLWk0LIjL9OuPW5iP
MB5hXAeDvuHFrMT0cILOglCZOla6DWiZbcDeeIRfxzuSjgdF/JzSvzMuq6iT
T5lRJcyaibijchvXvtxO9gxUxtGpcCkBccxDPCszYHunY/hvv8RewzIFsIRx
6FSAZ28BnuQdSUofuPEtPXOVFWJZgjKJ0/QQlarnmdR7SnC8zaSZoxKiiNbv
ka/JTLvME5fsteNFB70w5Ku9n+u1VonVWlX4VTsssXqtgb+grd7sQNvBAT6F
f806/IK3WvC81sAWeFyv4h8N7NzA9ha83cAXcRRobcPfbRymho2HNfhVx/cO
4Fm93sQe0FanvjX42D7A9tYv+yXEOgy67D1z7C7b1STAA4u7JaZOKe4ONV36
fhj4KtNll32grjFwDDormcYR1qfdwbm2AKsDgN2p45wBPqB6gA/aGgNmQP3L
X3i2L3Z1q+3IwOWrE/XwH/CQDcxThQAw6rlY4ab2GNktu+zn90ydyd1VTMSj
hphI5s67rNyBbuy6F5qH7MMvMPKHRIVQwC7FlPEgcNNjUhf+udaktyf8wplj
kkElFRVZIVkRe/tv2Sz2VOpJksZXeNYu3Y5XyYZKtNVBNkJgGvqXQO4SpqZg
3soWfPLZKKjJuaR0PGen0tG36c2mlKscyCThCjPAEKnILwBoqxx/H9MkOGbK
wqssCrknKXsFFHLh2+bog2e5sQ14T+PInINwnaUTqXyx15Mj9mw0KLGjF0OC
enLcL9BVQm6okbuBtAWKu/i616qCRtWrtXajc1RvNxqNw1qr0+wMjgb9dr/d
qPbhUatZbfXazcPGYW94cNweNo/7jcNmrXl80Gocd6r141q7Wu/V2/X2YbsJ
//rt43ajXYP/D9rHnUanCa1D+Dxot9pHzSb8HrSP69VOo93q1Dtt/F1t9Bqq
f6vaHPZrg2a9dnhcP2weHzV71aN+tT+oHw6aB63ecT8zWrtdax13Wmqk9hFC
B3hVgFzrHDbNW51mrT4EO6LfqzYPaoCtwrDTOKgft5sw5UPo12r3OtVOCzDp
Ay6N+gDGbHUOq51erV0HOO3j1tc57SjIf7pQGxSXC6GONHg5CcMkKuCGEkkU
IdeRdLIH7A9JRPYEqnnn1sLKXTwHtUpSXn1vU0yVd4GR6XSBxSUeuAI1c1wX
4s4oDlUfEYaUEGoX5uGlyqQz5YooEYiQcsgwJ4/btoPIIt4LsXa+J38udnSi
3aGahUXZcfDxIpsjKCLr+vxAykhHJLfkqqmTcekJSEyzy6ZkM2dmlJSo9RaM
5FsykvBWuXlAMTpCu8CTKZiVyS/AeVPG2rVsy3rw0SyfXi+TI1yag6UCM6Mw
nwpKtCugAaU24+m3SzyZhOe3gGTqaByev5WOrXM2QcAy2dObZxY2iabzPUFi
0mOj9KXezaww51ZJ+mLP+XesEolHgw2DjFYXk8SN1U3zsTdOmpAoU6jGw8gc
F1CHrISdqtKAR1yZT5WrydXBbzqKaaRxYwJyU5aK2UEZi8rpZeAnJ8QiypxU
s8SuiAwirXrYRaCTVE86Mw2A80chZZIbrnwkjviMSzpQhwdNPVt5ESfSQS0m
gaq98vRIR3qOxdDNcNc2bNU4F00Hh0zfL5gCYY1oJodrjEiZTPkMAsn5HkwR
LR6PpHqis0mT8zAIAKVoyT1oR8RuI9PbJmQEDs82oWdVSfJoEhU9U4rnQpAL
h6vUVDx5su7vTTrq2gr/GCR6LR31E+Wiri+oivdQrn16zQhXKZhPkoX6iWbz
ifNPH3zl/Qjg3gB8dMLpg3+7+NmQ6AsDcJcM0wffm/08SfQI4BHAFwggmzlj
8kbvD8D9Z49uzuCeU0ef3g3BuwO4otS7W/f/CAA5a/4QAO7W/zMEkGPywyfC
XT10htqDp6dd3S437Q8BuKHHI4BHAI8ATHbFRyeBPq7R1n9ul0j2MIk+a7mf
D0/MwsZHqP/1UG+VvXVb4/LRqVuPewOPAB4BPAJ4BPAI4BHAFgB3yObU19nd
KZnT9Lm/XE51/XOgkl0wNSRJ8eGYxkAXuaa5crfNv8zj+eWkX442Ui/vIQFx
LqK7ZB+avdw/Oflwg8WfW+7haJYR5rdamjP5am/pNtPtiUvLWOKlptIiLDMM
Y1O6W1tPjNIoSJfSa6IzdziapDnKnvJ8ncaWkjGLwxeY11a/Pq+thDl/hsbK
isnYoesOs0QquDNa5zHp9MXcLYJEaieRFZXA86enpuV5DiwOHXHxoMlDH5c9
Vr9j9liyWfXZ5o7ZgjyjsAtyuTSuySSS9fDHJ4wVD/ZgyVo9F9N0l364Qu0G
kJghay7yXAAYV+RufM3nsTnLpbDxtlZw/f8RoY83E27JpnwLfupEvIuS7cmc
08oXP0gz5MBQuzyE0ZNLGYvpmZgynYB2G7XblipLMmouXqfCIVTNILl1Xd+/
nr3U16RspjfBY0btZuAEUdM+aJlQpsVcfW1MjHIAFrhdmLoylDDbKUzeMxdw
bvfr4zStFrq5NrNjff/kRg61vkhTZ6NRzQZzA2beLt1wu7qVe5lxcGz6pvLN
kZOLKjHXNb39daJJkLmXXPeWhj2kKvmL3CXafSXuJXU5sI4of3I8G+IX9kwA
R9Rly44V+tKfRcmzKdVrkFS2R4LX7Lt+TKYRokpHXcbeC3Cw5JUffH8On009
HfaSTCh4nwGYEpd74NteeSJ5TCExuVMdTGmQ63NASC8cL35nZI4ciRGKTFmH
Xu4e8A1TAhRNPHgpZWUuI1FBo+hBBU8q+TpT1UTpezECKGpr1+RKfUN2of9Z
dyXA92doSpKqA7mrgT1KwSV+q9vvjVxlL7/fEuRJHd/hyBjg3SK6U+nr+q5V
E92Id8B9WFBIkx6ci0ZtdERKO5d8hdoJAgXYUGhXr1ar6mZi5Q0wyx7XP5R3
i+TK1jGj/oAyaKJUhhXXMUA0gTfM4w28hmBDCt0SsiHyx+CEsTgLzN2i2nNL
qe8Qx4MNCJTivWxUlmauZ68vzjCwMHQFHGcGVmIAldmDx6dZ+7dU9/NvRQBW
OcvYM4Y9capGeYuBa7/jRDeb+rQOSZHpysQ/a8ZK3aBuEuvRZQqpHOlmKR5V
nEO5S31sES1IGllxdyWdzB3ZKMRbKyXkBi/BMCJfbIai1TTQ1sckjVikRXUQ
W1O3pqfKyNB91UXj6UGYiioyA5i6H7oOTXI79s3RY6quG8UqtMpGzpJmfQkj
KN+FdgHr/RHf9U3VfhqyL8BhX6J2JmCXVGqH7T2bvNwvYT0kur8/ua/ZPD4b
4+OJuoR5qC9v3psMofFM9xm+g6fEzqF34YS+uv5/72w43Fdi5VEdwwLrl9TJ
0Jc8Zxyque+ZDmUkmxIVLH+HpsHCOk8m/Cplw6hzupYfFoO6DEWozBWX2YVi
SS3ApnQFug5BCdWefYH8g0lZnikskpZg6w0n+6V0MakKsSWSMllByBZhmSeR
ViVJYhnUtx+466M097E2C9i3l7h63Puh/1ITCpS/PAXVxDkksR4ApVoDCcpp
9EvGJjnpkL8pu5SxqnqhDggDt4FxY/gFsQLwAZikTGvqjqQxxCkcffwrqVKk
Stmg4ImU47BijCO0A+Z67QwyORiZyGqTCxCS4YRzl9pD9ENliPCGc/gP4aLg
o5vQ8fmxiysPHWzDtAaOPK+g2cKSNxAmltJQ3YBM1x4apN4SWLtvPAc1Nlel
97yVgeb6xtwEPhV9Q/gLwQOlsFgLggoobQ/8MzsfCXYm4s8tAzgtG7EnGL30
unztaJPlQSaoTExIHNiq2hkWskiswtpclc4ntZQyTm4qUOGkqZ+UnFAzRm2U
LwZ0hNtPYyyqiOGQ3vIhf7REyUfLJQNuiS00D7DyXwRKSoUpNArj/PJoLbza
1GR9NAw5q9XpG70ZDCP5VJ0m0ZQsnMLjROnYTlpWmApJqa0RG+w+KFlE4DLa
j+vYFDDYrnkMawmQEsFCf4rbWOnLSkY1vqqGB2104fX1EHlBVEPDY52s/Jj8
wnfwKNwlpyWcqkdayuCs6hjEWEFATedcBOT/nxmvkHj6l1oE0C3IDcMv0fJj
M1oObf2ToDjpCuZF7mdQxEqrbDJmB1R9E6wyBi5AQh0uyIWpb6UWe0ojz3Me
UZe+uEDrooXFEMp1ZsJaWSDNmdf3zHqslDI59CPdhGYTj8X7krtZRF9huScM
ixJ3KBLXJjZcGwb9ChWgtEvhvZrJ+qm4nLGB4SHkUtWRFOOMHRH8HC2lLsDZ
O+kVhF14/kvHLySaw3ckeFgQkKodOUrbHqZmErweJqGcWF9uagxQ3s/Wat+g
ccC554aPsFoaxe0ogJq59kY1E11bWdVko79NnZGvsos3Xd7QhiH0U1NzjKoi
IY/VDQiZxm/YG6zq1L2hChO+mKnk1L1bPaZvWJ8HSe3aLnv783m0+uUtPjgV
VJXLAgxgZuz/4Ec1a/0Qdpf9U8j1+bRbBfPBxlvN5/APzEcBuY/55Gd00CmY
ETbeZkat6h+YkQJyTxxiJ+JSaQWG81hUSrk+VGXaWDboo+rb9i20KxnngbWr
knCk93yc5QV9vAUXOgU8yE5Abf2sV94K5Rbq73X2r2HAFmJntunuieyZER+a
7ibISfYfFRcMJjfTXvEriKf44QWfCrfLyjWiLyqDGgQrXW8wKi1veA3Fy+Uy
Fa/VdYKsc8+/hJX6fKm2E993vXg5xW2l73ZnEMcKVcrqJ6zFi99SYfiBdZRg
XKz2hMSKcEECVB+EFTapsDcV9hwcNMC3bQjX3+CXkP0FrsWA4iE0jM7KvTF7
7TkY0kOoonYn0Zdh5KO/pDJLTPQWuMMUh0kAsQgxAlLbqCQWUvDQWlTYT0Kt
FsU7WFDYhCiE72E0E7hHDSicS4PnP/icQ+CwIMxguc1exrYzh7DLKRkN5dtx
nXELxZxHOinA9+zYwoWxwSUbZFTYK0CEB0A9SxViZHNfJJhA5OZAcCYAvxKs
duAl+s6uj+JMOwPDd0g5tbruqU0yXHBhrU/Xdeb4QPlUf+pDlA5hW290ur+d
zligzqOa7bhwmMeO2jZSV4BIrE41i136wjCmQsC6kjBtheGODIXLmBQBOhBH
5psVYMSlH55XtLAQH3giXALQtf2l48USRVoma4AXehuSCuLqAqjHwHeStPWX
EH1QbUffOoGFi7WYmCUy3o+EozErjIlKoZ9eviFjiqdxdmk06M9+/w2x//23
RI6e7Pw/vYg0oFOFAAA=

-->

</rfc>

