<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-vitap-ml-dsa-webauthn-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ml-dsa-webauthn">ML-DSA for Web Authentication</title>

    <author fullname="Aditya Mitra">
      <organization>VIT-AP University</organization>
      <address>
        <email>adityamitra5102@gmail.com</email>
      </address>
    </author>
    <author fullname="Sibi S. Chakkaravarthy">
      <organization>VIT-AP University</organization>
      <address>
        <email>chakkaravarthy.sibi@vitap.ac.in</email>
      </address>
    </author>
    <author fullname="Anisha Ghosh">
      <organization>VIT-AP University</organization>
      <address>
        <email>ghoshanisha2002@gmail.com</email>
      </address>
    </author>
    <author fullname="Devi Priya VS">
      <organization>VIT-AP University</organization>
      <address>
        <email>priya.21phd7042@vitap.ac.in</email>
      </address>
    </author>

    <date year="2025" month="September" day="21"/>

    
    
    <keyword>PQC</keyword> <keyword>COSE</keyword> <keyword>WebAuthn</keyword> <keyword>ML-DSA</keyword> <keyword>CBOR</keyword> <keyword>Passwordless</keyword> <keyword>Phishing-resistant</keyword>

    <abstract>


<?line 73?>
<t>This document describes implementation of Passwordless authentication in Web Authentication (WebAuthn) using Module-Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in FIPS 204.</t>



    </abstract>



  </front>

  <middle>


<?line 76?>

<section anchor="introduction"><name>Introduction</name>

<t>This document describes how to use ML-DSA keys and signature as described in <xref target="FIPS-204"/> with <xref target="WebAuthn"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Some examples in this specification are truncated with "..." for readability.</t>

</section>
<section anchor="background-on-post-quantum-cryptography"><name>Background on Post-Quantum Cryptography</name>

<t>This section describes a generic backround of Post-Quantum Cryptography, Web Authentication and Phishing Resistance.
Post-Quantum Cryptography is defined to be a set of cryptographic algorithms that are not vulnerable against a malicious actor in possession of a large scale Quantum Computer. <xref target="FIPS-204"/> has described Module-Lattice-Based Digital Signature Algorithm which is not vulnerable to attacks involving a large-scale quantum computer.</t>

<section anchor="motivation-for-ml-dsa-in-webauthn"><name>Motivation for ML-DSA in WebAuthn</name>

<t>With the wide range adoption of phishing-resistant passwordless authentication standard like Security Keys, Passkeys and Device attestation following the FIDO2 Specifications, the adopted cryptographic standards for authentication have been primarily ES256 (Elliptic Curve Digital Signature Algorithm with SHA-256) and RS256 (RSA with SHA-256) as defined in <xref target="FIPS-186-5"/>. Though most authenticators support other algorithms as well, the widely used default algorithms- ES256 and RS256 are deemed to be insecure against adversaries employing large-scale quantum computers.</t>

<t>Hence, the adoption of ML-DSA for WebAuthn would be necessary to secure digital identities and accounts from such adversaries.</t>

</section>
</section>
<section anchor="ml-dsa-integration-in-webauthn"><name>ML-DSA Integration in WebAuthn</name>

<t>This section describes the implementation of WebAuthn with ML-DSA.</t>

<section anchor="ml-dsa-key-representation-in-cose"><name>ML-DSA Key Representation in COSE</name>

<t><xref target="I-D.draft-ietf-cose-dilithium-05"/> describes CBOR Object Signing and Encryption (COSE) Serialization for ML-DSA. It is to be noted that the COSE representation of only 'Public key' or 'Verifying key' is used in WebAuthn. Hence, the COSE Representation of private keys are beyond the scope of this document.</t>

<t>ML-DSA Signature Scheme is parameterized to support different security levels. In this document, the abbreviations of ML-DSA-44, ML-DSA-65 and ML-DSA-87 are used to refer to ML-DSA with the parameter choices given in Table 1 of FIPS-204.</t>

<t>This document requests the registration of the ML-DSA algorithms in <xref target="IANA.cose"/> as mentioned in <xref target="I-D.draft-ietf-cose-dilithium-05"/> as :</t>

<texttable align="left" title="COSE algorithms for ML-DSA" anchor="cose-algorithms">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>ML-DSA-44</c>
      <c>TBD (requested assignment -48)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-44</c>
      <c>ML-DSA-65</c>
      <c>TBD (requested assignment -49)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-65</c>
      <c>ML-DSA-87</c>
      <c>TBD (requested assignment -50)</c>
      <c>CBOR Object Signing Algorithm for ML-DSA-87</c>
</texttable>

<t>In accordance with the Algorithm Key Paid Type section of <xref target="I-D.draft-ietf-cose-dilithium-05"/>, when present in AKP Keys, the "pub" parameter has the following constraints:</t>

<t>The "pub" parameter is the ML-DSA public key, as described in Section 5.3 of FIPS-204.</t>

<t>The size of "pub", and the associated signature for each of these algorithms is defined in Table 2 of FIPS-204, and repeated here for convenience:</t>

<texttable align="left" title="Sizes (in bytes) of keys and signatures of ML-DSA" anchor="fips-204-table-2">
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Private Key</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <c>ML-DSA-44</c>
      <c>2560</c>
      <c>1312</c>
      <c>2420</c>
      <c>ML-DSA-65</c>
      <c>4032</c>
      <c>1952</c>
      <c>3309</c>
      <c>ML-DSA-87</c>
      <c>4896</c>
      <c>2592</c>
      <c>4627</c>
</texttable>

<t>These algorithms are used to produce signatures as described in Algorithm 2 of FIPS-204.</t>

<t>Signatures are encoded as bytestrings using the algorithms defined in Section 7.2 of FIPS-204.</t>

</section>
<section anchor="signature-generation-and-verification"><name>Signature Generation and Verification</name>

<t>Signature generation is done in accordance with Section 5.2 of FIPS-204. Signature Verification is done in accordance with Section 5.3 of FIPS-204.</t>

<t>If small keys or signature is needed, ML-DSA might not be the ideal option. Furthermore, in usage scenarios expecting swifter processing, ML-DSA-87 might not be the best option. Therefore, using ML-DSA-44 and ML-DSA-65 with WebAuthn is advised.</t>

</section>
</section>
<section anchor="authenticator-behavior"><name>Authenticator Behavior</name>

<t>This section describes how an authenticator, roaming or platform would implement ML-DSA.</t>

<t>The authenticator <bcp14>MUST</bcp14> have a secure storage for storing cryptographic secrets which <bcp14>SHOULD NOT</bcp14> be able to export the secrets in an unauthorized manner.</t>

<section anchor="credential-creation"><name>Credential Creation</name>

<figure><artwork><![CDATA[
         +---------------+                    +--------+                                   +-----------+
         |               |                    |        |                                   |           |
         | Authenticator |                    | Client |                                   | RP Server |
         |               |                    |        |                                   |           |
         +-------+-------+                    +---+----+                                   +-----+-----+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |      Get Challenge                           |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                   Challenge                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |  Credential Creation Request   |                                              |
                 |<-------------------------------+                                              |
+----------------+   (Challenge)                  |                                              |
| Generate       |                                |                                              |
| Keypair        |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
+----------------+                                |                                              |
| Sign challenge |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
                 |  Assertion Response            |                                              |
                 +------------------------------->|                                              |
                 |  (Signed Challenge)            |     Assertion                                |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |  Verify            |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |   Save public key  |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |     Authentication response                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
]]></artwork></figure>

<t><xref target="WebAuthn"/> defines the credential creation API. This API takes a public key credential creation object, containing a cryptographic challenge, the Relying Party ID (RP ID), User details, and public key credential parameters. The public key credential parameters define the accepted algorithms.</t>

<t>An example of public key credential creation object is:</t>

<figure><artwork><![CDATA[
{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rp: { id: "example.com", name: "Example Corporation" },
  user: {
    id: new Uint8Array([79, 252, 83, 72, 214, 7, 89, 26]),
    name: "johndoe",
    displayName: "John Doe",
  },
  pubKeyCredParams: [{ type: "public-key", alg: -7 }, { type: "public-key", alg: -49 }],
}
]]></artwork></figure>

<t>The web application invokes the <spanx style="verb">Navigator.credentials.create()</spanx> function with the Public Key Credential Creation Object. The client web browser, or an application invokes the authenticator API defined in <xref target="CTAP"/>. The public key credential creation object is CBOR encoded and sent to the authenticator device over a chosen transport method which includes but is not limited to USB HID, BLE and NFC.</t>

<t>An example of CBOR Encoded Public Key Credential Creation object is:</t>

<figure><artwork><![CDATA[
h'A50158201637B26333915747DBDC6C630C0165405A64939AE8F6E4FC39414F853F702F1602A2626964696C6F63616C686F7374646E616D656B44656D6F2073657276657203A3626964504EC1D4219F294FB4A0BC0CD29D485AFC646E616D6566615F757365726B646973706C61794E616D6567412E20557365720481A263616C67382F64747970656A7075626C69632D6B657907A1627576F5'
]]></artwork></figure>

<t>The authenticator <bcp14>MUST</bcp14> verify whether any credential mentioned in the list of "excludeCredentials" in the public key credential creation object is already present on the authenticator, and in such cases it will return the error code in accordance with <xref target="CTAP"/>. Further authenticator <bcp14>MUST</bcp14> perform all additional checks involving authenticator PIN, User presence, user verification etc in accordance with Section 5.1 of CTAP.</t>

<t>The authenticator generates ML-DSA keypair in accordance with Section 5.1 of FIPS 204 and unique Key ID. The public key is COSE encoded following <xref target="I-D.draft-ietf-cose-dilithium-05"/> and is a part of the attestedCredentialData.</t>

<t>After passing all checks in accordance with section 5.1 of CTAP, the authenticator <bcp14>SHOULD</bcp14> create the attestation statement. The authData is created in accordance with WebAuthn and CTAP specifications and the clientDataHash is appended to it. This is signed with the private key of the generated keypair. The attestation statement is generated in accordance with CTAP and WebAuthn.</t>

<t>The ML-DSA private key is to be stored in accordance with the "Storage security and Key management" section of this document.</t>

<t>The attestation statement is encoded in CBOR and returned to the client application via the same transport method.</t>

</section>
<section anchor="authentication-flow"><name>Authentication Flow</name>

<figure><artwork><![CDATA[
      +---------------+                    +--------+                                   +-----------+
      |               |                    |        |                                   |           |
      | Authenticator |                    | Client |                                   | RP Server |
      |               |                    |        |                                   |           |
      +-------+-------+                    +---+----+                                   +-----+-----+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |      Get Challenge                           |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                   Challenge                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |   Assertion Request            |                                              |
              |<-------------------------------+                                              |
              |   (Challenge)                  |                                              |
+-------------+                                |                                              |
|Sign         |                                |                                              |
|Challenge    |                                |                                              |
|             |                                |                                              |
|             |                                |                                              |
+------------>|                                |                                              |
              |  Assertion Response            |                                              |
              +------------------------------->|                                              |
              |  (Signed Challenge)            |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |     Assertion                                |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              +--------------------+
              |                                |                                              |     Verify         |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |<-------------------+
              |                                |     Authentication response                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
]]></artwork></figure>

<t><xref target="WebAuthn"/> defines the credential request API. This API takes a public key credential request object, containing a cryptographic challenge, the Relying Party ID (RP ID) and optionally a list of allowed credentials.</t>

<t>An example of public key credential request object is:</t>

<figure><artwork><![CDATA[
{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rpId: "example.com",
}
]]></artwork></figure>

<t>The web application invokes the <spanx style="verb">Navigator.credentials.get()</spanx> function with the Public Key Credential Request Object. The client web browser, or an application invokes the authenticator API defined in <xref target="CTAP"/>. The public key credential request object is CBOR encoded and sent to the authenticator device over a chosen transport method which includes but is not limited to USB HID, BLE and NFC.</t>

<t>If a list of <spanx style="verb">allowedCredentials</spanx> is present, the authenticator must discover credentials bound to the same RP ID which is present in the list. If no such credential is present, it will return the error code in accordance with <xref target="CTAP"/>. Further authenticator <bcp14>MUST</bcp14> perform all additional checks involving authenticator PIN, User presence, user verification etc in accordance with Section 5.2 of CTAP.</t>

<t>The authenticator, on discovering a suitable credential for authentication <bcp14>SHOULD</bcp14> verify the algorithm. If it is not ML-DSA, the authenticator <bcp14>SHALL</bcp14> behave in accordance with the "Backward Compatibility Considerations" section of this document.</t>

<t>The credential is retrieved in accordance with the "Storage security and Key management" section of this document.</t>

<t>After passing all checks in accordance with section 5.2 of CTAP, the authenticator <bcp14>SHOULD</bcp14> create the assertion statement. The authData is created in accordance with WebAuthn and CTAP specifications and the clientDataHash is appended to it. This is signed with the decrypted ML-DSA private key. The assertion response is generated in accordance with CTAP and WebAuthn.</t>

<t>The assertion response is encoded in CBOR and returned to the client application via the same transport method.</t>

<t>All memory addresses used to handle the ML-DSA private key is immediately zeroized.</t>

<t>The authenticator <spanx style="verb">getNextAssertion()</spanx> function specification is to be similarly implemented in accordance with <xref target="CTAP"/>.</t>

</section>
<section anchor="backward-compatibility-consideration"><name>Backward Compatibility Consideration</name>

<t>The authenticator <bcp14>SHOULD</bcp14> choose the algorithm to be used in accordance with CTAP, and hence not choose ML-DSA if not supported by the RP.</t>

</section>
</section>
<section anchor="client-and-platform-considerations"><name>Client and Platform Considerations</name>

<t>This section describes the considerations about the Client and Platform.</t>

<section anchor="cose-algorithm-support-in-webauthn-clients"><name>COSE Algorithm Support in WebAuthn Clients</name>

<t>The CTAP implementations on client, for example Windows Hello for Microsoft Windows based systems, iCloud Keychain for Apple systems, Google Password Manager, Dashlane, OnePassword and other browser based implementations for Linux <bcp14>SHOULD</bcp14> have support for ML-DSA Algorithms in accordance with COSE. Further, Platform Authenticators for such devices are <bcp14>RECOMMENDED</bcp14> to have support for ML-DSA Key Generation and signing in accordance with this document.</t>

</section>
<section anchor="handling-large-signatures-and-keys"><name>Handling large signatures and keys</name>

<t>It is considered that the chosen transport methods including but not limited to USB HID, BLE and NFC are able to perform exchanges of the CBOR encoded data which may be often over 2000 bytes. The use of attestion certificates may increase the length even more.</t>

</section>
<section anchor="error-handling-and-fallback-mechanisms"><name>Error Handling and Fallback mechanisms</name>

<t>In case of errors involving ML-DSA key generation and signing, the authenticator may fallback to using ES256 or RS256 algoritms. In case of errors involving communication with the client, the authenticator may handle it in accordance with <xref target="CTAP"/>.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of <xref target="RFC9053"/> applies to this specification as well.</t>

<t>A detailed security analysis of ML-DSA is beyond the scope of this specification, see <xref target="FIPS-204"/> for additional details.</t>

<section anchor="resistance-to-quantum-attacks"><name>Resistance to Quantum Attacks</name>

<t>See <xref target="FIPS-204"/> for details on resistance to quantum attacks.</t>

</section>
<section anchor="storage-security-and-key-management"><name>Storage security and Key management</name>

<t>It is to be noted that at the time of writing this draft, there is no suitable hardware security module (HSM), trusted platform module (TPM), Secure Element (SE), Trusted Execution Environment (TEE) with native support for ML-DSA. Hence, secure credential storage is a challenge. To overcome the same, the ML-DSA keys, also referred to as credentials, <bcp14>MUST</bcp14> be encrypted with Advanced Ecnryption Standard (AES), which is a Post Quantum Symmetric encryption algorithm in Galosis Counter Mode (GCM) with 256-bit keys.</t>

<t>The AES Keys <bcp14>MUST</bcp14> be generated and stored in secure storage, which may include a HSM, TPM, SE or TEE. The ML-DSA Keys may be generated on the standard computing environment, outside the secure storage. The ML-DSA Credential <bcp14>MUST</bcp14> be encrypted by AES as described above before being written to the Flash memory or Disk. Conversely, the same <bcp14>MUST</bcp14> be decrypted by AES in the secure storage before being used.</t>

<t>Any memory location, pointer or heap that has been used to handle the ML-DSA Credentials <bcp14>MUST</bcp14> be zeroized immediately after the operation is performed.</t>

<t>This section is to be updated when suitable secure storage modules supporting ML-DSA becomes widely available.</t>

</section>
<section anchor="implementation-best-practices"><name>Implementation Best Practices</name>

<t>If the amount of space in the secure storage permits, each ML-DSA Private key is <bcp14>RECOMMENDED</bcp14> to be encrypted with unique AES keys.
*       Prior to storage, each ML-DSA private key is to be encrypted independently using a distinct AES encryption key.
*       To guarantee robust encryption, the AES key size must be at least AES-256.
*       To avoid unwanted access, encrypted keys ought to be kept in Hardware Security Modules (HSMs), Secure Elements (SEs), or Trusted Platform Modules (TPMs).
*       NIST SP 800-57 recommendations should be followed by key management to provide secure AES key lifecycle management (creation, storage, rotation, and disposal).
*       Only in a trusted execution environment (TEE) or secure enclave should the private key be decrypted in order to avoid memory leakage.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>This document requests the registration of the ML-DSA entries to the COSE Algorithm Registry as mentioned in <xref target="I-D.draft-ietf-cose-dilithium-05"/>.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9679">
  <front>
    <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
    <author fullname="K. Isobe" initials="K." surname="Isobe"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="O. Steele" initials="O." surname="Steele"/>
    <date month="December" year="2024"/>
    <abstract>
      <t>This specification defines a method for computing a hash value over a CBOR Object Signing and Encryption (COSE) Key. It specifies which fields within the COSE Key structure are included in the cryptographic hash computation, the process for creating a canonical representation of these fields, and how to hash the resulting byte sequence. The resulting hash value, referred to as a "thumbprint", can be used to identify or select the corresponding key.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9679"/>
  <seriesInfo name="DOI" value="10.17487/RFC9679"/>
</reference>

<reference anchor="I-D.draft-ietf-cose-dilithium-05">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <author fullname="Rafael Misoczki" initials="R." surname="Misoczki">
         <organization>Google</organization>
      </author>
      <author fullname="Michael Osborne" initials="M." surname="Osborne">
         <organization>IBM</organization>
      </author>
      <author fullname="Christine Cloostermans" initials="C." surname="Cloostermans">
         <organization>NXP</organization>
      </author>
      <date day="18" month="December" year="2024"/>
      <abstract>
	 <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-05"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-cose-key-thumbprint">
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname="Kohei Isobe" initials="K." surname="Isobe">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <date day="6" month="September" year="2024"/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   CBOR Object Signing and Encryption (COSE) Key. It specifies which
   fields within the COSE Key structure are included in the
   cryptographic hash computation, the process for creating a canonical
   representation of these fields, and how to hash the resulting byte
   sequence.  The resulting hash value, referred to as a &quot;thumbprint,&quot;
   can be used to identify or select the corresponding key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-key-thumbprint-06"/>
   
</reference>

<reference anchor="I-D.draft-ietf-lamps-dilithium-certificates">
   <front>
      <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
      <author fullname="Jake Massimo" initials="J." surname="Massimo">
         <organization>AWS</organization>
      </author>
      <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
         <organization>AWS</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
         <organization>Cloudflare</organization>
      </author>
      <date day="26" month="June" year="2025"/>
      <abstract>
	 <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
   
</reference>

<reference anchor="FIPS-186-5" target="https://doi.org/10.6028/NIST.FIPS.186-5">
  <front>
    <title>Digital Signature Standard (DSS)</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="FIPS-204" target="https://doi.org/10.6028/NIST.FIPS.204">
  <front>
    <title>Module-Lattice-Based Digital Signature Standard</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2">
  <front>
    <title>Web Authentication: An API for accessing Public Key Credentials</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CTAP" target="https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html">
  <front>
    <title>Client To Authenticator Protocol (CTAP)</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SP-500-57" target="https://doi.org/10.6028/NBS.SP.500-57">
  <front>
    <title>Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>


<?line 441?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We express our sincere gratitude to Dr. S. V. Kota Reddy, Vice Chancellor, VIT-AP University, for his unwavering support and encouragement throughout this research. We also extend our heartfelt thanks to Dr. Jagadish Chandra Mudiganti, Registrar, VIT-AP University, for facilitating a conducive research environment. Our appreciation goes to Dr. Hari Seetha, Director, Centre of Excellence, Artificial Intelligence and Robotics (AIR), VIT-AP University, for her invaluable guidance and insightful discussions that significantly contributed to this work.</t>

<t>We also acknowledge Indominus Labs Private Limited and Digital Fortress Private Limited for their generous support, which played a crucial role in the successful execution of this research.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

