<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiggers-tls-authkem-psk-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AuthKEM-PSK">KEM-based pre-shared-key handshakes for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-wiggers-tls-authkem-psk-04"/>
    <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
      <organization>PQShield</organization>
      <address>
        <postal>
          <city>Nijmegen</city>
          <country>The Netherlands</country>
        </postal>
        <email>thom@thomwiggers.nl</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave Software</organization>
      <address>
        <postal>
          <city>Lisbon</city>
          <country>Portugal</country>
        </postal>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
      <organization>Radboud University and MPI-SP</organization>
      <address>
        <email>peter@cryptojedi.org</email>
      </address>
    </author>
    <author initials="D." surname="Stebila" fullname="Douglas Stebila">
      <organization>University of Waterloo</organization>
      <address>
        <postal>
          <city>Waterloo, ON</city>
          <country>Canada</country>
        </postal>
        <email>dstebila@uwaterloo.ca</email>
      </address>
    </author>
    <author initials="N." surname="Sullivan" fullname="Nick Sullivan">
      <organization/>
      <address>
        <email>nicholas.sullivan+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="04"/>
    <area>SECAREA</area>
    <workgroup>TLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 166?>

<t>This document gives a construction in which (long-term) KEM public keys are
used in the place of TLS PSK keys, avoiding concerns that may affect
systems that use symmetric-key-based PSK, such as requiring key diversification
and protection of symmetric-keys' confidentiality.</t>
      <t>This mechanism is inspired by AuthKEM (and could use AuthKEM certificate public
keys for resumption), but can be independently implemented.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wiggers-tls-authkem-psk/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        tlswg Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note:</strong> This is a work-in-progress draft. We welcome discussion, feedback and
contributions through the IETF TLS working group mailing list or directly on
GitHub.</t>
      <t>This document gives a construction for KEM-based, PSK-style abbreviated TLS 1.3
<xref target="RFC8446"/> handshakes. It is similar in spirit to
<xref target="I-D.celi-wiggers-tls-authkem"/>, but can be independently implemented.</t>
      <t>The abbreviated handshake is appropriate for endpoints that have KEM public
keys, and where the client has the server's public key before initiation of the
connection. Though this is currently rare, certificates can be issued with
(EC)DH public keys as specified for instance in <xref target="RFC8410"/>, or using a
delegation mechanism, such as delegated credentials <xref target="I-D.ietf-tls-subcerts"/>.
The public keys need not necessarily be certificates, however. The client might
be provided with the public key as a matter of configuration.</t>
      <t>In this proposal, we build on <xref target="RFC9180"/>. This standard currently only covers
Diffie-Hellman based KEMs, but the first post-quantum algorithms have already
been put forward <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00"/>. This proposal
uses ML-KEM <xref target="FIPS203"/> <xref target="I-D.cfrg-schwabe-kyber"/>, the first selected
algorithm for key exchange in the NIST post-quantum standardization project
<xref target="NISTPQC"/>.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <t><strong>This section should be removed prior to publication of a final version of this
document.</strong></t>
        <ul spacing="normal">
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-03
            </t>
            <ul spacing="normal">
              <li>
                <t>Bumped version</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-02
            </t>
            <ul spacing="normal">
              <li>
                <t>Fixing a few links</t>
              </li>
              <li>
                <t>Update to ML-KEM/FIPS203</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-01
            </t>
            <ul spacing="normal">
              <li>
                <t>Revised abstract</t>
              </li>
              <li>
                <t>Minor edits</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-00
            </t>
            <ul spacing="normal">
              <li>
                <t>Split PSK mechanism off from <xref target="I-D.celi-wiggers-tls-authkem"/></t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-celi-wiggers-tls-authkem-01
            </t>
            <ul spacing="normal">
              <li>
                <t>Significant Editing</t>
              </li>
              <li>
                <t>Use HPKE context</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-celi-wiggers-tls-authkem-00
            </t>
            <ul spacing="normal">
              <li>
                <t>Initial version</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="related-work">
        <name>Related work</name>
        <t>This proposal draws inspiration from <xref target="I-D.ietf-tls-semistatic-dh"/>, which is
in turn based on the OPTLS proposal for TLS 1.3 <xref target="KW16"/>. However, these proposals
require a non-interactive key exchange: they combine the client's public key
with the server's long-term key. This imposes an extra requirement: the
ephemeral and static keys MUST use the same algorithm, which this proposal does
not require. Additionally, there are no post-quantum proposals for a
non-interactive key exchange currently considered for standardization, while
several KEMs are on the way.</t>
      </section>
      <section anchor="organization">
        <name>Organization</name>
        <t>After covering preliminaries, we introduce the abbreviated AuthKEM-PSK
handshake, and its opportunistic client authentication mechanism. In the
remainder of the draft, we will discuss the necessary implementation mechanics,
such as code points, extensions, new protocol messages and the new key schedule.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are used as they are in <xref target="RFC8446"/></t>
        <dl>
          <dt>client:</dt>
          <dd>
            <t>The endpoint initiating the TLS connection.</t>
          </dd>
          <dt>connection:</dt>
          <dd>
            <t>A transport-layer connection between two endpoints.</t>
          </dd>
          <dt>endpoint:</dt>
          <dd>
            <t>Either the client or server of the connection.</t>
          </dd>
          <dt>handshake:</dt>
          <dd>
            <t>An initial negotiation between client and server that establishes the
parameters of their subsequent interactions within TLS.</t>
          </dd>
          <dt>peer:</dt>
          <dd>
            <t>An endpoint.  When discussing a particular endpoint, "peer" refers to the
endpoint that is not the primary subject of discussion.</t>
          </dd>
          <dt>receiver:</dt>
          <dd>
            <t>An endpoint that is receiving records.</t>
          </dd>
          <dt>sender:</dt>
          <dd>
            <t>An endpoint that is transmitting records.</t>
          </dd>
          <dt>server:</dt>
          <dd>
            <t>The endpoint that responded to the initiation of the TLS connection. i.e. the
peer of the client.</t>
          </dd>
        </dl>
      </section>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>As this proposal relies heavily on KEMs, which are not originally used by TLS,
we will provide a brief overview of this primitive. Other cryptographic
operations will be discussed later.</t>
        <t>This definition matches the one from <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <t>A Key Encapsulation Mechanism (KEM) is a cryptographic primitive that defines
the methods <tt>Encapsulate</tt> and <tt>Decapsulate</tt>. In this draft, we extend these
operations with context separation strings:</t>
        <dl newline="true">
          <dt><tt>Encapsulate(pkR, context_string)</tt>:</dt>
          <dd>
            <t>Takes a public key, and produces a shared secret and encapsulation.</t>
          </dd>
          <dt><tt>Decapsulate(enc, skR, context_string)</tt>:</dt>
          <dd>
            <t>Takes the encapsulation and the private key. Returns the shared secret.</t>
          </dd>
        </dl>
        <t>We implement these methods through the KEMs defined in <xref target="RFC9180"/> to export
shared secrets appropriate for using with key schedule in TLS 1.3:</t>
        <artwork><![CDATA[
def Encapsulate(pk, context_string):
  enc, ctx = HPKE.SetupBaseS(pk, "tls13 auth-kem")
  ss = ctx.Export(context_string, HKDF.Length)
  return (enc, ss)

def Decapsulate(enc, sk, context_string):
  return HPKE.SetupBaseR(enc, sk, "tls13 auth-kem")
             .Export(context_string, HKDF.Length)
]]></artwork>
        <t>Keys are generated and encoded for transmission following the conventions in
<xref target="RFC9180"/>. The values of <tt>context_string</tt> are defined in
<xref target="kem-computations"/>.</t>
        <t><strong>Open question:</strong> Should we keep using HPKE, or just use "plain" KEMs, as in
the original KEMTLS works? Please see the discussion at <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/32">Issue
#32</eref>.</t>
      </section>
    </section>
    <section anchor="psk-protocol">
      <name>Abbreviated AuthKEM with pre-shared public KEM keys</name>
      <t>When the client already has the server's long-term public key, we can do a more
efficient handshake. The client will send the encapsulation to the server's
long-term public key in a <tt>ClientHello</tt> extension. An overview of the
abbreviated AuthKEM handshake is given in Figure 3.</t>
      <t>A client that already knows the server, might also already know that it will be
required to present a client certificate. This is expected to be especially
useful in server-to-server scenarios. The abbreviated handshake allows to
encrypt the certificate and send it similarly to early data.</t>
      <artwork><![CDATA[
       Client                                        Server
Key  ^ ClientHello
Exch | + key_share
&    | + stored_auth_key
Auth | + signature_algorithms
     | + early_auth*
     | + early_data*
     | (Certificate*)
     | (Application Data*)    -------->        ServerHello  ^
     |                                         + key_share  |
     |                                   + stored_auth_key  | Key
     |                                       + early_auth*  | Exch,
     |                                       + early_data*  | Auth &
     |                               {EncryptedExtensions}  | Server
     |                                 {KEMEncapsulation*}  | Params
     |                       <--------          {Finished}  v
     |                       <-------- [Application Data*]
     | (EndOfEarlyData)
     v {Finished}            -------->

       [Application Data]    <------->  [Application Data]

        +  Indicates noteworthy extensions sent in the
           previously noted message.
        *  Indicates optional or situation-dependent
           messages/extensions that are not always sent.
        <> Indicates messages protected using keys
           derived from a
           client_early_handshake_traffic_secret.
        () Indicates messages protected using keys derived
           from a client_early_traffic_secret.
        {} Indicates messages protected using keys
           derived from a
           [sender]_handshake_traffic_secret.
        [] Indicates messages protected using keys
           derived from [sender]_application_traffic_secret_N.

      Figure 3: Abbreviated AuthKEM handshake, with optional
                opportunistic client authentication.
]]></artwork>
      <section anchor="sec-authkem-pdk-negotiation">
        <name>Negotiation</name>
        <t><strong>In an <xref target="psk-variant"/>, we sketch a variant based on the PSK extension.</strong></t>
        <t>A client that knows a server's long-term KEM public key MAY choose to attempt
the abbreviated AuthKEM handshake. If it does so, it MUST include the
<tt>stored_auth_key</tt> extension in the <tt>ClientHello</tt> message. This message MUST
contain the encapsulation against the long-term KEM public key. Details of the
extension are described below. The shared secret resulting from the
encapsulation is mixed in to the <tt>EarlySecret</tt> computation.</t>
        <t>The client MAY additionally choose to send a certificate to the server. It MUST
know what ciphersuites the server accepts before it does so. If it chooses to do
so, it MUST send the <tt>early_auth</tt> extension to the server. The <tt>Certificate</tt>
is encrypted with the <tt>client_early_handshake_traffic_secret</tt>.</t>
        <t>The server MAY accept the abbreviated AuthKEM handshake. If it does, it MUST
reply with a <tt>stored_auth_key</tt> extension. If it does not accept the
abbreviated AuthKEM handshake, for instance because it does not have access to
the correct secret key anymore, it MUST NOT reply with a <tt>stored_auth_key</tt>
extension. The server, if it accepts the abbreviated AuthKEM handshake, MAY
additionally accept the <tt>Certificate</tt> message. If it does, it MUST reply with
a <tt>early_auth</tt> extension.</t>
        <t>If the client, who sent a <tt>stored_auth_key</tt> extension, receives a
<tt>ServerHello</tt> without <tt>stored_auth_key</tt> extension, it MUST recompute
<tt>EarlySecret</tt> without the encapsulated shared secret.</t>
        <t>If the client sent a <tt>Certificate</tt> message, it MUST drop that message from its
transcript. The client MUST then continue with a full AuthKEM handshake.</t>
      </section>
      <section anchor="rtt-forward-secrecy-and-replay-protection">
        <name>0-RTT, forward secrecy and replay protection</name>
        <t>The client MAY send 0-RTT data, as in <xref target="RFC8446"/> 0-RTT mode. The
<tt>Certificate</tt> MUST be sent before the 0-RTT data.</t>
        <t>As the <tt>EarlySecret</tt> is derived only from a key encapsulated to a long-term
secret, it does not have forward secrecy. Clients MUST take this into
consideration before transmitting 0-RTT data or opting in to early client auth.
Certificates and 0-RTT data may also be replayed.</t>
        <t>This will be discussed in full under Security Considerations.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <t>In this section we will discuss the implementation details such as extensions
and key schedule.</t>
      <section anchor="negotiation-of-authkem-algorithms">
        <name>Negotiation of AuthKEM algorithms</name>
        <t>Clients and servers indicate support for AuthKEM authentication by negotiating
it as if it were a signature scheme (part of the <tt>signature_algorithms</tt>
extension). We thus add these new signature scheme values (even though, they are
not signature schemes) for the KEMs defined in <xref target="RFC9180"/> Section 7.1. Note
that we will be only using their internal KEM's API defined there.</t>
        <artwork><![CDATA[
enum {
  dhkem_p256_sha256   => TBD,
  dhkem_p384_sha384   => TBD,
  dhkem_p521_sha512   => TBD,
  dhkem_x25519_sha256 => TBD,
  dhkem_x448_sha512   => TBD,
  kem_x25519kyber768  => TBD, /*draft-westerbaan-cfrg-hpke-xyber768d00*/
}
]]></artwork>
        <t>This matches the definition in <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <t><strong>Please give feedback on which KEMs should be included</strong></t>
        <t>When present in the <tt>signature_algorithms</tt> extension, these values indicate
AuthKEM support with the specified key exchange mode. These values MUST NOT
appear in <tt>signature_algorithms_cert</tt>, as this extension specifies the signing
algorithms by which certificates are signed.</t>
      </section>
      <section anchor="clienthello-and-serverhello-extensions">
        <name>ClientHello and ServerHello extensions</name>
        <t>A number of AuthKEM messages contain tag-length-value encoded extensions
structures. We are adding those extensions to the <tt>ExtensionType</tt> list from TLS
1.3.</t>
        <artwork><![CDATA[
enum {
  ...
  stored_auth_key (TBD),                 /* RFC TBD */
  early_auth (TBD),                      /* RFC TBD */
  (65535)
} ExtensionType;
]]></artwork>
        <t>The table below indicates the messages where a given extension may
appear:</t>
        <artwork><![CDATA[
+---------------------------------------+-------------+
| Extension                             |    KEM-Auth |
+---------------------------------------+-------------+
| stored_auth_key [RFCTBD]              |      CH, SH |
|                                       |             |
| early_auth  [RFCTBD]                  |      CH, SH |
|                                       |             |
+---------------------------------------+-------------+
]]></artwork>
        <section anchor="stored-auth-key">
          <name>Stored Auth Key</name>
          <t>To transmit the early authentication encapsulation in the abbreviated AuthKEM
handshake, this document defines a new extension type
(<tt>stored_auth_key (TBD)</tt>). It is used in <tt>ClientHello</tt> and <tt>ServerHello</tt>
messages.</t>
          <t>The <tt>extension_data</tt> field of this extension, when included in the
<tt>ClientHello</tt>, MUST contain the <tt>StoredInformation</tt> structure.</t>
          <artwork><![CDATA[
struct {
      select (type) {
        case client:
          opaque key_fingerprint<1..255>;
          opaque ciphertext<1..2^16-1>
        case server:
          AcceptedAuthKey '1';
      } body;
} StoredInformation
]]></artwork>
          <t>This extension MUST contain the following information when included in
<tt>ClientHello</tt> messages:</t>
          <ul spacing="normal">
            <li>
              <t>The client indicates the public key encapsulated to by its fingerprint</t>
            </li>
            <li>
              <t>The client submits the ciphertext</t>
            </li>
          </ul>
          <t>The server MUST send the extension back as an acknowledgement, if and only if it
wishes to negotiate the abbreviated AuthKEM handshake.</t>
          <t>The fingerprint calculation proceeds this way:</t>
          <ol spacing="normal" type="1"><li>
              <t>Compute the SHA-256 hash of the input data. Note that the computed hash only
covers the input data structure (and not any type and length information of
the record layer).</t>
            </li>
            <li>
              <t>Use the output of the SHA-256 hash.</t>
            </li>
          </ol>
          <t>If this extension is not present, the client and the server MUST NOT negotiate
the abbreviated AuthKEM handshake.</t>
          <t>The presence of the fingerprint might reveal information about the identity of
the server that the client has. This is discussed further under <xref target="sec-considerations">Security
Considerations</xref>.</t>
        </section>
        <section anchor="early-authentication">
          <name>Early authentication</name>
          <t>To indicate the client will attempt client authentication in the abbreviated
AuthKEM handshake, and for the server to indicate acceptance of attempting this
authentication mechanism, we define the ```early_auth (TDB)<tt>extension. It is
used in</tt>ClientHello<tt>and</tt>ServerHello`` messages.</t>
          <artwork><![CDATA[
struct {} EarlyAuth
]]></artwork>
          <t>This is an empty extension.</t>
          <t>It MUST NOT be sent if the <tt>stored_auth_key</tt> extension is not present.</t>
        </section>
      </section>
      <section anchor="protocol-messages">
        <name>Protocol messages</name>
        <t>The handshake protocol is used to negotiate the security parameters
of a connection, as in TLS 1.3. It uses the same messages, except
for the addition of a <tt>KEMEncapsulation</tt> message and does not use
the <tt>CertificateVerify</tt> one.</t>
        <t>Note that these definitions mirror <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <artwork><![CDATA[
enum {
    ...
    kem_encapsulation(tbd),
    ...
    (255)
  } HandshakeType;

struct {
    HandshakeType msg_type;  /* handshake type */
    uint24 length;           /* remaining bytes in message */
    select (Handshake.msg_type) {
        ...
        case kem_encapsulation:     KEMEncapsulation;
        ...
    };
} Handshake;
]]></artwork>
        <t>Protocol messages MUST be sent in the order defined in <xref target="psk-protocol"/>. A peer
which receives a handshake message in an unexpected order MUST abort the
handshake with an "unexpected_message" alert.</t>
        <t>The <tt>KEMEncapsulation</tt> message is defined as follows:</t>
        <artwork><![CDATA[
struct {
    opaque certificate_request_context<0..2^8-1>
    opaque encapsulation<0..2^16-1>;
} KEMEncapsulation;
]]></artwork>
        <t>The encapsulation field is the result of a <tt>Encapsulate()</tt> function. The
<tt>Encapsulate()</tt> function will also result in a shared secret (<tt>ssS</tt> or <tt>ssC</tt>,
depending on the peer) which is used to derive the <tt>AHS</tt> or <tt>MS</tt> secrets.</t>
        <t>If the <tt>KEMEncapsulation</tt> message is sent by a server, the authentication
algorithm MUST be one offered in the client's <tt>signature_algorithms</tt> extension
unless no valid certificate chain can be produced without unsupported
algorithms.</t>
        <t>If sent by a client, the authentication algorithm used in the signature MUST be
one of those present in the <tt>supported_signature_algorithms</tt> field of the
<tt>signature_algorithms</tt> extension in the <tt>CertificateRequest</tt> message.</t>
        <t>In addition, the authentication algorithm MUST be compatible with the key(s) in
the sender's end-entity certificate.</t>
        <t>The receiver of a <tt>KEMEncapsulation</tt> message MUST perform the <tt>Decapsulate()</tt>
operation by using the sent encapsulation and the private key of the public key
advertised in the end-entity certificate sent. The <tt>Decapsulate()</tt> function will
also result on a shared secret (<tt>ssS</tt> or <tt>ssC</tt>, depending on the Server or
Client executing it respectively) which is used to derive the <tt>AHS</tt> or <tt>MS</tt>
secrets.</t>
        <t><tt>certificate_request_context</tt> is included to allow the recipient to identify the
certificate against which the encapsulation was generated. It MUST be set to the
value in the <tt>Certificate</tt> message to which the encapsulation was computed.</t>
      </section>
      <section anchor="cryptographic-computations">
        <name>Cryptographic computations</name>
        <t>The AuthKEM handshake establishes three input secrets which are combined to
create the actual working keying material, as detailed below. The key derivation
process incorporates both the input secrets and the handshake transcript.  Note
that because the handshake transcript includes the random values from the Hello
messages, any given handshake will have different traffic secrets, even if the
same input secrets are used.</t>
        <section anchor="authkem-psk-key-schedule">
          <name>AuthKEM-PSK key schedule</name>
          <t>The AuthKEM-PSK handshake follows the <xref target="RFC8446"/> key schedule closely. We
change the computation of the <tt>EarlySecret</tt> as follows, and add a computation
for <tt>client_early_handshake_traffic_secret</tt>:</t>
          <artwork><![CDATA[
            0
            |
            v
    SSs -> HKDF-Extract = Early Secret
            |
            ...
            +--> Derive-Secret(., "c e traffic", ClientHello)
            |                  = client_early_traffic_secret
            |
            +--> Derive-Secret(., "c e hs traffic", ClientHello)
            |                  = client_early_handshake_traffic_secret
            ...
            |
            v
            Derive-Secret(., "derived", "") = dES
            ...
]]></artwork>
          <t>We change the computation of <tt>Main Secret</tt> as follows:</t>
          <artwork><![CDATA[
            Derive-Secret(., "derived", "") = dHS
            |
            v
SSc||0 * -> HKDF-Extract = Main Secret
            |
            ...
]]></artwork>
          <t><tt>SSc</tt> is included if client authentication is used; otherwise, the value <tt>0</tt> is
used.</t>
        </section>
        <section anchor="kem-computations">
          <name>Computations of KEM shared secrets</name>
          <t>As in <xref target="I-D.celi-wiggers-tls-authkem"/>, operations to compute <tt>SSs</tt> or
<tt>SSc</tt> from the client are:</t>
          <artwork><![CDATA[
SSs, encapsulation <- Encapsulate(public_key_server,
                                  "server authentication")
               SSc <- Decapsulate(encapsulation, private_key_client,
                                  "client authentication")
]]></artwork>
          <t>The operations to compute <tt>SSs</tt> or <tt>SSc</tt> from the server are:</t>
          <artwork><![CDATA[
               SSs <- Decapsulate(encapsulation, private_key_server
                                  "server authentication")
SSc, encapsulation <- Encapsulate(public_key_client,
                                  "client authentication")
]]></artwork>
        </section>
        <section anchor="explicit-authentication-messages">
          <name>Explicit Authentication Messages</name>
          <t>AuthKEM upgrades implicit to explicit authentication through the <tt>Finished</tt>
message. With AuthKEM-PSK, the server achieves explicit authentication when
sending their <tt>Finished</tt> message and the client when they send their
<tt>Finished</tt> message.</t>
          <t>The key used to compute the <tt>Finished</tt> message MUST be computed from the
<tt>MainSecret</tt> using HKDF. Specifically:</t>
          <artwork><![CDATA[
server/client_finished_key =
    HKDF-Expand-Label(MainSecret,
                      server/client_label,
                      "", Hash.length)
server_label = "tls13 server finished"
client_label = "tls13 client finished"
]]></artwork>
          <t>The <tt>verify_data</tt> value is computed as follows:</t>
          <artwork><![CDATA[
server/client_verify_data =
      HMAC(server/client_finished_key,
           Transcript-Hash(Handshake Context,
                           Certificate*,
                           KEMEncapsulation*,
                           Finished**)

*  Only included if present.
** The party who last sends the finished message in terms of flights
   includes the other party's Finished message.
]]></artwork>
          <t>These computations match <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
          <t>See <xref target="sec-authkem-pdk-negotiation"/> for special considerations for the
abbreviated AuthKEM handshake.</t>
          <t>Any records following a Finished message MUST be encrypted under the appropriate
application traffic key as described in TLS 1.3. In particular, this includes
any alerts sent by the server in response to client <tt>Certificate</tt> and
<tt>KEMEncapsulation</tt> messages.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Because the Main Secret is derived from both the ephemeral key exchange,
as well as from the key exchanges completed for server and (optionally) client
authentication, the MS secret always reflects the peers' views of the authentication
status correctly. This is an improvement over TLS 1.3 for client authentication.</t>
        </li>
        <li>
          <t>The academic works proposing AuthKEM (KEMTLS) contains an in-depth technical
discussion of and a proof of the security of the handshake protocol without
client authentication (<xref target="SSW20"/>, <xref target="Wig24"/>).</t>
        </li>
        <li>
          <t>The work proposing the variant protocol (<xref target="SSW21"/>, <xref target="Wig24"/>) with pre-distributed public
keys (the abbreviated AuthKEM handshake) has a proof for both unilaterally and
mutually authenticated handshakes.</t>
        </li>
        <li>
          <t>We have machine-verified proofs of the security of KEMTLS and KEMTLS-PDK in
Tamarin. <xref target="CHSW22"/></t>
        </li>
        <li>
          <t>When the client opportunistically sends its certificate, it is not encrypted
under a forward-secure key.  This has similar considerations and trade-offs as
0-RTT data.  If it is a replayed message, there are no expected consequences
for security as the malicious replayer will not be able to decapsulate the
shared secret.</t>
        </li>
        <li>
          <t>A client that opportunistically sends its certificate, SHOULD send it
encrypted with a ciphertext that it knows the server will accept. Otherwise,
it will fail.</t>
        </li>
        <li>
          <t>If AuthKEM-PSK client authentication is used, the resulting shared secret is
included in the key schedule. This ensures that both peers have a consistent
view of the authentication status, unlike <xref target="RFC8446"/>.</t>
        </li>
      </ul>
      <section anchor="server-anonymity">
        <name>Server Anonymity</name>
        <t>The PDK extension identifies the public key to which the client has encapsulated
via a hash. This reveals some information about which server identity the client
has. <xref target="I-D.ietf-tls-esni"/> may help alleviate this.</t>
        <t>An alternative approach could be the use of trial decryption. If the KEM used
has anonymity, the ciphertext that the client sends is not linkable to the
server public key. ML-KEM offers post-quantum anonymity <xref target="MX22"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SSW20">
          <front>
            <title>Post-Quantum TLS without Handshake Signatures</title>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
              <organization>Radboud University and Max Planck Institute for Security and Privacy</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2020" month="November"/>
          </front>
          <seriesInfo name="ACM CCS 2020" value=""/>
          <seriesInfo name="DOI" value="10.1145/3372297.3423350"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2020/534"/>
        </reference>
        <reference anchor="SSW21">
          <front>
            <title>More Efficient KEMTLS with Pre-Shared Keys</title>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
              <organization>Radboud University and Max Planck Institute for Security and Privacy</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
          <seriesInfo name="ESORICS 2021" value=""/>
          <seriesInfo name="DOI" value="10.1007/978-3-030-88418-5_1"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2021/779"/>
        </reference>
        <reference anchor="CHSW22">
          <front>
            <title>A tale of two models: formal verification of KEMTLS in Tamarin</title>
            <author initials="S." surname="Celi" fullname="Sofía Celi">
              <organization>Brave Software</organization>
            </author>
            <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
          <seriesInfo name="ESORICS 2022" value=""/>
          <seriesInfo name="DOI" value="10.1007/978-3-031-17143-7_4"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2022/1111"/>
        </reference>
        <reference anchor="NISTPQC">
          <front>
            <title>Post-Quantum Cryptography Standardization</title>
            <author initials="" surname="NIST">
              <organization>National Institute for Standards and Technology</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="Wig24">
          <front>
            <title>Post-Quantum TLS</title>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2024" month="January" day="09"/>
          </front>
          <seriesInfo name="PhD thesis" value="https://thomwiggers.nl/publication/thesis/"/>
        </reference>
        <reference anchor="KW16" target="https://ia.cr/2015/978">
          <front>
            <title>The OPTLS Protocol and TLS 1.3</title>
            <author initials="H." surname="Krawczyk" fullname="Hugo Krawczyk">
              <organization>IBM Research</organization>
            </author>
            <author initials="H." surname="Wee" fullname="Hoeteck Wee">
              <organization>ENS, CNRS, INRIA and Columbia University</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="Proceedings of Euro S&amp;P 2016" value=""/>
        </reference>
        <reference anchor="MX22">
          <front>
            <title>Post-Quantum Anonymity of Kyber</title>
            <author initials="V." surname="Maram" fullname="Varum Maram">
              <organization>ETH Zurich</organization>
            </author>
            <author initials="K." surname="Xagawa" fullname="Keita Xagawa">
              <organization>NTT Social Informatics Laboratories</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="PKC" value="2023"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2022/1696"/>
        </reference>
        <reference anchor="FIPS203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.203"/>
        </reference>
        <reference anchor="I-D.celi-wiggers-tls-authkem">
          <front>
            <title>KEM-based Authentication for TLS 1.3</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>Radboud University and MPI-SP</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
         </author>
            <date day="22" month="April" year="2025"/>
            <abstract>
              <t>   This document gives a construction for a Key Encapsulation Mechanism
   (KEM)-based authentication mechanism in TLS 1.3.  This proposal
   authenticates peers via a key exchange protocol, using their long-
   term (KEM) public keys.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-celi-wiggers-tls-authkem-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-subcerts">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Subodh Iyengar" initials="S." surname="Iyengar">
              <organization>Facebook</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="30" month="June" year="2022"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations.  For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA).  This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-subcerts-15"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="May" year="2024"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-03"/>
        </reference>
        <reference anchor="I-D.cfrg-schwabe-kyber">
          <front>
            <title>Kyber Post-Quantum KEM</title>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="January" year="2024"/>
            <abstract>
              <t>   This memo specifies a preliminary version ("draft00", "v3.02") of
   Kyber, an IND-CCA2 secure Key Encapsulation Method.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/draft-schwabe-cfrg-kyber/draft-cfrg-
   schwabe-kyber.html.  Status information for this document may be
   found at https://datatracker.ietf.org/doc/draft-cfrg-schwabe-kyber/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/draft-schwabe-cfrg-kyber.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cfrg-schwabe-kyber-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-semistatic-dh">
          <front>
            <title>Semi-Static Diffie-Hellman Key Establishment for TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple Inc.</organization>
            </author>
            <date day="7" month="March" year="2020"/>
            <abstract>
              <t>   TLS 1.3 [RFC8446] specifies a signed Diffie-Hellman exchange modelled
   after SIGMA [SIGMA].  This design is suitable for endpoints whose
   certified credential is a signing key, which is the common situation
   for current TLS servers.  This document describes a mode of TLS 1.3
   in which one or both endpoints have a certified DH key which is used
   to authenticate the exchange.

Note to Readers

   Source for this draft and an issue tracker can be found at
   https://github.com/ekr/draft-rescorla-tls13-semistatic-dh
   (https://github.com/ekr/draft-rescorla-tls13-semistatic-dh).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-semistatic-dh-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
      </references>
    </references>
    <?line 769?>

<section anchor="open-points-of-discussion">
      <name>Open points of discussion</name>
      <t>The following are open points for discussion. The corresponding GitHub issues
will be linked.</t>
      <section anchor="psk-variant">
        <name>Alternative implementation based on the <tt>pre_shared_key</tt> extension</name>
        <t><strong>This is discussed in <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/25">Issue
#25</eref>.</strong></t>
        <t><xref target="RFC8446"/> defines a PSK handshake that can be used with symmetric keys from
e.g. session tickets. In this section, we sketch an alternative approach to
AuthKEM-PSK based on the <tt>pre_shared_key</tt> extension.</t>
        <t>A client needs to be set up with the following information:</t>
        <artwork><![CDATA[
struct {
    uint32 authkem_psk_config_version;
    uint32 config_lifetime;
    opaque KEMPublicKey;
} AuthKEMPSKConfig;
]]></artwork>
        <t>The client computes a KEM ciphertext and shared secret as follows:</t>
        <artwork><![CDATA[
SSs, encapsulation <- Encapsulate(public_key_server,
                                  "server authentication")
]]></artwork>
        <t><tt>SSs</tt> is used in place of <tt>PSK</tt> in the TLS 1.3 key schedule, and <tt>binder_key</tt> is
derived as follows:</t>
        <artwork><![CDATA[
          0
          |
          v
SSc ->  HKDF-Extract = Early Secret
          |
          +-----> Derive-Secret(., "ext binder" | "res binder", "")
          |                     = binder_key
          ...
]]></artwork>
        <t>In the <tt>pre_shared_key</tt> extension's <tt>identities</tt>, the client sends the following
data:</t>
        <artwork><![CDATA[
struct {
  uint32 authkem_psk_config_version;
  opaque KEMCiphertext;
} AuthKEMPSKIdentity
]]></artwork>
        <t>The server computes the shared secret <tt>SSs</tt> from
<tt>AuthKEMPSKIdentity.KEMCiphertext</tt> as follows:</t>
        <artwork><![CDATA[
SSs <- Decapsulate(encapsulation,
                   private_key_server
                   "server authentication")
]]></artwork>
        <t>The PSK binder value is computed as specified in <xref target="RFC8446"/>, section 4.2.11.2.
The server MUST verify the binder before continuing and abort the handshake if
verification fails.</t>
        <t><strong>To be determined: how to handle immediate client authentication.</strong></t>
      </section>
      <section anchor="interactions-with-dtls">
        <name>Interactions with DTLS</name>
        <t>It is currently open if there need to be made modifications to better support
integration with DTLS. Discussion is at <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/23">Issue
#23</eref>.</t>
      </section>
      <section anchor="interaction-with-signing-certificates">
        <name>Interaction with signing certificates</name>
        <t>Tracked by <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/20">Issue
#20</eref>.</t>
        <t>In the current state of the draft, we have not yet discussed combining
traditional signature-based authentication with KEM-based authentication. One
might imagine that the Client has a signing certificate and the server has a KEM
public key.</t>
        <t>In the current draft, clients MUST use a KEM certificate algorithm if the server
negotiated AuthKEM.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This work has been supported by the European Research Council through Starting
Grant No. 805031 (EPOQUE).</t>
      <t>Part of this work was supported by the NLNet NGI Assure theme fund project
<eref target="https://nlnet.nl/project/KEMTLS/">"Standardizing KEMTLS"</eref></t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
