<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8998 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8998.xml">
]>


<rfc ipr="trust200902" docName="draft-yang-tls-hybrid-sm2-mlkem-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLSv1.3 hybrid SM2-MLKEM Key Exchange">Hybrid Post-quantum Key Exchange SM2-MLKEM for TLSv1.3</title>

    <author initials="P." surname="Yang" fullname="Paul Yang">
      <organization>Lenovo</organization>
      <address>
        <postal>
          <street>Building 2, No.10 Courtyard Xibeiwang East Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>China</country>
        </postal>
        <phone>+86-10-5886-8888</phone>
        <facsimile>+86-10-5886-6630</facsimile>
        <email>yangyang86@lenovo.com</email>
      </address>
    </author>
    <author initials="C." surname="Peng" fullname="Cong Peng">
      <organization>Wuhan University</organization>
      <address>
        <postal>
          <street>Dongxihu District</street>
          <city>Wuhan</city>
          <code>430000</code>
          <country>China</country>
        </postal>
        <phone>+86-186-7403-6424</phone>
        <email>cpeng@whu.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Hu" fullname="Jin Hu">
      <organization>Infosec</organization>
      <address>
        <postal>
          <street>Haidian District</street>
          <city>Beijing</city>
          <code>100096</code>
          <country>China</country>
        </postal>
        <phone>+86-158-7172-6539</phone>
        <email>hujin@infosec.com.cn</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Shine Sun">
      <organization>Goodix</organization>
      <address>
        <postal>
          <street>No.1 Meikang Road,Futian District</street>
          <city>Shenzhen</city>
          <code>518000</code>
          <country>China</country>
        </postal>
        <phone>+86-138-7138-9521</phone>
        <email>sunjinlong@goodix.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="01"/>

    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 132?>

<t>This document specifies how to form a hybrid key exchange with CurveSM2
and MLKEM in Transport Layer Security (TLS) protocol version 1.3.</t>

<t>Related IETF drafts include <xref target="hybrid"/> and <xref target="ecdhe-mlkem"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 140?>

<section anchor="intro"><name>Introduction</name>

<t>This document introduces one new NamedGroup and related key exchange scheme in TLSv1.3 protocol.
This NamedGroup is used in the Supported Groups extension during the handshake procedure of
TLSv1.3, to achieve a hybrid key exchange in combination with the post-quantum key exchange algorithm
ML-KEM768 (<xref target="FIPS203"/>):</t>

<figure><artwork><![CDATA[
   NamedGroup curveSM2MLKEM768 = { XX };
]]></artwork></figure>

<t>This new NamedGroup uses an elliptic curve called curveSM2 which is defined in SM2 related
standards. Those standards are either published by international standard organizations
or by Chinese standard organizations. Please read <xref target="sm2-curve"/>.</t>

<t>Since IANA has not assigned a value for the newly introduced NamedGroup item, a reserved value
for private usage is temporarily used in this document at current stage. This value is for testing
purpose only.</t>

<figure><artwork><![CDATA[
   NamedGroup curveSM2MLKEM768 = { 0xFEFE };
]]></artwork></figure>

<section anchor="sm2-curve"><name>The SM2 Elliptic Curve</name>

<t>SM2, ISO/IEC 14888-3:2018 <xref target="ISO-SM2"/> (as well as in <xref target="GBT.32918.2-2016"/>)
is a set of elliptic curve based cryptographic algorithms including digital signature,
public key encryption and key exchange scheme. In this document, only the
SM2 elliptic curve is involved, which has already been added assigned by IANA.</t>

<t>Please read <xref target="curvesm2"/> for more information.</t>

</section>
<section anchor="term"><name>Terminology</name>

<t>Although this document is not an IETF Standards Track publication it
adopts the conventions for normative language to provide clarity of
instructions to the implementer, and to indicate requirement levels
for compliant TLSv1.3 implementations.</t>

<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
&quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and
&quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals,
as shown here.</t>

</section>
</section>
<section anchor="definitions"><name>Hybrid Key Exchange Scheme Definitions</name>

<section anchor="tls-versions"><name>TLS Versions</name>

<t>The new supported group item and related key exchange scheme defined in this document
are only applicable to TLSv1.3.</t>

<t>Implementations of this document MUST NOT apply this supported group or
key exchange scheme to any older versions of TLS.</t>

</section>
<section anchor="curvesm2"><name>CurveSM2</name>

<t>The hybrid key exchange scheme defined in this document uses a fixed elliptic curve
parameter set defined in <xref target="GBT.32918.5-2016"/>. This curve has the name curveSM2.</t>

<t>As per <xref target="RFC8998"/>, the SM2 elliptic curve ID used in the Supported Groups extension is defined as:</t>

<figure><artwork><![CDATA[
      NamedGroup curveSM2 = { 41 };
]]></artwork></figure>

<t>Implementations of the hybrid key exchange mechanism defined in this document MUST conform to
what <xref target="GBT.32918.5-2016"/> requires, that is to say, the only valid elliptic curve
parameter set for SM2 signature algorithm (a.k.a curveSM2) is defined as follows:</t>

<figure><artwork><![CDATA[
   curveSM2: a prime field of 256 bits

   y^2 = x^3 + ax + b

   p  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        FFFFFFFF 00000000 FFFFFFFF FFFFFFFF
   a  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        FFFFFFFF 00000000 FFFFFFFF FFFFFFFC
   b  = 28E9FA9E 9D9F5E34 4D5A9E4B CF6509A7
        F39789F5 15AB8F92 DDBCBD41 4D940E93
   n  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        7203DF6B 21C6052B 53BBF409 39D54123
   Gx = 32C4AE2C 1F198119 5F990446 6A39C994
        8FE30BBF F2660BE1 715A4589 334C74C7
   Gy = BC3736A2 F4F6779C 59BDCEE3 6B692153
        D0A9877C C62A4740 02DF32E5 2139F0A0
]]></artwork></figure>

<t>The above elliptic curve parameter set is also previously defined in <xref target="RFC8998"/>.</t>

</section>
<section anchor="kx"><name>Hybrid Key Exchange</name>

<section anchor="hello-messages"><name>Hello Messages</name>

<t>The use of the hybrid named group defined by this document is negotiated during
the TLS handshake with information exchanged in the Hello messages.</t>

<t>The main procedure follows what <xref target="hybrid"/> defines. That is to say, the
non-post-quantum part (a.k.a. the ECDHE part) of the hybrid key exchange is based
on standard ECDH with curveSM2.</t>

<section anchor="clienthello"><name>ClientHello</name>

<t>To use the hybrid named group curveSM2MLKEM768 defined by this document, a TLSv1.3
client MUST include &#39;curveSM2MLKEM768&#39; in the &#39;supported_groups&#39; extension of the
ClientHello structure defined in Section 4.2.7 of <xref target="RFC8446"/>.</t>

<t>Then the TLS client&#39;s &#39;key_exchange&#39; value of the &#39;key_share&#39; extension is the
concatenation of the curveSM2 ephemeral share and ML-KEM768 encapsulation key.</t>

<t>The ECDHE share is the serialized value of the uncompressed ECDH point representation
as defined in Section 4.2.8.2 of <xref target="RFC8446"/>.  The size of the client share is 1249 bytes
(65 bytes for the curveSM2 public key and 1184 bytes for ML-KEM).</t>

</section>
<section anchor="serverhello"><name>ServerHello</name>

<t>If a TLSv1.3 server receives a ClientHello message containing the hybrid named group
curveSM2MLKEM768 defined in this document, it MAY choose to negotiate on it.</t>

<t>If so, then the server MUST construct its &#39;key_exchange&#39; value of the &#39;key_share&#39;
extension as the concatenation of the server&#39;s ephemeral curveSM2 share encoded in
the same way as the client share and an ML-KEM ciphertext encapsulated by the client&#39;s
encapsulation key. The size of the server share is 1153 bytes (1088 bytes for the
ML-KEM part and 65 bytes for curveSM2).</t>

</section>
</section>
<section anchor="key-scheduling"><name>Key Scheduling</name>

<t>According to <xref target="hybrid"/>, the shared secret is calculated in a &#39;concatenation&#39;
approach: the two shared secrets are concatenated together and used as the
shared secret in the standard TLSv1.3 key schedule.</t>

<t>Thus for curveSM2MLKEM768, the shared secret is the concatenation of the
ECDHE and ML-KEM shared secret.  The ECDHE shared secret is the x-coordinate
of the ECDH shared secret elliptic curve point represented as an octet string
as defined in Section 7.4.2 of <xref target="RFC8446"/>. 
The size of the shared secret is 64 bytes (32 bytes for each part).</t>

<t>Both client and server MUST calculate the ECDH part of the shared secret as
described in Section 7.4.2 of <xref target="RFC8446"/>.</t>

<t>As already described in <xref target="RFC8998"/>, SM2 is actually a set of cryptographic
algorithms including one key exchange protocol which defines methods such as
key derivation function, etc. This document does not use an SM2 key exchange
protocol, and an SM2 key exchange protocol SHALL NOT be used in the hybrid key exchange
scheme defined in <xref target="kx"/>. Implementations of this document MUST always conform to
what TLSv1.3 <xref target="RFC8446"/> and its successors require about the key derivation and
related methods.</t>

</section>
</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANI has not assigned a value for the name &#39;curveSM2MLKEM768&#39; yet. One suggestion from IANA expert
is to use a temporary value reserved for private usage at current stage. Thus implementations can
move forward to test the interoperability. So the value in the following table MUST NOT used in
any production environment. The temporary value is as follows:</t>

<texttable>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>DTLS-OK</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0xFEFE</c>
      <c>curveSM2MLKEM768</c>
      <c>No</c>
      <c>No</c>
      <c>this RFC</c>
</texttable>

<t>After IANA assigns the real value. The above description should be changed to:</t>

<t>IANA has assigned the value XX with the name &#39;curveSM2MLKEM768&#39;, to the
&quot;TLS Supported Groups&quot; registry:&#39;</t>

<texttable>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>DTLS-OK</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>XX</c>
      <c>curveSM2MLKEM768</c>
      <c>No</c>
      <c>No</c>
      <c>this RFC</c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>At the time of writing, there are no security issues
have been found for relevant algorithms.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC8174;
&RFC8446;
&RFC8998;
<reference anchor="ISO-SM2" target="https://www.iso.org/standard/76382.html">
  <front>
    <title>IT Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms</title>
    <author >
      <organization>International Organization for Standardization</organization>
    </author>
    <date year="2018" month="November"/>
  </front>
  <seriesInfo name="ISO" value="ISO/IEC 14888-3:2018"/>
</reference>
<reference anchor="FIPS203" target="https://doi.org/10.6028/nist.fips.203">
  <front>
    <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
    <author >
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="GBT.32918.2-2016" target="http://www.gmbz.org.cn/upload/2018-07-24/1532401673138056311.pdf">
  <front>
    <title>Information security technology --- Public key cryptographic algorithm SM2 based on elliptic curves --- Part 2: Digital signature algorithm</title>
    <author >
      <organization>Standardization Administration of China</organization>
    </author>
    <date year="2017" month="March" day="01"/>
  </front>
  <seriesInfo name="GB/T" value="32918.2-2016"/>
</reference>
<reference anchor="GBT.32918.5-2016" target="http://www.gmbz.org.cn/upload/2018-07-24/1532401863206085511.pdf">
  <front>
    <title>Information security technology --- Public key cryptographic algorithm SM2 based on elliptic curves --- Part 5: Parameter definition</title>
    <author >
      <organization>Standardization Administration of China</organization>
    </author>
    <date year="2017" month="March" day="01"/>
  </front>
  <seriesInfo name="GB/T" value="32918.5-2016"/>
</reference>
<reference anchor="hybrid" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design-11">
  <front>
    <title>Hybrid key exchange in TLS 1.3</title>
    <author >
      <organization>Stebila, D., Fluhrer, S., and S. Gueron</organization>
    </author>
    <date year="2024" month="October" day="07"/>
  </front>
  <seriesInfo name="Work in Progress, Internet-Draft" value=""/>
</reference>
<reference anchor="ecdhe-mlkem" target="https://datatracker.ietf.org/doc/html/draft-kwiatkowski-tls-ecdhe-mlkem-03">
  <front>
    <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
    <author >
      <organization>Kris Kwiatkowski, Panos Kampanakis, Bas Westerbaan, Douglas Stebila</organization>
    </author>
    <date year="2024" month="December" day="24"/>
  </front>
  <seriesInfo name="Work in Progress, Internet-Draft" value=""/>
</reference>


    </references>

</references>


<?line 328?>

<section anchor="contributors"><name>Contributors</name>

<t>Place Holder<br />
Ant Group<br />
place.holder@antfin.com</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA81a7XLbOJb9z6dAJT+cVIuyRH1rq7ci6yPxxI69sXs682dS
EAlLGFMkmyAtqx1v7UPsE+6T7LkASZGU3N3pmapdVRxTIAFcnHvuJ23btpXI
xBdj9mG3jKXHrkOV2L+kPEjSDfsodmz+6K55sBLs5tKxLy8+zi/ZXRiz24ub
h3azY/HlMhYP4/w7W5tl9g+X17C80A34Brt5Mb9L7B0G7cRXtpllq41jb/x7
sbFbjuXxBA86Ladnt9t2q21ZKuGB95X7YYAbQUgDseCbMTuf3y4sGcVjlsSp
SpxWa4QFOG6O2Y1w01gmO2u70lJa91tMCBIRByKxZySH5fJkzGRwhyXd0JMB
nkyVzZUrpRXJMcPnNXN5gFHBeBzzHXsj7xj3fbYT6i0DHmuu1mwtYmExloTu
mG7gUoUxZLxTY7rebfSlvmXxNFmHMY3Tx85+M4iBJ66b7G/Aphg0oF3z1K+O
hzFEvRBB+BAWYwSKwHnOUunTWZjTYJ/CZrvFpmEaJzsee+yLXAq5xUpszlXC
Pofca7APXHoSh5xJLCHdpFjRBXxYT8h/yNLeQAoytVut1rBXGkyDJMbT07UM
eDEcrbXOfhj27XbL7g3xe4hPcf+Ou0pupF97pt/vtIpnxIZLH+BBavoZ9t/5
+uBNN9wcR3HaZNfiAMVpiGNXxjWKP6egKPspkA8iVsSXOp4zzHuU6/QlfPQC
NXS6HcDT+h508DPotjp2v+t060d3I0j9brtOm8JLm25w/NR/abIPae3Mf5FB
eVAf+Bx8V8I9OOefpsGo/z0H7Q3tQXvg2P1eZ1Q/6DrFFu+kEZD0++Jhb5rs
Jg1qp73BpqIyrg/8PoRtPx6cl2yDXQp5T+agLWGRJr8BwM1aBL/ip4ZArz38
TlV3CAH8N+o57ToCKg0AATzd6t1Ki61ZbgVhvOEJKEp+4/Ni6rTbo+xy2B50
88tut59fjkZDujy/ubLhk427yTz+v2ebnt8WTpIlwl0H8pdUKGbbQGAlE+4z
JVcBT9IYo1uZrBmPwEQIRc9c8zhhndyPATM3FolgfrjiWHG9YUuuhMc2gkKA
VBtlRODxisBfJ0mkxqen2+22KVXYhKJOtZuHlzod9DtDp7lONr6eU/WYGYfJ
jwORMICYV/EKW/yqv+ogdZOtlI3pmXlYaQ8RVvSIErEUitiWrw20xvTf6fl8
ytpdeCq7M6YpuL84v75xWp2jSF6GXuoL+4IniXSFfaZPjgBozwOXRyr1jWiX
ORaFgEcx8UKp8Wi3mv2WMzzFjKR5JyPVxP4vIfIpB+M8UJAuhSrCu2IfxfCb
3ZKSQ2hoV0HE6dqt4QuIzK7OyciPCWLRcyVavj+7bXacUXvYdGxg1j/OuXwO
4FAV8mm52P/813+z63TpS5fdI4Fw412UhKuYR2uMcH8VGm6B0tmChmVYTfi+
jAA/w6IPIKxeiTjqjA/5vF/qQAMZKVeb5a+kBXig0zTy4R5ONXdaA9vpnrZ7
HaeLMw46MORWr99pt5uRd/eScmp8ZBNvIwnM2HyFovbeouDpwEY4aL1E1fdn
p7djVsa7ooLe/ysV9CiHieGjYbXME3c4fGGXfxb7Yb/jtPrIQXr/p9j3cuxN
KltBPEutCUWRZ9MIyEhGGaXQR22fJxyiufcibkqR3GlHgOz5lLzhqcmeabyc
PXuCeJ17taMQiKX0eYPNmg228NN1LOIGQmhDewWE0vepiGtuEk4B2Vhr8AIE
P4fxPZ3lOgY1hFKNemqNiOZ6a2HS+goqlUojKxvm09mHealwmGBRsRFBUqk5
/ixg91vJk/twq+6lxq0kmf2yR/0YS8U+7qc2wOEgxBDfRDzg9xKHhqdnPwuF
ky85DwBwmK58jGWIswNIYardPwup9Rpx10YBlIiv5/Ob918/4cp6jeEltsp+
LIue4UsiOFIY63aNUwCPVKOpIuHKO2zM1uEW9QrBu2E8V0OFqTriT8mSydSJ
KUY/xOCYBypCicMu+A4mXaQRb6CqtyyKQ5RCoc90Sg0jg/KalvVZIA7CU1DV
ZgpBhcVcP/UEe3oyIjw/a04+PZV09PyMyfpYG+l5vrAsABMj5LragrPP02tJ
o8/Wj6VP/fwymwgAkI+xQGwRODfCex+HaaR3jjMhK1Aodw02Zrary938iE2z
QWkRfEvJH+LhZE3ZaERAYUDfVlg0EYFGxQNmSD3pKWzjqTW/F7Swiyw/pvBt
Zbs1SFPcXUvxIF5QFnZDoriUJicyuqOFo7KxVWbsI+DlhQ29DvpD9ubpKUtz
np/fji3rP7MPMbR0RDcjheYDzfuRPbEvX9jzv+1nGFxqAAMYykRqgQIVtu8D
oHxZtkWkWROQOlQYLGk8042VJ4qqyW7XKBWY2qc5AE7gVCBlRDFMrTF9uSPF
lxLG/Hky9CJzVBZcDR6lcCBKi1YfQmnpCwQ8CMOJp9S60IJrlt6Az4KdTz5N
qDFApsq4Iu8MKTh74H4qtEcj1QAbf7dnpFchUSI28M7YBH7iAff0VIumRrF8
AArAkpPeFUL3BgxD0o3V9swrs54nhG2sHUCCWQQb7htxcKElghej8i5K44gg
DQN/1/w+BrQeF/PFvMoC0EB3kNg8V7n2KMZg99iRddc/QPPSaRxNx4F7VtjA
X7wB0FswCkjT0Z+e6okouGzhlBw+N6F4X2OfSV9eSHNyD0WG6tWzyIYV7fMk
EeglyPrIjxzxH0049KpmGhpmYgOdtS6YpM0fQh/6b2Q2QaTiPlFvx5ZCYCvP
I2rlHAN9iXxQXJWlJiHbEFyk7E0YCyb3eSCevxUx8iKTARrtwGA2FcVY1sRH
lExX6xq/ZMb0wLj2fdFxS4HZGKJrHJNMLO6FETw/mYAbBg9YgOxKy1WUucwH
bikRHJ4PLvFBIka4PtdBBo5RosiJjf9X9AgtJjeRr3MGSm5IBRiXqFZdspZY
/JLK2KQUPtyor7QxwWdGPmr+pHDsxSqZuRsGkza3IR3p1eVPN7evGuY3+3Sl
rz/P/+On88/zGV3ffJhcXBQX5gkLX65+usju09V+5vTq8nL+aWYmY5TVhi4n
f3ulz2O9urq+Pb/6NLl4dcTEYw3VUhhPF1EtTryAC0VhLpfGLZxNr2FH1tNT
1kIAHfQ19RBwvV2LwECnaWm+AtqdLvx5TEtQ7xM1LRmCaljYQCGTCHQHlKJ0
lvJWG8gmes6KvF8RvfZlgKrG7B9rARzZ8l9NHqGsqn+4NV6UqSLGrgrv+bvB
vBRbKlBS+9icH4cm3i59DW1GEBzyvEoRcilVZeTU0CvszM26jGFsHZOKAn0A
ivseIliWPukdsD22LtKxuqskKI7lBb9z2Cwiszv5iLtV/2NFRclGjrO0RNnF
9jIXm8UU47nITekQh/lFrID4E8UiLGc4NxoNn58bJkk6dH7nsz+aRpXyBK5q
ScvxqKWjVbddjVRHtXoc1KKn9TKumgJwbzq/TkJru0YQPoZb7pkUIcG1LwUH
FN8ZZDQREajl72hHd71wsiMdDgTI5n2TF6d/W0UMU30fBU4NufzpMdiBlAN6
RNngewSL0+uzpUyURc/t/k5wPv69w35g/BH/LfVwxDC6MJ95frE4vCj6n8Wd
VvY5/iz/1687pWeXtK4znI8Wk9GcjWajRW/e6bLurIfv3TM2XfR7rdFksF+3
MxoM8RRr9yZnw8XIYbPZ2fRsBlp1Z6Nuaz7ShWXwvfIOkHzPFv0z5rSn/VbP
OWO9ztnZotsasc5o1uu2Hb3u+0es23Gm3cncQW60aI+G8OestxiNWt1un/Un
ndF0NNq/Shgu5p0WFmILp99vnc3bbADJu70h1u10pwP80+vusO7ZtDPo9CcO
W3QX/cFgNGW90dlsOp93WP+sP3LavU6x7qw1GQ0Hgymb9p1Jd9BtsZYzW3Sc
eQ8n6IwWrUmrUhSAmMsQ9l0z9yqbKVvzFUV+8SDDVMEGKu6ncB/N4xEH4eX+
8bkWLV6/fs0+YNuQXaK6Rm6hjDz0bq9q7OS2cj+d77vcHUl6xCpMpI4wppaz
aBEKWPt6TldipVSr8CKFazMybTKZsoRjw3F3XwtmNsoyN1LUykY6XQcd+A4r
CAO7Uv9F1Isz3qCpt9ZtFz389rf8HdbVSbJFHcO8KqK55nQlB/+aQJ76EgDp
Y+EwoQb4BXQP6oiX4KZiKG8DuXp942Lz/sFJfaWTHN6TIvJ+1Xuqk1LsMIe2
ShIzk1gS6OXqU5heQ7fpNAc0y3AQlqY5CI2ZzUj3RrwTxU4A4tccxJOs3Mpg
1vfAkFicVEMZiYO4QUlrUHQoda6cBy8RUUiPqRCh+cx0ZvISXlTeOGCXjFBG
1WaG2Ua3oBBZfs3Ly3ynNKC0mFpQIlNzFCKrRKSiwTxCWly9hBAKrzpGjJEQ
CpsV5zFaLCRqO90R1I461HrT75mrolYuDl8quOjc7fawW3rUwPA2J+IN1c5x
RsTzuz2FmK6qY5zIFfJBZ0BlCmS2SPE7gR0WTZoD/lov8reeEDSQlDKk8sxd
h1Rew04L78F0XdTUIqpQ226QK4ikzHMJw0w8+oepZe2pxYuK65BaZh8wdk+t
AnCjH7Aq9PSxtItTlNdt+a5YtaxL0gtKQaML5kqsCet7TErUzA1cFMZiHfL2
gDEZHHvGIA5lyn/Tbg2HVc5kbS3j9EimCqmKZMhwRYcPqlO81Cc/bk1cF+We
1nxYcrgmKdMSePTyJDbByuW+m52LSiR4ozLMJxbqgDjk7nqspyfbsLqEaVvt
5wiqXVdCd7FIcp0IG6it2t4ZUXKnnPOb7EOZ4wjtANLqsXO+vnCel5hiGS+y
9zjVqZmVl1xNfdFH2w01rljZytSqPUz16XpyUHU/BgxQLHQTQS0tHXqPu6NB
s3vEGVkH1KoL28/dypuOU6KNgBJNvASqZyEFP0N9gqRirjkj9kfURDy6H1dW
pUz/TeF1FZX3gCrTKmUV2S6lUQhlKNl3++5XpdFlHW10UWu8kgAUDX3Thcqy
DvjJZB16VNtiEIegOahbqT+p38QjkNBFg4nEzerDIn3yQmG6RvpPq0x/t7yn
le/ZyB1K/Ym9VEWnhfof5arxSDJjHVbET09IFsGKP1bXcx+OTx3UdrnllVSl
BSdvDXxchJQwVnm1R0lwmmgZa6BRoydvW2T4UmSgjvIUQkk8mnWrj3ZL8OD5
H2g9k/8+kjLtyIavoH2VrlbUECYtxuHGdLTFI4r3xDJZplZb0XveZRsU/erD
TvWxJjS8Uq3fRn9tZ22oQMAKW3Jp1N2DKKbFR72tEFLwpfRlghhxY3p/WSvb
aN0ky9p36+ZN0Y7JqGFRhyXav0ASwYOMw4CEMEGnfiqyo3Kd/I39VY+zb6YE
0kYYFS+jvrEZ2GBffcTVZ4FcCitT8KRvdwIIuIJ9s75lhcn4hyO9b9v+4chV
/RsWyZvu39hhLm3k+xQylktqrumbJjaYims4lDsqvLSODWWMs4aL8Q0CBhZT
uHml06p1mPoeWV1e0yThOGOrblXnBNzr6MuX/cupF2jYyDq61itKp+udn1eQ
a0Xv73fjk70q/gWa+CcVQSdj/5werOI96u+bujH3ibGLhPozcFdbTAbvdVQn
J4OfINz/kYdUKkV6veb01oPeHtyFaWBsFS5HPFAffB8Qmuad65K795YFgRBm
l2kCJ1YXh142cCD5wXQtmTXBOqbjxqyIbjXX+tY7bACvS3/Shjv/CxpqKZaE
LAAA

-->

</rfc>

