<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-ipsecme-pqt-hybrid-auth-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="IKEv2 PQTH Auth">Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-02"/>
    <author fullname="Hu, Jun">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jun.hu@nokia.com</email>
      </address>
    </author>
    <author fullname="Yasufumi Morioka">
      <organization>NTT DOCOMO, INC.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>yasufumi.morioka.dt@nttdocomo.com</email>
      </address>
    </author>
    <author fullname="Wang, Guilin">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>Singapore</country>
        </postal>
        <email>Wang.Guilin@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="01"/>
    <area>sec</area>
    <workgroup>ipsecme</workgroup>
    <keyword>Post-Quantum</keyword>
    <keyword>Hybrid Authentication</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 97?>

<t>One IPsec area that would be impacted by Cryptographically Relevant Quantum Computer (CRQC) is IKEv2 authentication based on traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. There are new Post-Quantum Cryptographic (PQC) algorithms for digital signature like NIST <xref target="ML-DSA"/>, however it takes time for new cryptographic algorithms to mature, so there is security risk to use only the new algorithm before it is field proven. This document describes a IKEv2 hybrid authentication scheme that could contain both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 102?>

<section anchor="change-in-02">
      <name>Change in -02</name>
      <ul spacing="normal">
        <li>
          <t>clarify the approach in the document is general</t>
        </li>
        <li>
          <t>dropping support for PreHash ML-DSA, change example to Pure Signature ML-DSA</t>
        </li>
        <li>
          <t>adding more details in signing process to align with ietf-lamps-pq-composite-sigs-04</t>
        </li>
        <li>
          <t>add text in Security Considerations to emphasize prohibit of key reuse</t>
        </li>
        <li>
          <t>clarify the both C and S bit <bcp14>MAY</bcp14> be 1 at the same time</t>
        </li>
        <li>
          <t>clarify the receiver behavior when the announcement contains no algid</t>
        </li>
        <li>
          <t>typo fixes</t>
        </li>
      </ul>
    </section>
    <section anchor="changes-in-01">
      <name>Changes in -01</name>
      <ul spacing="normal">
        <li>
          <t>Only use SUPPORTED_AUTH_METHODS for algorithm combination announcement, no longer use SIGNATURE_HASH_ALGORITHMS</t>
        </li>
        <li>
          <t>add flag field in the announcement</t>
        </li>
        <li>
          <t>clarify two types of PKI setup</t>
        </li>
        <li>
          <t>add some clarifications on how AUTH payload is computed</t>
        </li>
      </ul>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. New Post-Quantum Cryptographic (PQC) algorithms for digital signature were recently published like NIST <xref target="ML-DSA"/>, however by considering potential flaws in the new algorithm's specifications and implementations, it will take time for these new PQC algorithms to be field proven. So it is risky to only use PQC algorithms before they are mature. There is more detailed discussion on motivation of a hybrid approach for authentication in <xref section="1.3" sectionFormat="of" target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document describes an IKEv2 hybrid authentication scheme that contains both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
      <t>Each IPsec peer announces the support of hybrid authentication via SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, generates and verifies AUTH payload using composite signature like the procedures defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The approach in this document could be a general framework that for all PQC and traditional algorithms, the combinations of ML-DSA variants and traditional algorithms are considered as instantiations of the general framework.</t>
      <t>Following two types of setup are covered:</t>
      <ol spacing="normal" type="1"><li>
          <t>Type-1: A single certificate that has composite key as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/></t>
        </li>
        <li>
          <t>Type-2: Two certificates, one with traditional algorithm key and one with PQC algorithm key</t>
        </li>
      </ol>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real world cryptographic systems.</t>
      <t>Post-Quantum Cryptographic (PQC) algorithms: Asymmetric Cryptographic  algorithms are thought to be secure against CRQC.</t>
      <t>Traditional Cryptographic algorithms: Existing asymmetric Cryptographic  algorithms could be broken by CRQC, like RSA, ECDSA ..etc.</t>
    </section>
    <section anchor="ikev2-key-exchange">
      <name>IKEv2 Key Exchange</name>
      <t>There is no changes introduced in this document to the IKEv2 key exchange process, although it <bcp14>MUST</bcp14> be also resilient to CRQC when using along with the PQ/T hybrid authentication, for example key exchange using the PPK as defined in <xref target="RFC8784"/>, or hybrid key exchanges that includes PQC algorithm via multiple key exchange process as defined in <xref target="RFC9370"/>.</t>
    </section>
    <section anchor="exchanges">
      <name>Exchanges</name>
      <t>The hybrid authentication exchanges is illustrated in an example depicted in <xref target="hybrid-auth-figure"/>, using PPK as defined in <xref target="RFC8784"/> during key exchange, however it could be other key exchanges that involves PQC algorithm since how key exchange is done is transparent to authentication.</t>
      <figure anchor="hybrid-auth-figure">
        <name>Hybrid Authentication Exchanges with RFC8784 Key Exchange</name>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni,
          N(USE_PPK) -->
                  <--  HDR, SAr1, KEr, Nr, [CERTREQ,] N(USE_PPK),
                                      N(SUPPORTED_AUTH_METHODS)

HDR, SK {IDi, CERT+, [CERTREQ,]
        [IDr,] AUTH, SAi2,
        TSi, TSr, N(PPK_IDENTITY, PPK_ID),
        N(SUPPORTED_AUTH_METHODS)} -->
                            <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                      AUTH, [N(PPK_IDENTITY)]}
]]></artwork>
      </figure>
      <section anchor="announcement">
        <name>Announcement</name>
        <t>Announcement of support hybrid authentication is through SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, which includes a list of acceptable authentication methods announcements. this document defines a hybrid authentication announcements with following format:</t>
        <figure anchor="ds-announce">
          <name>Hybrid Authentication Announcement</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Length (>=2) |  Auth Method  |   Cert Link 1 | Alg 1 flag    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Alg 1 Len     |                                               |
+-+-+-+-+-+-+-+-+                                               |
~                      AlgorithmIdentifier 1                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 2   | Alg 2 flag    |  Alg 2 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier 2                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      ...                                      ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 3   | Alg 3 flag    |  Alg 3 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier N                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The announcement includes a list of N algorithms could be used for hybrid signature</t>
        <ul spacing="normal">
          <li>
            <t>Auth Method: A new value to be allocated by IANA</t>
          </li>
          <li>
            <t>Cert Link N: Links corresponding signature algorithm N with a particular CA. as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/></t>
          </li>
          <li>
            <t>Alg N Flag:
            </t>
            <ul spacing="normal">
              <li>
                <t>C: set to 1 if the algorithm could be used in type-1 setup</t>
              </li>
              <li>
                <t>S: set to 1 if the algorithm could be used in type-2 setup</t>
              </li>
              <li>
                <t>Both C and S <bcp14>MAY</bcp14> be set to 1 but <bcp14>MUST NOT</bcp14> set to zero at the same time</t>
              </li>
              <li>
                <t>RESERVED: set to 0</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="announce-flag">
          <name>Algorithm Flag</name>
          <artwork><![CDATA[
     0 1 2 3 4 5 6 7
    +-+-+-+-+-+-+-+-+
    |C|S| RESERVED  |
    +-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>AlgorithmIdentifier N: The variable-length ASN.1 object that is encoded using Distinguished Encoding Rules (DER) <xref target="X.690"/> and identifies the  algorithm of a composite signature as defined in <xref section="7" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
          </li>
        </ul>
        <section anchor="sending-announcement">
          <name>Sending Announcement</name>
          <t>As defined in <xref target="RFC9593"/>, responder includes SUPPORTED_AUTH_METHODS in IKE_SA_INIT response (and potentially also in IKE_INTERMEDIATE response), while initiator includes the notification in IKE_AUTH request.</t>
          <t>Sender includes a hybrid authentication announcement in SUPPORTED_AUTH_METHODS, which contains 0 or N composite signature AlgorithmIdentifiers sender accepts, each AlgorithmIdentifier identifies a combination of algorithms:</t>
          <ul spacing="normal">
            <li>
              <t>a traditional PKI algorithm with corresponding hash algorithm (e.g. id-RSASA-PSS with id-sha256)</t>
            </li>
            <li>
              <t>a PQC algorithm (e.g. id-ML-DSA-44)
              </t>
              <ul spacing="normal">
                <li>
                  <t>in case of Hash ML-DSA, there is also a pre-hash algorithm (e.g. id-sha256)</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>In case of type-2 setup, even though the certificate is not composite key certificate, system still uses a composite signature algorithm that corresponds to the combination of two certificates PKI algorithms and hash algorithm(s).</t>
          <t>C and S bits in flag field are set according to whether sender accepts the algorithm combination in type-1/type-2 setup.</t>
          <t>Announcement without any AlgorithmIdentifiers signals that there is no particular restrictions on algorithm.</t>
        </section>
        <section anchor="receiving-announcement">
          <name>Receiving Announcement</name>
          <t>If hybrid authentication announcement is received, and receiver chooses to authenticate itself using hybrid authentication, then based on its local policy and certificates, one AlgorithmIdentifier (which identifies a combination of algorithms) in the hybrid authentication announcement and a PKI setup (type-1 or type-2) is chosen to create its AUTH and CERT payload(s). If there is no AlgorithmIdentifier in the announcement, receiver <bcp14>MAY</bcp14> choose AlgorithmIdentifier just base on its local policy and certificates.</t>
        </section>
      </section>
      <section anchor="auth-cert-payload">
        <name>AUTH &amp; CERT payload</name>
        <t>The IKEv2 AUTH payload has following format as defined in <xref section="3.8" sectionFormat="of" target="RFC7296"/>:</t>
        <figure anchor="rfc7296-auth">
          <name>AUTH payload</name>
          <artwork><![CDATA[
                        1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Next Payload  |C|  RESERVED   |         Payload Length        |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Auth Method   |                RESERVED                       |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                      Authentication Data                      ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>For hybrid authentication, the AUTH Method has value defined in <xref target="announcement"/></t>
        <t>The Authentication Data field follows format defined in <xref section="3" sectionFormat="of" target="RFC7427"/>:</t>
        <figure anchor="ha-auth-data">
          <name>Authentication Data in hybrid AUTH payload</name>
          <artwork><![CDATA[
                       1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | ASN.1 Length  | AlgorithmIdentifier ASN.1 object              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~        AlgorithmIdentifier ASN.1 object continuing            ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                         Signature Value                       ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Based on selected AlgorithmIdentifier and setup type, the Signature Value is created via procedure defined in <xref target="type-1"/>, <xref target="type-2"/>.</t>
        <section anchor="type-1">
          <name>Type-1</name>
          <t>Assume selected AlgorithmIdentifier is A.</t>
          <ol spacing="normal" type="1"><li>
              <t>There is no change on data to be signed, e.g. InitiatorSignedOctets/ResponderSignedOctets as defined in <xref section="2.15" sectionFormat="of" target="RFC7296"/></t>
            </li>
            <li>
              <t>Follow Sign operation identified by A, e.g. <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>. the ctx input is the string of "IKEv2-PQT-Hybrid-Auth". this step outputs the composite signature, a CompositeSignatureValue.</t>
            </li>
            <li>
              <t>CompositeSignatureValue is serialized per <xref section="4.5" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, the output is used as Signature Value in the Authentication Data field.</t>
            </li>
          </ol>
          <t>note: in case ML-DSA, only pure signature mode as defined in <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> is used, the PreHash ML-DSA mode <bcp14>MUST NOT</bcp14> be used, see <xref section="8.1" sectionFormat="of" target="I-D.ietf-lamps-dilithium-certificates"/> for the rationale.</t>
          <t>Following is an initiator example:</t>
          <ol spacing="normal" type="1"><li>
              <t>A is id-MLDSA44-RSA2048-PSS, which uses pure signature mode id-ML-DSA-44 and id-RSASSA-PSS with id-sha256</t>
            </li>
            <li>
              <t>Follow <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> with following input:  </t>
              <ul spacing="normal">
                <li>
                  <t>sk is the private key of the signing composite key certificate</t>
                </li>
                <li>
                  <t>M is InitiatorSignedOctets</t>
                </li>
                <li>
                  <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
                </li>
              </ul>
            </li>
          </ol>
          <t>The signing composite certificate <bcp14>MUST</bcp14> be the first CERT payload.</t>
        </section>
        <section anchor="type-2">
          <name>Type-2</name>
          <t>The procedure is same as Type-1, use private key of traditional and PQC certificate accordingly; e.g. in Sign procedure define in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, the <tt>mldsaSK</tt> is the private key of ML-DSA certificate, while <tt>tradSK</tt> is the private key of traditional certificate.</t>
          <t>With the example in <xref target="type-1"/>:</t>
          <ul spacing="normal">
            <li>
              <t>mldsaSK is the private key of ML-DSA certificate, tradSK is the private key of the RSA certificate</t>
            </li>
            <li>
              <t>M is InitiatorSignedOctets</t>
            </li>
            <li>
              <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
            </li>
          </ul>
          <t>The signing PQC certificate <bcp14>MUST</bcp14> be the first CERT payload in the IKEv2 message, while traditional certificate <bcp14>MUST</bcp14> be the second CERT payload.</t>
          <section anchor="relatedcertificate">
            <name>RelatedCertificate</name>
            <t>In type-2 setup, the signing certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension, then the receiver <bcp14>SHOULD</bcp14> verify the extension according to <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>, failed verification <bcp14>SHOULD</bcp14> fail authentication.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of general PQ/T hybrid authentication is discussed in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document uses mechanisms defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, <xref target="RFC7427"/> and <xref target="RFC9593"/>, the security discussion in the corresponding RFCs also apply.</t>
      <t>One important security consideration mentioned in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> worth repeating here is that component key used in either <xref target="type-1"/> or <xref target="type-2"/> <bcp14>MUST NOT</bcp14> be reused in any other cases including single-algorithm case.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests a value in "IKEv2 Authentication Method" subregistry under IANA "Internet Key Exchange Version 2 (IKEv2) Parameters" registry</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1_5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="January" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

   Discussion of this work is encouraged to happen on the IETF PQUIP
   mailing list pqc@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dconnolly/draft-ietf-pquip-hybrid-
   signature-spectrums

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="April" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-08"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2021 (E)"/>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-204"/>
          <seriesInfo name="State" value="Initial Public Draft"/>
        </reference>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
        <reference anchor="RFC9370">
          <front>
            <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
            <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
            <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
              <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
              <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9370"/>
          <seriesInfo name="DOI" value="10.17487/RFC9370"/>
        </reference>
      </references>
    </references>
    <?line 366?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
