<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-ipsecme-pqt-hybrid-auth-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IKEv2 PQTH Auth">Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-03"/>
    <author fullname="Hu, Jun">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jun.hu@nokia.com</email>
      </address>
    </author>
    <author fullname="Yasufumi Morioka">
      <organization>NTT DOCOMO, INC.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>yasufumi.morioka.dt@nttdocomo.com</email>
      </address>
    </author>
    <author fullname="Wang, Guilin">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>Singapore</country>
        </postal>
        <email>Wang.Guilin@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="30"/>
    <area>sec</area>
    <workgroup>ipsecme</workgroup>
    <keyword>Post-Quantum</keyword>
    <keyword>Hybrid Authentication</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 97?>

<t>One IPsec area that would be impacted by Cryptographically Relevant Quantum Computer (CRQC) is IKEv2 authentication based on traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. There are new Post-Quantum Cryptographic (PQC) algorithms for digital signature like NIST <xref target="ML-DSA"/>, however it takes time for new cryptographic algorithms to mature, so there is security risk to use only the new algorithm before it is field proven. This document describes a IKEv2 hybrid authentication scheme that could contain both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 102?>

<section anchor="changes-in-03">
      <name>changes in -03</name>
      <ul spacing="normal">
        <li>
          <t>version bump to keep doc alive</t>
        </li>
      </ul>
    </section>
    <section anchor="changes-in-02">
      <name>Changes in -02</name>
      <ul spacing="normal">
        <li>
          <t>clarify the approach in the document is general</t>
        </li>
        <li>
          <t>dropping support for PreHash ML-DSA, change example to Pure Signature ML-DSA</t>
        </li>
        <li>
          <t>adding more details in signing process to align with ietf-lamps-pq-composite-sigs-04</t>
        </li>
        <li>
          <t>add text in Security Considerations to emphasize prohibit of key reuse</t>
        </li>
        <li>
          <t>clarify the both C and S bit <bcp14>MAY</bcp14> be 1 at the same time</t>
        </li>
        <li>
          <t>clarify the receiver behavior when the announcement contains no algid</t>
        </li>
        <li>
          <t>typo fixes</t>
        </li>
      </ul>
    </section>
    <section anchor="changes-in-01">
      <name>Changes in -01</name>
      <ul spacing="normal">
        <li>
          <t>Only use SUPPORTED_AUTH_METHODS for algorithm combination announcement, no longer use SIGNATURE_HASH_ALGORITHMS</t>
        </li>
        <li>
          <t>add flag field in the announcement</t>
        </li>
        <li>
          <t>clarify two types of PKI setup</t>
        </li>
        <li>
          <t>add some clarifications on how AUTH payload is computed</t>
        </li>
      </ul>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. New Post-Quantum Cryptographic (PQC) algorithms for digital signature were recently published like NIST <xref target="ML-DSA"/>, however by considering potential flaws in the new algorithm's specifications and implementations, it will take time for these new PQC algorithms to be field proven. So it is risky to only use PQC algorithms before they are mature. There is more detailed discussion on motivation of a hybrid approach for authentication in <xref section="1.3" sectionFormat="of" target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document describes an IKEv2 hybrid authentication scheme that contains both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
      <t>Each IPsec peer announces the support of hybrid authentication via SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, generates and verifies AUTH payload using composite signature like the procedures defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The approach in this document could be a general framework that for all PQC and traditional algorithms, the combinations of ML-DSA variants and traditional algorithms are considered as instantiations of the general framework.</t>
      <t>Following two types of setup are covered:</t>
      <ol spacing="normal" type="1"><li>
          <t>Type-1: A single certificate that has composite key as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/></t>
        </li>
        <li>
          <t>Type-2: Two certificates, one with traditional algorithm key and one with PQC algorithm key</t>
        </li>
      </ol>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real world cryptographic systems.</t>
      <t>Post-Quantum Cryptographic (PQC) algorithms: Asymmetric Cryptographic  algorithms are thought to be secure against CRQC.</t>
      <t>Traditional Cryptographic algorithms: Existing asymmetric Cryptographic  algorithms could be broken by CRQC, like RSA, ECDSA ..etc.</t>
    </section>
    <section anchor="ikev2-key-exchange">
      <name>IKEv2 Key Exchange</name>
      <t>There is no changes introduced in this document to the IKEv2 key exchange process, although it <bcp14>MUST</bcp14> be also resilient to CRQC when using along with the PQ/T hybrid authentication, for example key exchange using the PPK as defined in <xref target="RFC8784"/>, or hybrid key exchanges that includes PQC algorithm via multiple key exchange process as defined in <xref target="RFC9370"/>.</t>
    </section>
    <section anchor="exchanges">
      <name>Exchanges</name>
      <t>The hybrid authentication exchanges is illustrated in an example depicted in <xref target="hybrid-auth-figure"/>, using PPK as defined in <xref target="RFC8784"/> during key exchange, however it could be other key exchanges that involves PQC algorithm since how key exchange is done is transparent to authentication.</t>
      <figure anchor="hybrid-auth-figure">
        <name>Hybrid Authentication Exchanges with RFC8784 Key Exchange</name>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni,
          N(USE_PPK) -->
                  <--  HDR, SAr1, KEr, Nr, [CERTREQ,] N(USE_PPK),
                                      N(SUPPORTED_AUTH_METHODS)

HDR, SK {IDi, CERT+, [CERTREQ,]
        [IDr,] AUTH, SAi2,
        TSi, TSr, N(PPK_IDENTITY, PPK_ID),
        N(SUPPORTED_AUTH_METHODS)} -->
                            <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                      AUTH, [N(PPK_IDENTITY)]}
]]></artwork>
      </figure>
      <section anchor="announcement">
        <name>Announcement</name>
        <t>Announcement of support hybrid authentication is through SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, which includes a list of acceptable authentication methods announcements. this document defines a hybrid authentication announcements with following format:</t>
        <figure anchor="ds-announce">
          <name>Hybrid Authentication Announcement</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Length (>=2) |  Auth Method  |   Cert Link 1 | Alg 1 flag    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Alg 1 Len     |                                               |
+-+-+-+-+-+-+-+-+                                               |
~                      AlgorithmIdentifier 1                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 2   | Alg 2 flag    |  Alg 2 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier 2                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      ...                                      ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 3   | Alg 3 flag    |  Alg 3 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier N                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The announcement includes a list of N algorithms could be used for hybrid signature</t>
        <ul spacing="normal">
          <li>
            <t>Auth Method: A new value to be allocated by IANA</t>
          </li>
          <li>
            <t>Cert Link N: Links corresponding signature algorithm N with a particular CA. as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/></t>
          </li>
          <li>
            <t>Alg N Flag:
            </t>
            <ul spacing="normal">
              <li>
                <t>C: set to 1 if the algorithm could be used in type-1 setup</t>
              </li>
              <li>
                <t>S: set to 1 if the algorithm could be used in type-2 setup</t>
              </li>
              <li>
                <t>Both C and S <bcp14>MAY</bcp14> be set to 1 but <bcp14>MUST NOT</bcp14> set to zero at the same time</t>
              </li>
              <li>
                <t>RESERVED: set to 0</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="announce-flag">
          <name>Algorithm Flag</name>
          <artwork><![CDATA[
     0 1 2 3 4 5 6 7
    +-+-+-+-+-+-+-+-+
    |C|S| RESERVED  |
    +-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>AlgorithmIdentifier N: The variable-length ASN.1 object that is encoded using Distinguished Encoding Rules (DER) <xref target="X.690"/> and identifies the  algorithm of a composite signature as defined in <xref section="7" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
          </li>
        </ul>
        <section anchor="sending-announcement">
          <name>Sending Announcement</name>
          <t>As defined in <xref target="RFC9593"/>, responder includes SUPPORTED_AUTH_METHODS in IKE_SA_INIT response (and potentially also in IKE_INTERMEDIATE response), while initiator includes the notification in IKE_AUTH request.</t>
          <t>Sender includes a hybrid authentication announcement in SUPPORTED_AUTH_METHODS, which contains 0 or N composite signature AlgorithmIdentifiers sender accepts, each AlgorithmIdentifier identifies a combination of algorithms:</t>
          <ul spacing="normal">
            <li>
              <t>a traditional PKI algorithm with corresponding hash algorithm (e.g. id-RSASA-PSS with id-sha256)</t>
            </li>
            <li>
              <t>a PQC algorithm (e.g. id-ML-DSA-44)
              </t>
              <ul spacing="normal">
                <li>
                  <t>in case of Hash ML-DSA, there is also a pre-hash algorithm (e.g. id-sha256)</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>In case of type-2 setup, even though the certificate is not composite key certificate, system still uses a composite signature algorithm that corresponds to the combination of two certificates PKI algorithms and hash algorithm(s).</t>
          <t>C and S bits in flag field are set according to whether sender accepts the algorithm combination in type-1/type-2 setup.</t>
          <t>Announcement without any AlgorithmIdentifiers signals that there is no particular restrictions on algorithm.</t>
        </section>
        <section anchor="receiving-announcement">
          <name>Receiving Announcement</name>
          <t>If hybrid authentication announcement is received, and receiver chooses to authenticate itself using hybrid authentication, then based on its local policy and certificates, one AlgorithmIdentifier (which identifies a combination of algorithms) in the hybrid authentication announcement and a PKI setup (type-1 or type-2) is chosen to create its AUTH and CERT payload(s). If there is no AlgorithmIdentifier in the announcement, receiver <bcp14>MAY</bcp14> choose AlgorithmIdentifier just base on its local policy and certificates.</t>
        </section>
      </section>
      <section anchor="auth-cert-payload">
        <name>AUTH &amp; CERT payload</name>
        <t>The IKEv2 AUTH payload has following format as defined in <xref section="3.8" sectionFormat="of" target="RFC7296"/>:</t>
        <figure anchor="rfc7296-auth">
          <name>AUTH payload</name>
          <artwork><![CDATA[
                        1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Next Payload  |C|  RESERVED   |         Payload Length        |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Auth Method   |                RESERVED                       |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                      Authentication Data                      ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>For hybrid authentication, the AUTH Method has value defined in <xref target="announcement"/></t>
        <t>The Authentication Data field follows format defined in <xref section="3" sectionFormat="of" target="RFC7427"/>:</t>
        <figure anchor="ha-auth-data">
          <name>Authentication Data in hybrid AUTH payload</name>
          <artwork><![CDATA[
                       1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | ASN.1 Length  | AlgorithmIdentifier ASN.1 object              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~        AlgorithmIdentifier ASN.1 object continuing            ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                         Signature Value                       ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Based on selected AlgorithmIdentifier and setup type, the Signature Value is created via procedure defined in <xref target="type-1"/>, <xref target="type-2"/>.</t>
        <section anchor="type-1">
          <name>Type-1</name>
          <t>Assume selected AlgorithmIdentifier is A.</t>
          <ol spacing="normal" type="1"><li>
              <t>There is no change on data to be signed, e.g. InitiatorSignedOctets/ResponderSignedOctets as defined in <xref section="2.15" sectionFormat="of" target="RFC7296"/></t>
            </li>
            <li>
              <t>Follow Sign operation identified by A, e.g. <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>. the ctx input is the string of "IKEv2-PQT-Hybrid-Auth". this step outputs the composite signature, a CompositeSignatureValue.</t>
            </li>
            <li>
              <t>CompositeSignatureValue is serialized per <xref section="4.5" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, the output is used as Signature Value in the Authentication Data field.</t>
            </li>
          </ol>
          <t>note: in case ML-DSA, only pure signature mode as defined in <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> is used, the PreHash ML-DSA mode <bcp14>MUST NOT</bcp14> be used, see <xref section="8.1" sectionFormat="of" target="I-D.ietf-lamps-dilithium-certificates"/> for the rationale.</t>
          <t>Following is an initiator example:</t>
          <ol spacing="normal" type="1"><li>
              <t>A is id-MLDSA44-RSA2048-PSS, which uses pure signature mode id-ML-DSA-44 and id-RSASSA-PSS with id-sha256</t>
            </li>
            <li>
              <t>Follow <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> with following input:  </t>
              <ul spacing="normal">
                <li>
                  <t>sk is the private key of the signing composite key certificate</t>
                </li>
                <li>
                  <t>M is InitiatorSignedOctets</t>
                </li>
                <li>
                  <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
                </li>
              </ul>
            </li>
          </ol>
          <t>The signing composite certificate <bcp14>MUST</bcp14> be the first CERT payload.</t>
        </section>
        <section anchor="type-2">
          <name>Type-2</name>
          <t>The procedure is same as Type-1, use private key of traditional and PQC certificate accordingly; e.g. in Sign procedure define in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, the <tt>mldsaSK</tt> is the private key of ML-DSA certificate, while <tt>tradSK</tt> is the private key of traditional certificate.</t>
          <t>With the example in <xref target="type-1"/>:</t>
          <ul spacing="normal">
            <li>
              <t>mldsaSK is the private key of ML-DSA certificate, tradSK is the private key of the RSA certificate</t>
            </li>
            <li>
              <t>M is InitiatorSignedOctets</t>
            </li>
            <li>
              <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
            </li>
          </ul>
          <t>The signing PQC certificate <bcp14>MUST</bcp14> be the first CERT payload in the IKEv2 message, while traditional certificate <bcp14>MUST</bcp14> be the second CERT payload.</t>
          <section anchor="relatedcertificate">
            <name>RelatedCertificate</name>
            <t>In type-2 setup, the signing certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension, then the receiver <bcp14>SHOULD</bcp14> verify the extension according to <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>, failed verification <bcp14>SHOULD</bcp14> fail authentication.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of general PQ/T hybrid authentication is discussed in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document uses mechanisms defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, <xref target="RFC7427"/> and <xref target="RFC9593"/>, the security discussion in the corresponding RFCs also apply.</t>
      <t>One important security consideration mentioned in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> worth repeating here is that component key used in either <xref target="type-1"/> or <xref target="type-2"/> <bcp14>MUST NOT</bcp14> be reused in any other cases including single-algorithm case.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests a value in "IKEv2 Authentication Method" subregistry under IANA "Internet Key Exchange Version 2 (IKEv2) Parameters" registry</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-12"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-07"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-06"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2021 (E)"/>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-204"/>
          <seriesInfo name="State" value="Initial Public Draft"/>
        </reference>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
        <reference anchor="RFC9370">
          <front>
            <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
            <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
            <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
              <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
              <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9370"/>
          <seriesInfo name="DOI" value="10.17487/RFC9370"/>
        </reference>
      </references>
    </references>
    <?line 371?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
