<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-pqc-hsm-constrained-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Adapting Constrained Devices for PQC">Adapting Constrained Devices for Post-Quantum Cryptography</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-hsm-constrained-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Ben Salter">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>ben.s3@ncsc.gov.uk</email>
      </address>
    </author>
    <author fullname="Kris Kwiatkowski">
      <organization>PQShield</organization>
      <address>
        <email>kris@amongbytes.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="18"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>PQC</keyword>
    <keyword>IoT</keyword>
    <keyword>TEE</keyword>
    <keyword>HSM</keyword>
    <keyword>RoT</keyword>
    <abstract>
      <?line 104?>

<t>This document provides guidance on integrating Post-Quantum Cryptography (PQC) into
resource-constrained devices, such as IoT nodes and lightweight Hardware Security Modules
(HSMs). These systems often operate with strict limitations on processing power, RAM, and
flash memory, and may even be battery-powered. The document emphasizes the role of hardware
security as the basis for secure operations, supporting features such as seed-based key
generation to minimize persistent storage, efficient handling of ephemeral keys, and the
offloading of cryptographic tasks in low-resource environments. It also explores the
implications of PQC on firmware update mechanisms in such constrained systems.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-pquip-pqc-hsm-constrained/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        pquip Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 115?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The transition to post-quantum cryptography (PQC) poses significant challenges for
resource-constrained Internet of Things (IoT) devices, which are often equipped with
Trusted Execution Environments (TEEs), secure elements, or other forms of hardware
security modules (HSMs). These devices typically operate under strict limitations on
processing power, RAM, and flash memory, and in some cases are battery-powered. Adopting
PQC algorithms in such environments is difficult due to their substantially larger key
sizes and, in some cases, higher computational demands. Consequently, the migration to
PQC requires careful planning to ensure secure and efficient key management within
constrained platforms.</t>
      <t>This document provides guidance and best practices for integrating PQC algorithms into
constrained devices. It reviews strategies for key storage, ephemeral key management,
and performance optimization tailored to low-resource environments. One mitigation
technique for storage limitations is seed-based key generation, where only a compact
seed is stored instead of the full private key. While this approach conserves memory,
it introduces additional computational overhead because full private keys must be derived
on demand—illustrating the classic computation-versus-storage trade-off. The document also
examines ephemeral key generation in protocols such as TLS, along with techniques to
optimize PQC signature operations to improve performance within constrained cryptographic
modules.</t>
      <t>The focus is on PQC in constrained devices, with particular attention to the three
algorithms standardized by NIST:</t>
      <ul spacing="normal">
        <li>
          <t>Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) <xref target="ML-KEM"/>,</t>
        </li>
        <li>
          <t>Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="ML-DSA"/>, and</t>
        </li>
        <li>
          <t>Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) <xref target="SLH-DSA"/>.</t>
        </li>
      </ul>
      <t>The Hierarchical Signature System/Leighton–Micali Signature (HSS/LMS) <xref target="RFC8554"/> is
also considered in the context of firmware signing. Future revisions may extend the scope
to additional PQC algorithms, such as the Hamming Quasi-Cyclic (HQC) KEM <xref target="HQC"/> and the Fast
Fourier Transform over NTRU-Lattice-Based Digital Signature Algorithm (FN-DSA) <xref target="FN-DSA"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="key-management-in-constrained-devices-for-pqc">
      <name>Key Management in Constrained Devices for PQC</name>
      <t>The embedded cryptographic components used in constrained devices are designed to securely manage cryptographic keys, often under strict limitations in RAM, flash memory, and computational resources. These limitations are further exhausted by the increased key sizes and computational demands of PQC algorithms.</t>
      <t>One mitigation of storage limitations is to store only the seed rather than the full
expanded private key, as the seed is far smaller and can derive the expanded private key
as necessary. To reduce storage requirements on constrained devices, private keys for
Initial Device Identifiers (IDevIDs), Locally Significant Device
Identifiers (LDevIDs), and the optional attestation private key can be
stored as seeds instead of expanded key material. This optimization does
not apply to device certificates or trust anchors, which must be stored
in persistent device storage since they are signed public data
structures (see <xref target="RFC5280"/>). The terms IDevIDs and LDevIDs are explained in IEEE Std 802.1AR 
<xref target="IEEE-802.1AR"/>.</t>
      <section anchor="Seed">
        <name>Seed Management</name>
        <t>The seed generated during the PQC key generation function is highly sensitive, as it will
be used to compute the private key or decapsulation key. Consequently, seeds must be
treated with the same level of security as private keys.</t>
        <t>To comply with <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, <xref target="SLH-DSA"/> and <xref target="REC-KEM"/> guidelines:</t>
        <section anchor="seed-storage">
          <name>Seed Storage</name>
          <t>Some PQ key exchange mechanisms use a seed to generate their private keys (e.g., ML-KEM,
McEliece, and HQC), and those seeds are smaller than private keys, saving storage space.
Some implementations may choose to retain the (small) seed rather than the (larger)
private key.  As the private key is necessary for cryptographic operations, it can
be derived from the seed when needed or retained in a cache within the security module.</t>
          <t>Seeds must be securely stored within a cryptographic module of the device whether
hardware or software-based to protect against unauthorized access. Since the seed can derive
the private key, it must be safeguarded with the same
level of protection as a private key. For example, according to <xref target="ML-DSA"/>
Section 3.6.3, the seed ξ generated during ML-DSA.KeyGen can be stored for later use with
ML-DSA.KeyGen_internal.</t>
          <t>The choice between storing a seed or an expanded private key involves trade-offs
between storage efficiency and performance. Some constrained cryptographic modules may
store only the seed and derive the expanded private key on demand, whereas others may
prefer storing the full expanded key to reduce computational overhead during key usage.</t>
          <t>While vulnerabilities like the "Unbindable Kemmy Schmidt" attack <xref target="BIND"/> demonstrate
the risks of manipulating expanded private keys in environments lacking hardware-backed
protections, these attacks generally assume an adversary has some level of control over
the expanded key format. However, in a hardware-backed protcted environment, where private
keys are typically protected from such manipulation, the primary motivation for storing
the seed rather than the expanded key is not directly tied to mitigating "Kemmy" attacks.</t>
          <t>The ML-DSA and ML-KEM private key formats, as specified in
<xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-kyber-certificates"/>,
represent the private key using a seed from which the expanded private key is derived.
While these formats rely on the seed for key generation, an constrained cryptographic
module may choose to store the expanded private key to avoid the additional computation
required for running KeyGen.</t>
          <t>This choice between storing the seed or the expanded private key has direct
implications on performance, as key derivation incurs additional computation. The impact
of this overhead varies depending on the algorithm. For instance, ML-DSA key generation,
which primarily involves polynomial operations using the Number Theoretic Transform (NTT)
and hashing, is computationally efficient compared to other post-quantum schemes. In
contrast, SLH-DSA key generation requires constructing a Merkle tree and multiple calls to
Winternitz One-Time Signature (WOTS+) key generation, making it significantly slower due
to the recursive hash computations involved. Designers of constrained systems must
carefully balance storage efficiency and computational overhead based on system
requirements and operational constraints. While constrained systems employ various key
storage strategies, the decision to store full private keys or only seeds depends on
design goals, performance considerations, and standards compliance (e.g., PKCS#11).</t>
          <t>A challenge arises when importing an existing private key into a system designed to
store only seeds. When a user attempts to import an already expanded private key, there is
a mismatch between the key format used internally (seed-based) and the expanded private
key. This issue arises because the internal format is designed for efficient key storage
by deriving the private key from the seed, while the expanded private key is already fully
computed. As NIST has not defined a single private key format for PQC algorithms, this
creates a potential gap in interoperability.</t>
          <t>If the seed is not securely stored at the time of key generation, it is permanently
lost because the process of deriving an expanded key from the seed relies on a one-way
cryptographic function. This one-way function derives the private key from the seed, but the reverse operation,
deriving the original seed from the expanded key is computationally infeasible.</t>
        </section>
        <section anchor="efficient-key-derivation">
          <name>Efficient Key Derivation</name>
          <t>When storing only the seed in a constrained cryptographic module, it is crucial that
the device is capable of deriving the private key efficiently whenever required. However,
it is important to note that constantly re-deriving the private key for every
cryptographic operation may introduce significant performance overhead. In scenarios where
performance is a critical consideration, it may be more efficient to store the expanded
private key directly instead of only the seed. Higher quality implementations may also
retain (cache) recently-used or frequently-used private keys to avoid the computational
overhead and delay of deriving the private key from the seed with each request.</t>
          <t>The key derivation process, such as ML-KEM.KeyGen_internal for ML-KEM or similar
functions for other PQC algorithms, must be implemented in a way that can securely operate
within the resource constraints of the device. If using the seed-only model, the derived
private key should only be temporarily held in memory during the cryptographic operation
and discarded immediately after use. However, storing the expanded private key may be a
more practical solution in time-sensitive applications or for devices that frequently
perform cryptographic operations.</t>
        </section>
        <section anchor="exporting-seeds-and-private-keys">
          <name>Exporting Seeds and Private Keys</name>
          <t>Given the potential for hardware failures or the end-of-life of devices containing keys, it
is essential to plan for backup and recovery of the cryptographic seeds and private keys. Constrained
devices should support secure seed backup mechanisms, ideally leveraging encrypted storage
and ensuring that the backup data is protected from unauthorized access. In a disaster
recovery scenario, the seeds and private keys should be recoverable private key, provided the proper security measures are in place to prevent unauthorized
extraction.</t>
          <t>There are two distinct approaches to exporting private keys or seeds from a constrained device:</t>
          <section anchor="direct-transfer-over-tls">
            <name>Direct Transfer over TLS</name>
            <t>In scenarios where the constrained device has sufficient capability to initiate or terminate a mutually authenticated TLS session, the device can securely transfer encrypted private key material directly to another cryptographic module.</t>
          </section>
          <section anchor="export-of-encrypted-seeds-and-private-keys">
            <name>Export of Encrypted Seeds and Private Keys</name>
            <t>In more common constrained device scenarios, for secure exporting of seeds and private keys, a strong symmetric encryption algorithm, such as AES in key-wrap mode (<xref target="RFC3394"/>), should be used to encrypt the seed before export. This ensures that the seed remains protected even if the export process is vulnerable to quantum attacks.</t>
            <t>Operationally, the exported data and the the symmetric key used for encryption must both be protected against unauthorized access or modification.</t>
          </section>
          <section anchor="security-requirements-for-export-operations">
            <name>Security Requirements for Export Operations</name>
            <t>The encryption and decryption of seeds and private keys must occur entirely within the cryptographic modules to reduce the risk of exposure and ensure compliance to established security standards.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="ephemeral-key-management">
      <name>Ephemeral Key Management</name>
      <t>In protocols like TLS and IPsec, ephemeral keys are used for key exchange. Given the
increased size of PQC key material, ephemeral key management will have to be optimized for
both security and performance.</t>
      <t>For PQC KEMs, ephemeral key-pairs are generated from an ephemeral seed, that is used
immediately during key generation and then discarded. Furthermore, once the shared secret is
derived, the ephemeral private key will have to be deleted. Since the private key resides in the
constrained cryptographic module, removing it optimizes memory usage, reducing the footprint of
PQC key material in the cryptographic module. This ensures that that no unnecessary secrets
persist beyond their intended use.</t>
      <t>Additionally, ephemeral keys, whether from traditional ECDH or PQC KEM algorithms, are intended
to be unique for each key exchange instance and kept separate across connections (e.g., TLS).
Deleting ephemeral keying material after use not only optimizes memory usage but also ensures
that key material cannot be reused across connections, which would otherwise introduce security and
privacy issues. These risks are discussed in more detail in the Security Considerations of
<xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>Constrained devices implementing PQC ephemeral key management will have to:</t>
      <ul spacing="normal">
        <li>
          <t>Generate ephemeral key-pairs on-demand from an ephemeral seed stored temporarily within the cryptographic module.</t>
        </li>
        <li>
          <t>Enforce immediate seed erasure after the key-pair is generated and the cryptographic operation is completed.</t>
        </li>
        <li>
          <t>Delete the private key after the shared secret is derived.</t>
        </li>
        <li>
          <t>Prevent key reuse across different algorithm suites or sessions.</t>
        </li>
      </ul>
    </section>
    <section anchor="optimizing-performance-in-constrained-devices-for-pqc-signature-algorithms">
      <name>Optimizing Performance in Constrained Devices for PQC Signature Algorithms</name>
      <t>When implementing PQC signature algorithms in constrained cryptographic modules,
performance optimization becomes a critical consideration. Transmitting the entire message
to the cryptographic module for signing can lead to significant overhead, especially for
large payloads. To address this, implementers can leverage techniques that reduce the data
transmitted to the cryptographic module, thereby improving efficiency and scalability.</t>
      <t>One effective approach involves sending only a message digest to the cryptographic module
for signing. By signing the digest of the content rather than the entire content, the
communication between the application and the cryptographic module is minimized, enabling
better performance. This method is applicable for any PQC signature algorithm, whether it
is ML-DSA, SLH-DSA, or any future signature scheme. For such algorithms, a mechanism is
often provided to pre-hash or process the message in a way that avoids sending the entire
raw message for signing. In particular, algorithms like SLH-DSA present challenges due to
their construction, which requires multiple passes over the message digest during the
signing process. The signer does not retain the entire message or its full digest in
memory at once. Instead, different parts of the message digest are processed sequentially
during the signing procedure. This differs from traditional algorithms like RSA or ECDSA,
which allow for more efficient processing of the message, without requiring multiple
passes or intermediate processing of the digest.</t>
      <t>A key consideration when deploying ML-DSA in cryptographic module is the amount of memory
available. ML-DSA, unlike traditional signature schemes such as RSA or ECDSA, requires
significant memory during signing due to multiple Number Theoretic Transform (NTT)
operations, matrix expansions, and rejection sampling loops. These steps involve storing
large polynomial vectors and intermediate values, making ML-DSA more memory-intensive. If
an cryptographic module has sufficient memory, this may not be an issue. However, in
constrained environments with limited memory, implementing ML-DSA can be challenging. The
signer must store and process multiple transformed values, leading to increased
computational overhead if the cryptographic module lacks the necessary memory to manage
these operations efficiently.</t>
      <t>To address the memory consumption challenge, algorithms like ML-DSA offer a form of
pre-hash using the μ (message representative) value described in Section 6.2 of <xref target="ML-DSA"/>.
The μ value provides an abstraction for pre-hashing by allowing the hash or message
representative to be computed outside the cryptographic module. This feature offers
additional flexibility by enabling the use of different cryptographic modules for the
pre-hashing step, reducing memory consumption within the cryptographic module.
The pre-computed μ value is then supplied to the cryptographic module, eliminating the need to
transmit the entire message for signing. <xref target="I-D.ietf-lamps-dilithium-certificates"/>
discusses leveraging Externalμ-ML-DSA, where the pre-hashing step
(Externalμ-ML-DSA.Prehash) is performed in a software cryptographic module, and only the
pre-hashed message (μ) is sent to the hardware cryptographic module for signing
(Externalμ-ML-DSA.Sign). By implementing Externalμ-ML-DSA.Prehash in software and
Externalμ-ML-DSA.Sign in an hardware cryptographic module, the cryptographic workload
is efficiently distributed, making it practical for high-volume signing operations even
in memory-constrained cryptographic modules.</t>
      <t>The main advantage of this method is that, unlike HashML-DSA, the Externalμ-ML-DSA approach
is interoperable with the standard version of ML-DSA that does not use pre-hashing. This means
a message can be signed using ML-DSA.Sign, and the verifier can independently compute μ and use
Externalμ-ML-DSA.Verify for verification -- or vice versa. In both cases, the verifier
does not need to know whether the signer used internal or external pre-hashing, as the resulting
signature and verification process remain the same.</t>
    </section>
    <section anchor="additional-considerations-for-pqc-use-in-constrained-devices">
      <name>Additional Considerations for PQC Use in Constrained Devices</name>
      <t>Key Rotation and Renewal: In constrained devices, managing the lifecycle of cryptographic
keys including periodic key rotation and renewal is critical for maintaining long-term
security and supporting cryptographic agility. While constrained devices may rely on
integrated secure elements or lightweight HSMs for secure key storage and operations, the
responsibility for orchestrating key rotation typically resides in the application layer
or external device management infrastructure.</t>
      <t>Although the underlying cryptographic module may offer primitives to securely generate new
key pairs, store fresh seeds, or delete obsolete keys, these capabilities must be
integrated into the device’s broader key management framework. This process is especially
important in the context of PQC, where evolving research may lead to changes in
recommended algorithms, parameters, and key management practices.</t>
      <t>The security of PQC schemes continues to evolve, with potential risks arising from
advances in post-quantum algorithms, cryptanalytic or implementation vulnerabilities. As a
result, constrained devices should be designed to support flexible and updatable key
management policies. This includes the ability to:</t>
      <ul spacing="normal">
        <li>
          <t>Rotate keys periodically to provide forward-secrecy,</t>
        </li>
        <li>
          <t>Update algorithm choices or key sizes based on emerging security guidance,</t>
        </li>
        <li>
          <t>Reconfigure cryptographic profile of the device via firmware updates.</t>
        </li>
      </ul>
      <section anchor="sec-key-sizes">
        <name>Key Sizes of Post-Quantum Algorithms</name>
        <t>The key sizes of post-quantum algorithms are generally larger than those of traditional
cryptographic algorithms. This increase in key size is a significant consideration for
constrained devices, which often have limited memory and storage capacity. For example,
the key sizes for ML-DSA and ML-KEM are larger than those of RSA or ECDSA, which can lead to
increased memory usage and slower performance in constrained environments.</t>
        <t>The following table provides the key sizes of some instantiations of ML-DSA, ML-KEM, FN-DSA
and SLH-DSA. For comparision we also include the key sizes for X25519 and ED25519, which
are traditional schemes widely used in constrained environments.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Algorithm</th>
              <th align="left">Type</th>
              <th align="left">Size (bytes)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-DSA-65</td>
              <td align="left">Public Key</td>
              <td align="left">1952</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Private Key</td>
              <td align="left">4032</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Signature</td>
              <td align="left">3309</td>
            </tr>
            <tr>
              <td align="left">SLH-DSA-SHA2-192s</td>
              <td align="left">Public Key</td>
              <td align="left">48</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Private Key</td>
              <td align="left">96</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Signature</td>
              <td align="left">16224</td>
            </tr>
            <tr>
              <td align="left">FN-DSA-512</td>
              <td align="left">Public Key</td>
              <td align="left">897</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Private Key</td>
              <td align="left">1281</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Signature</td>
              <td align="left">666</td>
            </tr>
            <tr>
              <td align="left">ML-KEM-768</td>
              <td align="left">Public Key</td>
              <td align="left">1568</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Shared Secret</td>
              <td align="left">32</td>
            </tr>
            <tr>
              <td align="left">X25519</td>
              <td align="left">Public Key</td>
              <td align="left">32</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Shared Secret</td>
              <td align="left">32</td>
            </tr>
            <tr>
              <td align="left">Ed25519</td>
              <td align="left">Public Key</td>
              <td align="left">32</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">Signature</td>
              <td align="left">64</td>
            </tr>
          </tbody>
        </table>
        <t>Full key sizes for ML-DSA, ML-KEM, FN-DSA and SLH-DSA are specified in <xref target="ML-DSA"/>, <xref target="ML-KEM"/>, <xref target="FN-DSA"/>
and <xref target="SLH-DSA"/> respectively.</t>
      </section>
    </section>
    <section anchor="post-quantum-firmware-upgrades-for-constrained-devices">
      <name>Post-quantum Firmware Upgrades for Constrained Devices</name>
      <t>Constrained devices deployed in the field require periodic firmware upgrades to patch
security vulnerabilities, introduce new cryptographic algorithms, and improve overall
functionality. However, the firmware upgrade process itself can become a critical attack
vector if not designed to be post-quantum. If an adversary compromises the update
mechanism, they could introduce malicious firmware, undermining all other security
properties of the cryptographic modules. Therefore, ensuring a post-quantum firmware
upgrade process is critical for the security of deployed constrained devices.</t>
      <t>CRQCs pose an additional risk by breaking traditional digital signatures (e.g., RSA,
ECDSA) used to authenticate firmware updates. If firmware verification relies on
traditional signature algorithms, attackers could generate forged signatures in the future
and distribute malicious updates.</t>
      <section anchor="post-quantum-firmware-authentication">
        <name>Post-Quantum Firmware Authentication</name>
        <t>To ensure the integrity and authenticity of firmware updates, constrained devices will have to adopt PQC digital signature schemes for code signing.
These algorithms must provide long-term security, operate efficiently in low-resource environments, and be compatible with secure update mechanisms, such as the firmware update architecture for IoT described in <xref target="RFC9019"/>.</t>
        <t>The Software Updates for Internet of Things (SUIT) working group is defining mandatory-to-implement cryptographic algorithms for IoT devices in <xref target="I-D.ietf-suit-mti"/>, which recommends use of HSS/LMS <xref target="RFC8554"/> to secure software devices.</t>
        <t>Stateful hash-based signature schemes, such as HSS/LMS or the similar XMSS <xref target="RFC8391"/>, are good candidates for signing firmware updates. Those schemes offer efficient verification times, making them more practical choices for constrained environments where performance and memory usage are key concerns.
Their security is based on the security of the underlying hash function, which is well-understood.
A major downside of stateful hash-based signatures is the requirement to keep track of which One-Time Signature (OTS) keys have been reused, since reuse of a single OTS key allows for signature forgeries.
However, in the case of firmware updates, the OTS keys will be signing versioned updates, which may make state management easier.
<xref target="I-D.ietf-pquip-hbs-state"/> discusses various strategies for a correct state and backup management for stateful hash-based signatures.</t>
        <t>Other post-quantum signature algorithms may also be viable for firmware signing:</t>
        <ul spacing="normal">
          <li>
            <t>SLH-DSA, a stateless hash-based signature specified in <xref target="SLH-DSA"/>, also has well-understood security based on the security of its underlying hash function, and additionally doesn't have the complexities associated with state management that HSS and XMSS have.
However, signature generation and verification are comparatively slow, and signature sizes are generally larger than other post-quantum algorithms.
SLH-DSA's suitability as a firmware signing algorithm will depend on the capabilities of the underlying hardware.</t>
          </li>
          <li>
            <t>ML-DSA is a lattice-based signature algorithm specified in <xref target="ML-DSA"/>.
It is more performant than SLH-DSA, with significantly faster signing and verification times, as well as shorter signatures.
This will make it possible to implement on a wider range of constrained devices.
The mathematical problem underpinning ML-DSA, Module Learning With Errors (M-LWE), is believed to be a hard problem by the cryptographic community, and hence ML-DSA is believed to be secure.
Cryptographers are more confident still in the security of hash-based signatures than M-LWE, so developers may wish to factor that in when choosing a firmware signing algorithm.</t>
          </li>
        </ul>
      </section>
      <section anchor="hybrid-signature-approaches">
        <name>Hybrid Signature Approaches</name>
        <t>To enable secure migration from traditional to post-quantum security, hybrid signature methods can be used for
firmware authentication. Parallel signatures, where a traditional and a post-quantum signature are generated and
attached separately, is simple to implement, requires minimal changes to existing signing, and aligns well with
current secure boot and update architectures.</t>
        <t>Other hybrid techniques, such as cross-linked signatures (where signatures cover each other's values), composite signatures (which combine multiple signatures into a single structured signature), or counter-signatures (where one signature signs over another) introduce more complexity and are not yet typical in resource-constrained firmware workflows.</t>
      </section>
    </section>
    <section anchor="impact-of-pqc-authentication-on-constrained-devices">
      <name>Impact of PQC Authentication on Constrained Devices</name>
      <t>In constrained environments, devices are typically assumed to function as clients that initiate outbound connections,
authenticating to servers using certificates or raw public keys (<xref target="RFC7250"/>). However, some devices also serve in
server roles, enforcing local authentication policies. These scenarios require support for both outbound and inbound
authentication, and both roles face significant challenges when adopting post-quantum cryptography (PQC). Additionally,
verifying digital signatures such as during secure boot or firmware updates is a critical operation for constrained devices,
regardless of whether they act as clients or servers.</t>
      <t>While specific deployment scenarios may differ, the fundamental technical impacts of PQC authentication in constrained devices can be summarized into three main areas:</t>
      <ul spacing="normal">
        <li>
          <t>Larger Signatures and Certificate Sizes  </t>
          <t>
Post-quantum signature schemes typically produce much larger public keys and signatures than their traditional
 counterparts. A comparison is provided in <xref target="sec-key-sizes"/>.  </t>
          <t>
These larger artifacts introduce several challenges. For example, certificate chains with PQC public keys
 require more storage, and trust anchors - particularly for schemes like SLH-DSA - may be too large to embed in
 constrained ROM.  </t>
          <t>
Furthermore, validating signed payloads or commands increases network bandwidth requirements. In the case of large
 hash-based signatures, implementations may adopt streaming verification, where only parts of the message are
 processed at a time to reduce memory usage. An example of such an approach for SLH-DSA is described in
 <xref target="Stream-SPHINCS"/>.</t>
        </li>
        <li>
          <t>Increased RAM usage and performance profile.  </t>
          <t>
Post-quantum signature verification often demands significantly more RAM than traditional schemes used for
 asymmetric cryptography. For example, ML-DSA-65 in its high-performance configuration may require over 68 KB of
 memory during signing and up to 10 KB during verification on Cortex-M4-class devices.  </t>
          <t>
This poses challenges for use cases such as firmware verification (e.g. secure boot) and certificate validation
 during TLS handshakes or the generation of signed claims about the devices's hardware and software state, a process generally referred
 to as device attestation. As part of this remote attestation procedure <xref target="RFC9334"/>, the device will need to present such claims
 to a remote peer, signed using an attestation key. To remain secure against CRQCs, the attestation mechanism must also
 employ quantum-safe cryptographic primitives.  </t>
          <t>
Several memory-optimized implementations exist (see <xref target="BosRS22"/>), but they typically trade memory savings for
 slower performance. For instance, the ML-DSA.Sign operation can be implemented within 8 KB of RAM, though at
 the cost of significantly increased runtime. Conversely, ML-DSA.Verify can be performed in as little as 3 KB of
 RAM without a major performance penalty.  </t>
          <t>
Devices with 8 - 16 KB of available RAM must often balance performance against feasibility when integrating PQC
 signature verification.</t>
        </li>
      </ul>
      <t>When constrained devices must authenticate inbound connections, validate commands, or verify stored data, PQC authentication
imposes a burden that must be explicitly addressed through selection of schemes with smaller signature sizes (e.g. FN-DSA).
These choices should be aligned with the device’s operational profile, available memory, and longevity requirements.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations for key management in constrained devices for PQC focus on the
secure storage and handling of cryptographic seeds, which are used to derive private keys.
Seeds must be protected with the same security measures as private keys, and key
derivation should be efficient and secure within resource-constrained cryptographic
module. Secure export and backup mechanisms for seeds are essential to ensure recovery in
case of hardware failure, but these processes must be encrypted and protected from
unauthorized access.</t>
      <section anchor="side-channel-protection">
        <name>Side Channel Protection</name>
        <t>Side-channel attacks exploit physical leaks during cryptographic operations, such as timing information, power consumption, electromagnetic emissions, or other physical characteristics, to extract sensitive data like private keys or seeds. Given the sensitivity of the seed and private key in PQC key generation, it is critical to consider side-channel protection in cryptographic module design. While side-channel attacks remain an active research topic, their significance in secure hardware design cannot be understated. Cryptographic modules must incorporate strong countermeasures against side-channel vulnerabilities to prevent attackers from gaining insights into secret data during cryptographic operations.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Jean-Pierre Fiset, Richard Kettlewell, Mike Ounsworth, and Aritra Banerjee for
the detailed review.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3394">
          <front>
            <title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3394"/>
          <seriesInfo name="DOI" value="10.17487/RFC3394"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://doi.org/10.1109/IEEESTD.2018.8423794">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="ML-KEM" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="ML-DSA" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="REC-SHS" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Scheme</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BIND" target="https://eprint.iacr.org/2024/523.pdf">
          <front>
            <title>Unbindable Kemmy Schmid</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLH-DSA" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS-205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HQC" target="https://pqc-hqc.org">
          <front>
            <title>Hamming Quasi-Cyclic</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FN-DSA" target="https://falcon-sign.info/falcon.pdf">
          <front>
            <title>Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Stream-SPHINCS" target="https://eprint.iacr.org/2021/1072.pdf">
          <front>
            <title>Streaming SPHINCS+ for Embedded Devices using the Example of TPMs</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BosRS22" target="https://eprint.iacr.org/2022/323.pdf">
          <front>
            <title>Dilithium for Memory Constrained Devices</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="REC-KEM" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-227.ipd.pdf">
          <front>
            <title>Recommendations for Key-Encapsulation Mechanisms</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-kyber-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)</title>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a
   quantum-resistant key-encapsulation mechanism (KEM).  This document
   specifies the conventions for using the ML-KEM in X.509 Public Key
   Infrastructure.  The conventions for the subject public keys and
   private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-kyber-certificates-11"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="I-D.ietf-suit-mti">
          <front>
            <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
              <organization>Nordic Semiconductor</organization>
            </author>
            <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
              <organization>Openchip &amp; Software Technologies, S.L.</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   The SUIT manifest, as defined in "A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices" (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   "A Firmware Update Architecture for Internet of Things" (RFC 9019).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hbs-state">
          <front>
            <title>Hash-based Signatures: State and Backup Management</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Stefan Kölbl" initials="S." surname="Kölbl">
              <organization>Google</organization>
            </author>
            <author fullname="Jim Goodman" initials="J." surname="Goodman">
              <organization>Crypto4A Technologies</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   Stateful Hash-Based Signature Schemes (S-HBS) such as LMS, HSS, XMSS
   and XMSS^MT combine Merkle trees with One-Time Signatures (OTS) to
   provide signatures that are resistant against attacks using large-
   scale quantum computers.  Unlike conventional stateless digital
   signature schemes, S-HBS have a state to keep track of which OTS keys
   have been used, as double-signing with the same OTS key allows
   forgeries.

   This document provides guidance and documents security considerations
   for the operational and technical aspects of deploying systems that
   rely on S-HBS.  Management of the state of the S-HBS, including any
   handling of redundant key material, is a sensitive topic, and we
   discuss some approaches to handle the associated challenges.  We also
   describe the challenges that need to be resolved before certain
   approaches should be considered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
