<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-pquip-pqc-signature-migration-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Signature Migration Guidance">Guidance for Migration to Composite, Dual, or PQC Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-pquip-pqc-signature-migration-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="14"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document provides guidance for migration from traditional digital
signature algorithms to post-quantum cryptographic (PQC) signature
algorithms. It compares three models under discussion in the IETF for
PKI-based protocols: composite certificates, dual
certificates, and PQC certificates. The goal is to help operators
and engineers working on cryptographic libraries, network security, and
PKI/key management infrastructure select an approach that balances
interoperability, security, and operational efficiency during the
transition to post-quantum authentication.</t>
    </abstract>
  </front>
  <middle>
    <?line 67?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The emergence of cryptographically relevant quantum computer (CRQC) poses a
threat to widely deployed public-key algorithms such as RSA and elliptic-curve
cryptography (ECC). Post-quantum algorithms are being standardized by NIST
and other bodies, but migration is not immediate. In the meantime, protocols
need to ensure that authentication mechanisms remain secure against both
classical and quantum adversaries.</t>
      <t>For data authentication, the primary concern is that adversaries who obtain a
CRQC will be able to forge digital signatures produced by traditional
public-key algorithms (e.g., RSA, ECDSA). Such forgeries enable a
range of attacks, including on-path man-in-the-middle (MitM)
attacks, and off-path attacks such as software-artifact forgery, and client
impersonation in mutual TLS when a client private key is compromised. In addition,
on-path adversaries can attempt active downgrade techniques (for example,
suppressing PQC or hybrid signature schemes during negotiation) to force reliance on
broken traditional algorithms. PQC or Hybrid certificates do not by themselves
prevent downgrade attack when relying parties continue to accept traditional-only
certificates. These risks motivate a transition of certificate-based authentication
toward post-quantum security.</t>
      <t>The IETF has defined two hybrid transition models for use in TLS, IKEv2/IPsec,
JOSE/COSE, and PKIX:</t>
      <ul spacing="compact">
        <li>
          <t>Composite certificates: A single X.509 certificate that contains a composite
public key and a composite signature, combining a traditional and a PQC algorithm.
Certificates using composite ML-DSA are specified in <xref target="COMPOSITE-ML-DSA"/>.</t>
        </li>
        <li>
          <t>Dual-certificate model: A deployment model in which two separate certificates, one using a traditional
algorithm and one using a PQC algorithm, issued for the same identity, presented and validated together
during authentication. Some protocols may require these certificates to include the RelatedCertificate extension <xref target="RELATED-CERTS"/> to ensure that both refer to the same identity and binding.</t>
        </li>
      </ul>
      <t>Another approach is to use a PQC certificate which contains only a post-quantum
public key and produces signatures using a PQC algorithm. Examples include <xref target="ML-DSA"/>
and <xref target="SLH-DSA"/>.</t>
      <t>This document provides guidance on selecting among the two hybrid
certificate models and the PQC model depending on the deployment
context, the readiness of the supporting ecosystem, and security
requirements.</t>
      <t>It is important to note that the use of PQC certificates, composite
certificates, or the dual-certificate model alone does not guarantee
post-quantum security. As long as relying parties continue to trust or
accept traditional-only certificates, an attacker equipped with a CRQC
can forge traditional certificates and impersonate an authenticated
party, even if that party does not use a traditional certificate. Post-quantum security
is achieved only when relying parties enforce policies that reject
traditional-only authentication.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms "composite certificates" and "PQC certificates"
as defined in <xref target="intro"/>.</t>
      <t>The term "dual certificates" in this document refers to the
dual-certificate model as defined in <xref target="intro"/>.</t>
      <t>Composite: A key, certificate, or signature that merges traditional
and PQC algorithms into one object.</t>
      <t>The terms hybrid signature scheme and hybrid signature are used as
defined in <xref target="HYBRID-SPECTRUMS"/>.</t>
      <t>The term hybrid certificates is used herein to refer to either
composite or dual certificate models.</t>
      <t>Relying Party:  An endpoint which validates the certificate of a remote peer.
With classic HTTPS authentication, this is the HTTPS client.  With mutual TLS
authentication, this is both TLS endpoints.</t>
      <t>Authenticated Party: An endpoint which provides its certificate for a
remote peer to validate.  With classic HTTPS authentication, this is the HTTPS
server.  With mutual TLS authentication, this is both TLS endpoints.</t>
    </section>
    <section anchor="motivation-for-pqc-signatures">
      <name>Motivation for PQC Signatures</name>
      <t>Unlike "Harvest Now, Decrypt Later" attacks (see <xref section="7" sectionFormat="of" target="PQC-ENGINEERS"/>)
that target the confidentiality of encrypted data, the threat to authentication arises
only from the moment a CRQC becomes available. Compromise of authentication
is therefore not retrospective: previously established identities and signatures
cannot be forged in hindsight, but all future authentications using traditional
algorithms become insecure once a CRQC exists.</t>
      <t>Once a CRQC is available, continued reliance on traditional public-key
algorithms (e.g., RSA, ECDSA) becomes untenable, as an attacker could forge
digital signatures and impersonate legitimate entities. In practice, the
availability of a CRQC may not be publicly disclosed. Similar to a zero-day
vulnerability, an adversary could exploit quantum capabilities privately to
compromise traditional certificates without alerting the wider ecosystem.</t>
      <t>Addressing this risk requires replacing traditional signatures with
post-quantum (PQC) signatures.  Doing so entails ecosystem-wide upgrades across:</t>
      <ul spacing="compact">
        <li>
          <t>Software components: cryptographic libraries and protocol
implementations;</t>
        </li>
        <li>
          <t>Hardware security devices: Hardware Security Modules (HSMs) and
Trusted Platform Modules (TPMs);</t>
        </li>
        <li>
          <t>Public Key Infrastructure (PKI): Certification Authorities (CAs),
intermediate CAs, and trust anchors;</t>
        </li>
        <li>
          <t>Dependent protocols: TLS (<xref target="TLS"/>, <xref target="DTLS"/>), <xref target="IKEv2"/>, and JOSE/COSE.</t>
        </li>
      </ul>
      <t>Because these transitions require years of planning, coordination, and
investment, preparations must begin well before a CRQC is publicly known.</t>
      <t>PQC or hybrid certificates provide post-quantum security only when relying parties
reject traditional-only certificates (see <xref target="downgrade"/>). The implications of this requirement differ
across deployment environments:</t>
      <ul spacing="compact">
        <li>
          <t>Open environments (e.g., the Web):
Enforcing rejection of traditional-only certificates would cause substantial disruption
due to the wide diversity of clients and servers. As discussed in <xref target="downgrade"/>, there
will be no single “flag day” for PQC authentication; instead, relying parties
will have to adopt PQC enforcement gradually, using mechanisms such as continuity signals
or learned authenticated party behavior to resist downgrades while maintaining
compatibility during the transition.</t>
        </li>
        <li>
          <t>Closed or enterprise-managed environments:
In deployments where both the authenticated party and the relying party
are managed by the same organization, enforcing PQC or hybrid authentication
policies is operationally feasible. Organizations can coordinate certificate issuance
and validation policies centrally, enabling earlier transition to PQC or hybrid
models without affecting interoperability.</t>
        </li>
        <li>
          <t>mixed environments</t>
        </li>
      </ul>
      <t>In environments where a relying party visits authenticated parties that have a mix of quantum-safe and traditional authentication, and administrators or users need to protect against downgrade attacks (<xref target="downgrade"/>), relying parties will need the configurations that are per-domain or per-FQDN. Such mixed environments will likely be the long tail.</t>
    </section>
    <section anchor="composite-certificates">
      <name>Composite certificates</name>
      <t>A composite certificate contains a composite public key and a composite
signature, each combining a traditional and a post-quantum (PQC) algorithm
within a single X.509 structure. Both the key and the signature use new
encodings defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, and
therefore composite certificates do not offer interoperability with
legacy PKI deployments. The goal is of the composite approach is
defense-in-depth: the traditional component preserves authentication
security if a flaw is found in the PQC algorithm before a CRQC exists,
while the PQC component preserves security after CRQCs can break traditional
algorithms. Verification succeeds only if all component signatures validate
over the same canonical message.</t>
      <t>ML-DSA composite certificates are defined in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which defines the use of ML-DSA
in combination with one or more traditional algorithms such as
RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448. The framework in that
document is designed to be extensible and is expected to accommodate
additional post-quantum algorithms in future specifications.</t>
      <t>Protocol-specific drafts describe how composite certificates are used in
different environments, including:
<xref target="TLS-COMPOSITE-ML-DSA"/> for TLS,
<xref target="IKEv2-COMPOSITE-ML-DSA"/> for IKEv2,
and <xref target="JOSE-COSE-COMPOSITE-ML-DSA"/> for JOSE and COSE.
In each case, the relying party validates a single certification path
anchored in a multi-algorithm trust anchor, avoiding the need for
parallel certificate chains.</t>
      <section anchor="advantages">
        <name>Advantages</name>
        <t>A key benefit of the composite model is single-path operation. Because both
algorithms are embedded in one certificate chain, the relying party validates
only one path, which reduces chain-management complexity compared to dual-chain
deployments. Conveying a single certificate and signature object can also
reduce message size relative to transmitting two independent chains. From a
protocol perspective, composite certificates typically require minimal changes
to handshakes, since authentication still relies on one certificate and one signature.</t>
      </section>
      <section anchor="disadvantages">
        <name>Disadvantages</name>
        <t>The main challenge with composite certificates is ecosystem readiness.
Clients, servers, and Certification Authorities must support composite
public keys and composite signature verification, which are not yet
widely deployed. The new certificate encodings and multi-algorithm
signing introduce updates across PKI components, libraries, and Hardware
Security Modules. Once these components support the composite structures,
using a composite signature algorithm is no more complex than adopting
any new PQC algorithm.</t>
        <t>Another operational limitation is the need for algorithm-set
coordination: all participants in a composite ecosystem must agree on
the specific and acceptable combinations of post-quantum and traditional
algorithms (for example, ML-DSA-44 + ECDSA P-256 or ML-DSA-65 + EdDSA Ed448).
A composite certificate can only be validated if both endpoints and all
intermediate CAs recognize the same algorithm identifiers and policy.
Disagreement on permitted combinations can lead to handshake failures,
certificate re-issuance delays, or policy fragmentation across vendors.
This is primarily a policy and interoperability issue during early deployment:
once endpoints and CAs recognize the same algorithm identifiers and policies,
a composite algorithm behaves like any other registered signature algorithm.</t>
        <t>Composite deployments are also an intermediate step: once traditional
algorithms are deprecated due to CRQCs, operators will still need to
transition from composite to PQC certificates. This requires
deploying new PQC trust anchors, issuing PQC certificates, and
revoking composite certificates. While automated mechanisms such as
ACME or CMP can streamline end-entity certificate issuance, trust anchors are
typically distributed through OS, Browser, or device
update mechanisms, and their replacement generally requires
platform-specific processes. As a result, for some organizations, this
two-stage path may lengthen the overall migration.</t>
      </section>
    </section>
    <section anchor="dual-certificates">
      <name>Dual Certificates</name>
      <t>Dual certificates rely on issuing two separate certificates for the same
identity: one using a traditional algorithm (for example, RSA or ECDSA)
and one using a post-quantum algorithm (for example, ML-DSA). Both
certificates are presented and validated during authentication,
providing hybrid assurance without introducing new certificate formats
or encodings.</t>
      <section anchor="advantages-1">
        <name>Advantages</name>
        <t>A major advantage of the dual-certificate model is its negotiation
flexibility. Because each certificate contains only a single algorithm,
endpoints do not need to agree in advance on a specific combination of
traditional and post-quantum algorithms. The server can select which
certificate (or both) to present based on the client's advertised
capabilities, and the client can validate whichever chain it supports.
This enables smoother incremental deployment and interoperation between
implementations that support different PQC algorithms or security
policies.</t>
        <t>Dual certificates also use standard X.509 structures and single-algorithm
chains, maximizing compatibility with existing PKI and avoiding changes
to certificate parsing or signature verification logic. The clear separation
between traditional and PQC keys simplifies operational control, audit,
and incident response. Deployments can move from traditional-only to dual
certificates, and later retire the traditional certificate when PQC support
is ubiquitous, without redefining certificate formats or introducing composite
encodings. The model also fits well in multi-tenant environments where
different tenants or business units may adopt different combinations of
traditional and PQC algorithms without requiring global agreement on a
composite set.</t>
      </section>
      <section anchor="disadvantages-1">
        <name>Disadvantages</name>
        <t>The dual-certificate model increases protocol overhead, since both
certificate chains and signatures must be transmitted and validated.
Protocols that traditionally authenticate a single certificate chain,
such as <xref target="TLS"/> and <xref target="IKEv2"/>, require
extensions to support validation of two end-entity certificates and to
ensure that both are cryptographically bound to the same identity.
This adds implementation complexity and may increase handshake latency.</t>
        <t>Managing two distinct certificate chains introduces operational cost and
new failure modes. Debugging becomes more difficult, as validation
errors may originate from either chain or from inconsistent identity
binding. Operators must also obtain and renew two certificates from
Certification Authorities, which can be significant in large-scale
deployments.</t>
        <t>Finally, while dual certificates avoid the need for a fixed algorithm
pairing, they require explicit binding and coordination between the
two chains. Each relying party must verify that the traditional and PQC
certificates correspond to the same entity, typically using mechanisms
such as the RelatedCertificate extension <xref target="RELATED-CERTS"/>.
Lack of consistent binding policies can lead to interoperability issues
and potential downgrade risks if only one chain is validated.</t>
      </section>
    </section>
    <section anchor="pqc-certificates">
      <name>PQC Certificates</name>
      <t>PQC certificates represent the final stage of migration.
They use exclusively post-quantum cryptographic algorithms for both
public keys and signatures, providing no fallback to traditional
algorithms.  Once adopted at scale, they eliminate hybrid complexity and
rely entirely on quantum-resistant primitives for authentication.</t>
      <section anchor="advantages-2">
        <name>Advantages</name>
        <t>The PQC model offers the simplest and most forward-looking
architecture. It removes all dependency on classical algorithms, thus
avoiding future deprecation or phased-out support for RSA and ECC.
Certificate management is streamlined, as there is only one algorithm
family to provision, monitor, and renew. Operational overhead decreases
compared to dual deployments, since each entity maintains a
single certificate chain and consistent cryptographic policy.</t>
        <t>PQC certificates also enable long-term assurance: the entire
certificate path is verifiable using post-quantum signatures, ensuring
uniform resistance against quantum adversaries.</t>
      </section>
      <section anchor="disadvantages-2">
        <name>Disadvantages</name>
        <t>The primary risk of PQC deployments is algorithmic fragility. If a
vulnerability or cryptanalytic weakness is discovered in a deployed PQC
scheme, there is no classical fallback for continued authentication.
Protocols and infrastructures must therefore maintain strong
crypto-agility and be prepared to replace algorithms rapidly if needed.</t>
        <t>Backward compatibility can be maintained if the authenticated party also
holds a traditional certificate and presents it to relying parties
that have not yet deployed PQC support. While this approach preserves
interoperability during the transition, it also introduces downgrade risk:
an attacker could suppress PQC options and force peers to authenticate
using the traditional certificate.</t>
        <t>PQC operation where traditional algorithms are completely removed
eliminates this downgrade vector, but it is feasible only once relying
parties enforce PQC–only authentication.</t>
        <t>Adoption may also be uneven across jurisdictions. Regulatory frameworks
and certification programs may not recognize the same PQC
algorithms at the same time. Divergent compliance regimes could delay
global deployment or require organizations operating in multiple
regions to maintain mixed trust infrastructures until regulatory
alignment is achieved.</t>
        <t>Finally, PQC deployments remain feasible only once PQC algorithms
are fully standardized, broadly implemented, and supported by hardware
security modules, operating systems, and major application ecosystems.</t>
      </section>
    </section>
    <section anchor="operational-and-ecosystem-considerations">
      <name>Operational and Ecosystem Considerations</name>
      <t>Migration to post-quantum authentication requires addressing broader
ecosystem dependencies, including trust anchors, hardware security modules,
and constrained devices.</t>
      <section anchor="trust-anchors-and-transitions">
        <name>Trust Anchors and Transitions</name>
        <t>Trust anchors represent the ultimate root of trust in a PKI. If existing
trust anchors are RSA or ECC-based, then new PQC-capable trust anchors will
need to be distributed. Operators will have to plan for a phased introduction of
PQC trust anchors, which may involve:</t>
        <ul spacing="compact">
          <li>
            <t>Rolling out composite trust anchors that support both traditional and PQC
signatures.</t>
          </li>
          <li>
            <t>Establishing parallel trust anchor hierarchies and phasing out the
traditional hierarchy once PQC adoption is universal.</t>
          </li>
          <li>
            <t>Ensuring secure and authenticated distribution of updated trust anchors
to clients, especially devices that cannot be easily updated.</t>
          </li>
        </ul>
        <t>Deployments migrating from traditional to post-quantum authentication
may have to operate with multiple trust anchors for a period of time.
A new PQC or composite root may be introduced, or alternatively a PQ
intermediate may be added beneath an existing traditional root,
leading to different trust chain models:</t>
        <ul spacing="compact">
          <li>
            <t>Traditional chain: anchored in a Traditional root (e.g., RSA/ECDSA),
which may issue a PQC intermediate.</t>
          </li>
          <li>
            <t>PQC chain: anchored in a PQC root (e.g., ML-DSA, SLH-DSA).</t>
          </li>
          <li>
            <t>Parallel roots: both a traditional root and a PQC root are distributed as
trust anchors, with separate hierarchies operating in parallel until the
traditional root can be phased out.</t>
          </li>
          <li>
            <t>Composite chain: anchored in a composite root and using composite
algorithms, with a single certificate chain that combines traditional and
PQC public keys and signatures. This forms a distinct chain, rather
than two parallel ones.</t>
          </li>
        </ul>
        <t>During this coexistence phase, clients generally fall into five categories:</t>
        <ol spacing="compact" type="1"><li>
            <t>Legacy-only: trust only traditional roots and support only
traditional algorithms.</t>
          </li>
          <li>
            <t>Mixed: trust only traditional roots but support both traditional and
PQC algorithms. These clients can validate PQC certificates only if a PQC
intermediate is cross-signed by a traditional root.</t>
          </li>
          <li>
            <t>Dual-trust: trust both traditional and PQC roots, supporting both
algorithm families.</t>
          </li>
          <li>
            <t>Composite-trust: trusts composite root and support composite
algorithms, validating a single chain that integrates traditional and PQ
signatures.</t>
          </li>
          <li>
            <t>PQC: trust only PQC roots and support only PQC algorithms.</t>
          </li>
        </ol>
        <t>The main challenge is that servers cannot easily distinguish between mixed
clients (2) and dual-trust clients (3), since both advertise PQC algorithms,
but only dual-trust clients actually recognize PQC roots. To ensure
compatibility with mixed clients (2), servers may default to sending longer
PQC chains that include a cross-signed PQC root (i.e., a PQC root certificate
signed by a traditional root). However, this is unnecessary and even counterproductive
for dual-trust clients (3), which already trust the PQC root directly;
such clients will fail to validate the cross-signed PQC root. For dual-trust clients,
including the cross-signed PQC root only increases message size and introduces
validation errors.</t>
        <t><xref target="I-D.ietf-tls-trust-anchor-ids"/> (TAI) addresses this problem by allowing
clients to indicate, on a per-connection basis, which trust anchors they
recognize. Servers can use that information to select a compatible certificate
chain, reducing unnecessary chain elements and providing operators with better
telemetry on PQC adoption. TAI also enables PQC-capable clients to tell PQC-aware
servers exactly which PQC trust anchors they recognize, while still supporting
traditional roots for compatibility with legacy servers.</t>
        <t>In all cases, the long-term goal is a transition to PQC roots and
certificate chains. Hybrid signature schemes help bridge
the gap, but operators will have to plan carefully for the eventual retirement of
traditional and composite roots once PQC adoption is widespread.</t>
      </section>
      <section anchor="multiple-transitions-and-crypto-agility">
        <name>Multiple Transitions and Crypto-Agility</name>
        <t>Post-quantum migration is not a single event. There may be multiple
transitions over time, as:</t>
        <ul spacing="compact">
          <li>
            <t>Traditional signature algorithms are gradually retired.</t>
          </li>
          <li>
            <t>Initial PQC signature algorithms are standardized and deployed.</t>
          </li>
          <li>
            <t>New PQC signature algorithms may replace early ones due to cryptanalysis or
efficiency improvements.</t>
          </li>
        </ul>
        <t>Protocols and infrastructures will have to be designed with crypto-agility in mind,
supporting:</t>
        <ul spacing="compact">
          <li>
            <t>Negotiation of standalone PQC algorithms and hybrid signature schemes.</t>
          </li>
          <li>
            <t>Phased migration paths, including initial use of hybrid signature schemes,
eventual transition to PQC certificates, and later migration
to new PQC algorithms as cryptanalysis or security policy guidance evolves.</t>
          </li>
        </ul>
      </section>
      <section anchor="support-from-hardware-security-modules-hsms">
        <name>Support from Hardware Security Modules (HSMs)</name>
        <t>Many organizations rely on HSMs for secure key storage and operations.
Challenges include:</t>
        <ul spacing="compact">
          <li>
            <t>HSMs must be upgraded to support PQC algorithms and, where relevant,
composite or dual key management models.</t>
          </li>
          <li>
            <t>PQC algorithms often have larger key sizes and signatures, requiring
sufficient memory and processing capability in HSMs.</t>
          </li>
          <li>
            <t>For dual certificate deployments, HSMs can manage the underlying
traditional and PQC private keys independently, and no API changes are
required. The security protocol is responsible for coordinating how
signatures from both keys are used. By contrast, supporting composite
keys and composite signing operations will require HSM and API extensions
to represent composite private keys and perform multi-algorithm signing
atomically.</t>
          </li>
        </ul>
        <t>Without HSM vendor support for PQC, migration may be delayed or require
software-based fallback solutions, which will weaken security.</t>
      </section>
      <section anchor="constrained-devices-and-iot-environments">
        <name>Constrained Devices and IoT Environments</name>
        <t>Constrained environments, such as IoT devices, present unique challenges
for PQC deployment due to limited processing, memory, and bandwidth.
Guidance is provided in <xref target="I-D.ietf-pquip-pqc-hsm-constrained"/>, including
the use of seeds for efficient key generation, PQC-protected firmware
updates, and other techniques for enabling PQC in lightweight HSMs and
resource-constrained devices.</t>
      </section>
    </section>
    <section anchor="transition-considerations">
      <name>Transition Considerations</name>
      <t>Migration to post-quantum authentication will proceed gradually across
protocols, products, and organizations. During this period, endpoints
may support multiple authentication models (traditional, composite,
dual, or PQC) depending on their stage of deployment. The
transition requires careful coordination of certificate management,
protocol negotiation, and policy enforcement to maintain security and
interoperability throughout the migration.</t>
      <section anchor="transition-logic-overview">
        <name>Transition Logic Overview</name>
        <t>The migration to post-quantum authentication will occur in phases as
organizations adopt PQC algorithms and update their infrastructures.
Because CRQCs may be deployed without public disclosure, continued
reliance on traditional algorithms will become increasingly risky.
During the transition, dual certificates enable interoperability between
PQC-capable and legacy systems, while composite certificates provide
hybrid authentication within upgraded ecosystems. These approaches serve
as intermediate steps toward PQC deployments. Post-quantum security
is achieved only when relying parties stop accepting traditional-only
authentication. At that point, authenticated parties can also stop
issuing or presenting traditional-only certificates.</t>
      </section>
      <section anchor="negotiation-and-interoperability">
        <name>Negotiation and Interoperability</name>
        <t>During coexistence, endpoints must be able to discover which
authentication mechanisms the peer supports. In most protocols, this is
achieved through existing negotiation mechanisms such as, the
<tt>signature_algorithms</tt> extension in <xref target="TLS"/>. Clients
advertise their supported algorithms and certificate types, and servers
select the strongest mutually supported option or fail authentication if
no common algorithm is found.</t>
        <t>In hybrid or PQC-capable deployments, there is no security benefit if
authentication using only traditional algorithms continues to be
accepted, since an attacker can always downgrade to that option.
The specific choice between PQC and hybrid mechanisms may be influenced
by regulatory guidance, national cryptography policies, or the organization's
appetite for defense-in-depth during early adoption.</t>
        <t>Negotiation mechanisms must also include downgrade protection so
that an adversary cannot suppress PQC or hybrid options and force a
fallback to traditional signatures (see <xref target="downgrade"/>). TLS already provide such
protection through transcript binding of the handshake messages that
carry the algorithm negotiation results, but new or proprietary protocols
have to ensure similar safeguards.</t>
        <t>A deployment will typically adopt one of three models, PQC certificates,
dual certificates, or composite certificates.</t>
        <t>The choice depends on several factors, including:</t>
        <ul spacing="compact">
          <li>
            <t>Frequency and duration of system upgrades</t>
          </li>
          <li>
            <t>The expected timeline for CRQC availability</t>
          </li>
          <li>
            <t>Operational flexibility to deploy, enable, and retire PQC algorithms</t>
          </li>
          <li>
            <t>Availability of automated certificate provisioning mechanisms such as <xref target="ACME"/> and <xref target="CMP"/></t>
          </li>
        </ul>
        <t>Deployments with limited flexibility benefit from hybrid signature schemes.
These approaches mitigate risks associated with delays in
transitioning to PQC and provide an immediate safeguard against zero-day
vulnerabilities. Both approaches improve resilience during migration, but
they do so in different ways and carry different operational trade-offs.</t>
        <t>Hybrid signature schemes enhance resilience during the adoption of
PQC by:</t>
        <ul spacing="compact">
          <li>
            <t>Providing defense in depth: security is maintained as long as either
the PQC or traditional algorithm remains unbroken.</t>
          </li>
          <li>
            <t>Reducing exposure to unforeseen vulnerabilities: immediate protection
against weaknesses in PQC algorithms.</t>
          </li>
        </ul>
        <t>However, each approach comes with long-term implications.</t>
      </section>
      <section anchor="composite-certificates-1">
        <name>Composite Certificates</name>
        <t>Composite certificate embeds both a traditional and a PQC algorithm into a
single certificate and signature. However, once a traditional algorithm is no
longer secure against CRQCs, it will have to be deprecated. For discussion
of the security impact in security protocols, such as TLS and IKEv2,
versus artifact-signing use cases, see <xref target="suf"/>.</t>
        <t>To complete the transition to a fully quantum-resistant authentication model,
operators will need a PQC CA root and CA intermediates, resulting in PQC
end-entity certificates.</t>
        <t>Protocol configurations will likewise need to be updated to negotiate only
PQC-based authentication, ensuring that the entire certification path and
protocol handshake are cryptographically resistant to quantum attacks and
no longer depend on any traditional algorithms.</t>
      </section>
      <section anchor="dual-certificates-1">
        <name>Dual Certificates</name>
        <t>When CRQCs become available, the traditional certificate chain will no
longer provide secure authentication. At that point, relying parties
must stop accepting or requesting traditional certificate chains and
validate only PQC-based chains. Authenticated parties will automatically
cease using traditional chains once relying parties no longer request
them. Dual-certificate deployments therefore defer, but
do not avoid, the eventual migration to a PQC environment.</t>
      </section>
      <section anchor="suf">
        <name>Loss of Strong Unforgeability in Composite and Dual Certificates</name>
        <t>A deployment may choose to continue using a composite or dual certificate
configuration even after a traditional algorithm has been broken by the
advent of a CRQC. While this may simplify operations by avoiding
re-provisioning of trust anchors, it introduces a significant risk:
security properties degrade once one component of the hybrid is no longer
secure.</t>
        <t>In composite certificates, the composite signature will no longer achieve Strong
Unforgeability under chosen message attack (SUF-CMA) (see <xref section="10.1.1" sectionFormat="of" target="PQC-ENGINEERS"/>
and <xref section="10.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>). A CRQC can forge the
broken traditional signature component (s1<em>) over a message (m). That forged
component can then be combined with the valid post-quantum component (s2) to
produce a new composite signature (m, (s1</em>, s2)) that verifies successfully,
thereby violating SUF-CMA.</t>
        <t>In dual certificate deployments where the client requires both a
traditional and a PQC chain, the SUF-CMA property is likewise not achieved once
the traditional algorithm is broken.</t>
        <t>In protocols such as TLS and IKEv2, a composite signature remains
secure against impersonation as long as at least one component algorithm
remains unbroken, because verification succeeds only if every
component signature validates over the same canonical message defined
by the authentication procedure. However, in artifact signing
use cases, the break of a single component does not enable forgery of a
composite signature but does enable "repudiation": multiple distinct
composite signatures can exist for the same artifact, undermining the
"one signature, one artifact" guarantee. This creates ambiguity about
which composite signature is authentic, complicating long-term
non-repudiation guarantees.</t>
        <t>Hybrid signature schemes should not be used for artifact signing (such as software packages),
since the loss of SUF-CMA makes them unsuitable for long-term non-repudiation.
In security protocols, hybrid signature schemes may continue to
function for a limited time after a CRQC is realized, since they still provide
impersonation resistance as long as one component algorithm remains secure.
This situation does not constitute a zero-day vulnerability requiring an
immediate upgrade. However, operators will have to plan an orderly migration
to PQC certificates in order to restore SUF-CMA security guarantees.</t>
      </section>
    </section>
    <section anchor="migration-guidance">
      <name>Migration Guidance</name>
      <ul spacing="compact">
        <li>
          <t>Long-term to adopt and deploy:: Dual certificates have been standardized in
<xref target="RFC9763"/>. However, at the time of writing, none of
the security protocols (e.g., TLS, IKEv2, JOSE/COSE) have
adopted this mechanism. The proposals are being discussed in IKEv2
(<xref target="I-D.hu-ipsecme-pqt-hybrid-auth"/>), TLS
(<xref target="I-D.yusef-tls-pqt-dual-certs"/>), and in the form of paired
certificates with a single certificate
(<xref target="I-D.bonnell-lamps-chameleon-certs"/>).</t>
        </li>
        <li>
          <t>Medium-term to adopt and deploy: Composite certificates become viable once
ecosystem support across PKIX, IPsec, JOSE/COSE, and TLS is mature.
Composite ML-DSA is already being standardized in the LAMPS WG
(<xref target="I-D.ietf-lamps-pq-composite-sigs"/>) and leveraged in
<xref target="I-D.reddy-tls-composite-mldsa"/> for TLS,
<xref target="I-D.hu-ipsecme-pqt-hybrid-auth"/> for IPsec/IKEv2, and
<xref target="I-D.prabel-jose-pq-composite-sigs"/> for JOSE/COSE.</t>
        </li>
        <li>
          <t>Long-to-medium term to adopt and deploy: PQC certificates are the final goal, once PQ
algorithms are well-established, trust anchors have been updated,
HSMs and devices support PQC operations, and traditional
algorithms are fully retired. Work to enable PQC signatures is already
underway in JOSE/COSE <xref target="I-D.ietf-cose-dilithium"/>, TLS <xref target="I-D.ietf-tls-mldsa"/>,
and IPsec <xref target="I-D.ietf-ipsecme-ikev2-pqc-auth"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="use-of-slh-dsa-in-pqc-only-deployments">
      <name>Use of SLH-DSA in PQC-Only Deployments</name>
      <t>SLH-DSA does not introduce any new hardness assumptions beyond those inherent
to its underlying hash functions. It builds upon established cryptographic
foundations, making it a reliable and robust digital signature scheme for a
post-quantum world. While attacks on lattice-based schemes such as ML-DSA are
currently hypothetical, if realized they could compromise the security of those
schemes. SLH-DSA would remain unaffected by such attacks due to its distinct
mathematical foundations, helping to ensure the ongoing security of systems and
protocols that rely on it for digital signatures. Unlike ML-DSA, SLH-DSA is not
defined for use in composite certificates and is intended to be deployed directly
in PQC certificate hierarchies.</t>
      <t>SLH-DSA may be used for both end-entity and CA certificates. It provides strong
post-quantum security but produces larger signatures than ML-DSA or traditional
algorithms. At security levels 1, 3, and 5, two parameter sets are available:</t>
      <ul spacing="compact">
        <li>
          <t>"Small" (s) variants minimize signature size, ranging from 7856 bytes
(128-bit) to 29792 bytes (256-bit).</t>
        </li>
        <li>
          <t>"Fast" (f) variants optimize key generation and signing speed, with
signature sizes from 17088 bytes (128-bit) to 29792 bytes (256-bit),
but slower verification performance.</t>
        </li>
      </ul>
      <t>Because of these large signatures, SLH-DSA will increase handshake size in
protocols such as TLS 1.3 or IKEv2. However, the impact on performance is
minimal for long-lived connections or large data transfers, where handshake
overhead is amortized over session duration (e.g., DTLS-in-SCTP in 3GPP N2
interfaces, or signature authentication in IKEv2 using PQC
<xref target="I-D.ietf-ipsecme-ikev2-pqc-auth"/>).</t>
      <t>In deployments where minimizing handshake size is critical, operators may
prefer SLH-DSA for root and intermediate certificates while using smaller-
signature algorithms (e.g., ML-DSA) in end-entity certificates or in the
"CertificateVerify" message.</t>
      <t>Mechanisms such as Abridged TLS Certificate Chains <xref target="I-D.ietf-tls-cert-abridge"/> and
Suppressing CA Certificates <xref target="I-D.kampanakis-tls-scas-latest"/> reduce handshake size
by limiting certificate exchange to only end-entity certificates. In such cases,
intermediate certificates are assumed to be known to the peer, allowing the use of
larger signature algorithms like SLH-DSA for those certificates without adding
overhead to the handshake.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Hybrid signature schemes are designed to provide defense in depth during the migration to PQC.
Their goal is to ensure that authentication remains secure as long as at least one of the algorithms
in use remains unbroken. However, several important security considerations arise.</t>
      <section anchor="downgrade">
        <name>Downgrade Attacks</name>
        <t>Implementations must ensure downgrade protection so that an adversary cannot
suppress PQC or hybrid schemes and force reliance solely on traditional
algorithms. This is especially important in scenarios where a CRQC is
available but not publicly disclosed. Without downgrade protection, a MitM
attacker could impersonate servers by presenting only traditional
certificates even when PQC or hybrid certificates are supported by both peers.</t>
        <t>Downgrade protection is critical throughout the migration period,
since relying parties may otherwise be tricked into accepting weaker
traditional authentication even when PQC or hybrid credentials exist.</t>
        <t>In open environments (for example, the Web), there will likely be no single
"flag day" for post-quantum authentication. One possible mitigation is
the X.509 Post-Quantum/Composite Hosting Continuity (PQCHC) extension <xref target="PQCHC"/>, which allows a certificate subject to
to signal its intent to continue presenting PQC or composite credentials
for a configured continuity period beyond the certificate’s "notAfter" date.
Relying parties can use this information to detect downgrade attempts and
enforce continuity by rejecting traditional-only certificates during that period.</t>
        <t>Other mechanisms may complement this approach.  For example, relying parties could maintain and distribute curated lists of
domains known to use PQC-capable authentication, similar to mechanisms used by
Safe Browsing. Such mechanisms could automatically enforce downgrade
resistance for well-known, public domains.  For other domains, the relying party might simply cache that a server previously used a PQ certificate.</t>
        <t>Together, these mechanisms help ensure that PQC-aware relying parties maintain
strong downgrade resistance where possible, while still allowing interoperability
with traditional-only authenticated parties during the transition.</t>
      </section>
      <section anchor="strong-unforgeability-versus-existential-unforgeability">
        <name>Strong Unforgeability versus Existential Unforgeability</name>
        <t>In hybrid signature schemes, once one component algorithm
is broken (e.g., the traditional algorithm under a CRQC), the overall scheme
no longer achieves SUF-CMA. While Existential Unforgeability under chosen message attack
(EUF-CMA) (see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>) is still
preserved by the PQC component, meaning that an adversary who can obtain signatures on
arbitrary messages still cannot forge a valid PQC signature on any new message that
was not previously signed. The loss of SUF-CMA means that hybrid mechanisms will
have be eventually retired once traditional algorithms are no longer secure.</t>
      </section>
      <section anchor="operational-risks">
        <name>Operational Risks</name>
        <t>Managing multiple certificate paths (composite, dual, and PQC) increases
the risk of misconfiguration and operational errors. For example, relying
parties might continue to accept traditional-only certificates after the
traditional algorithms are broken, fail to enforce PQC validation policies,
or select an incorrect chain when multiple options are available, resulting in
validation of weaker authentication than intended. Effective downgrade
protection (see <xref target="downgrade"/>) requires relying parties to reject traditional-only
certificate paths once post-quantum alternatives are available, regardless of
whether authenticated parties continue to support traditional credentials for
legacy interoperability.</t>
        <t>Clear operational guidance and automated monitoring are essential to minimize
these risks. Operators need best practices for certificate lifecycle and
migration planning, along with automated checks to ensure PQC chains remain
present, valid, and not replaced by weaker alternatives.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Martin McGrath, Suresh P. Nair, Eric Rescorla, and German Peinado for the detailed review.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="COMPOSITE-ML-DSA">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-12"/>
        </reference>
        <reference anchor="ML-DSA">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="SLH-DSA">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="HYBRID-SPECTRUMS">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-07"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-12"/>
        </reference>
        <reference anchor="I-D.ietf-tls-trust-anchor-ids">
          <front>
            <title>TLS Trust Anchor Identifiers</title>
            <author fullname="Bob Beck" initials="B." surname="Beck">
              <organization>OpenSSL</organization>
            </author>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Devon O'Brien" initials="D." surname="O'Brien">
         </author>
            <author fullname="Kyle Nekritz" initials="K." surname="Nekritz">
              <organization>Meta</organization>
            </author>
            <date day="15" month="September" year="2025"/>
            <abstract>
              <t>   This document defines the TLS Trust Anchors extension, a mechanism
   for relying parties to convey trusted certification authorities.  It
   describes individual certification authorities more succinctly than
   the TLS Certificate Authorities extension.

   Additionally, to support TLS clients with many trusted certification
   authorities, it supports a mode where servers describe their
   available certification paths and the client selects from them.
   Servers may describe this during connection setup, or in DNS for
   lower latency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-trust-anchor-ids-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-hsm-constrained">
          <front>
            <title>Adapting Constrained Devices for Post-Quantum Cryptography</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Ben S" initials="B." surname="S">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   This document offers guidance on incorporating Post-Quantum
   Cryptography (PQC) into resource-constrained devices, including IoT
   devices and lightweight Hardware Security Modules (HSMs), which
   operate under tight limitations on compute power, memory, storage,
   and energy.  It highlights how the Root of Trust acts as the
   foundation for secure operations, enabling features such as seed-
   based key generation to reduce the need for persistent storage,
   efficient approaches to managing ephemeral keys, and methods for
   offloading cryptographic tasks in low-resource environments.
   Additionally, it examines how PQC affects firmware update mechanisms
   in such constrained systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-hsm-constrained-01"/>
        </reference>
        <reference anchor="RFC9763">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="A. Becker" initials="A." surname="Becker"/>
            <author fullname="R. Guthrie" initials="R." surname="Guthrie"/>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document defines a new Certificate Signing Request (CSR) attribute, relatedCertRequest, and a new X.509 certificate extension, RelatedCertificate. The use of the relatedCertRequest attribute in a CSR and the inclusion of the RelatedCertificate extension in the resulting certificate together provide additional assurance that two certificates each belong to the same end entity. This mechanism is particularly useful in the context of non-composite hybrid authentication, which enables users to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9763"/>
          <seriesInfo name="DOI" value="10.17487/RFC9763"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-09"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-pqc-auth">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   Signature-based authentication methods are utilized in IKEv2
   [RFC7296].  The current version of the Internet Key Exchange Version
   2 (IKEv2) protocol supports traditional digital signatures.

   This document specifies a generic mechanism for integrating post-
   quantum cryptographic (PQC) digital signature algorithms into the
   IKEv2 protocol.  The approach allows for seamless inclusion of any
   PQC signature scheme within the existing authentication framework of
   IKEv2.  Additionally, it outlines how Module-Lattice-Based Digital
   Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-
   DSA), can be employed as authentication methods within the IKEv2
   protocol, as they have been standardized by NIST.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-04"/>
        </reference>
        <reference anchor="PQCHC">
          <front>
            <title>X.509 Extensions for PQC or Composite Certificate Hosting Continuity</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <date day="12" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a new X.509 certificate extension, Post-
   Quantum or Composite Hosting Continuity (PQCHC), which enables a
   certificate subject to signal a intent to continue serving PQC or
   composite certificates for a defined continuity period after
   certificate expiration.  This extension helps relying parties detect
   downgrade and man-in-the-middle (MitM) attacks during transition
   phases, where a cryptographically relevant quantum computer (CRQC)
   would make traditional certificates insecure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-lamps-x509-pq-commit-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RELATED-CERTS">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="A. Becker" initials="A." surname="Becker"/>
            <author fullname="R. Guthrie" initials="R." surname="Guthrie"/>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document defines a new Certificate Signing Request (CSR) attribute, relatedCertRequest, and a new X.509 certificate extension, RelatedCertificate. The use of the relatedCertRequest attribute in a CSR and the inclusion of the RelatedCertificate extension in the resulting certificate together provide additional assurance that two certificates each belong to the same end entity. This mechanism is particularly useful in the context of non-composite hybrid authentication, which enables users to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9763"/>
          <seriesInfo name="DOI" value="10.17487/RFC9763"/>
        </reference>
        <reference anchor="PQC-ENGINEERS">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="TLS">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="DTLS">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="IKEv2">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="September" year="2010"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document replaces and updates RFC 4306, and includes all of the clarifications from RFC 4718. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5996"/>
          <seriesInfo name="DOI" value="10.17487/RFC5996"/>
        </reference>
        <reference anchor="TLS-COMPOSITE-ML-DSA">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05"/>
        </reference>
        <reference anchor="IKEv2-COMPOSITE-ML-DSA">
          <front>
            <title>Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="Jun Hu" initials="J." surname="Hu">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yasufumi Morioka" initials="Y." surname="Morioka">
              <organization>NTT DOCOMO, INC.</organization>
            </author>
            <author fullname="Guilin WANG" initials="G." surname="WANG">
              <organization>Huawei</organization>
            </author>
            <date day="1" month="May" year="2025"/>
            <abstract>
              <t>   One IPsec area that would be impacted by Cryptographically Relevant
   Quantum Computer (CRQC) is IKEv2 authentication based on traditional
   asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely
   deployed authentication options of IKEv2.  There are new Post-Quantum
   Cryptographic (PQC) algorithms for digital signature like NIST
   [ML-DSA], however it takes time for new cryptographic algorithms to
   mature, so there is security risk to use only the new algorithm
   before it is field proven.  This document describes a IKEv2 hybrid
   authentication scheme that could contain both traditional and PQC
   algorithms, so that authentication is secure as long as one algorithm
   in the hybrid scheme is secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-02"/>
        </reference>
        <reference anchor="JOSE-COSE-COMPOSITE-ML-DSA">
          <front>
            <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
            <author fullname="Lucas Prabel" initials="L." surname="Prabel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sun Shuzhou" initials="S." surname="Shuzhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="22" month="August" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for PQ/T
   hybrid composite signatures.  The composite algorithms described
   combine ML-DSA as the post-quantum component and either ECDSA or
   EdDSA as the traditional component.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prabel-jose-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="ACME">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="CMP">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="M. Ounsworth" initials="M." surname="Ounsworth"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides interactions between client systems and PKI components such as a Registration Authority (RA) and a Certification Authority (CA).</t>
              <t>This document adds support for management of certificates containing a Key Encapsulation Mechanism (KEM) public key and uses EnvelopedData instead of EncryptedValue. This document also includes the updates specified in Section 2 and Appendix A.2 of RFC 9480.</t>
              <t>This document obsoletes RFC 4210, and together with RFC 9811, it also obsoletes RFC 9480. Appendix F of this document updates Section 9 of RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9810"/>
          <seriesInfo name="DOI" value="10.17487/RFC9810"/>
        </reference>
        <reference anchor="I-D.hu-ipsecme-pqt-hybrid-auth">
          <front>
            <title>Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="Jun Hu" initials="J." surname="Hu">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yasufumi Morioka" initials="Y." surname="Morioka">
              <organization>NTT DOCOMO, INC.</organization>
            </author>
            <author fullname="Guilin WANG" initials="G." surname="WANG">
              <organization>Huawei</organization>
            </author>
            <date day="1" month="May" year="2025"/>
            <abstract>
              <t>   One IPsec area that would be impacted by Cryptographically Relevant
   Quantum Computer (CRQC) is IKEv2 authentication based on traditional
   asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely
   deployed authentication options of IKEv2.  There are new Post-Quantum
   Cryptographic (PQC) algorithms for digital signature like NIST
   [ML-DSA], however it takes time for new cryptographic algorithms to
   mature, so there is security risk to use only the new algorithm
   before it is field proven.  This document describes a IKEv2 hybrid
   authentication scheme that could contain both traditional and PQC
   algorithms, so that authentication is secure as long as one algorithm
   in the hybrid scheme is secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-02"/>
        </reference>
        <reference anchor="I-D.yusef-tls-pqt-dual-certs">
          <front>
            <title>Post-Quantum Traditional (PQ/T) Hybrid Authentication with Dual Certificates in TLS 1.3</title>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Ciena</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="18" month="June" year="2025"/>
            <abstract>
              <t>   This document extends the TLS 1.3 authentication mechanism to allow
   the negotiation and use of two signature algorithms to enable dual-
   algorithm hybrid authentication, ensuring that an attacker would need
   to break both algorithms to compromise the session.  The two
   signature algorithms come from two independent certificates that
   together produce a single Certificate and CertificateVerify message.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-yusef-tls-pqt-dual-certs-00"/>
        </reference>
        <reference anchor="I-D.bonnell-lamps-chameleon-certs">
          <front>
            <title>A Mechanism for Encoding Differences in Paired Certificates</title>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="D. Hook" initials="D." surname="Hook">
              <organization>KeyFactor</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <date day="16" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies a method to efficiently convey the
   differences between two certificates in an X.509 version 3 extension.
   This method allows a relying party to extract information sufficient
   to reconstruct the paired certificate and perform certification path
   validation using the reconstructed certificate.  In particular, this
   method is especially useful as part of a key or signature algorithm
   migration, where subjects may be issued multiple certificates
   containing different public keys or signed with different CA private
   keys or signature algorithms.  This method does not require any
   changes to the certification path validation algorithm as described
   in RFC 5280.  Additionally, this method does not violate the
   constraints of serial number uniqueness for certificates issued by a
   single certification authority.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonnell-lamps-chameleon-certs-06"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05"/>
        </reference>
        <reference anchor="I-D.prabel-jose-pq-composite-sigs">
          <front>
            <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
            <author fullname="Lucas Prabel" initials="L." surname="Prabel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sun Shuzhou" initials="S." surname="Shuzhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="22" month="August" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for PQ/T
   hybrid composite signatures.  The composite algorithms described
   combine ML-DSA as the post-quantum component and either ECDSA or
   EdDSA as the traditional component.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prabel-jose-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-cert-abridge">
          <front>
            <title>Abridged Compression for WebPKI Certificates</title>
            <author fullname="Dennis Jackson" initials="D." surname="Jackson">
              <organization>Mozilla</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This draft defines a new TLS Certificate Compression scheme which
   uses a shared dictionary of root and intermediate WebPKI
   certificates.  The scheme smooths the transition to post-quantum
   certificates by eliminating the root and intermediate certificates
   from the TLS certificate chain without impacting trust negotiation.
   It also delivers better compression than alternative proposals whilst
   ensuring fair treatment for both CAs and website operators.  It may
   also be useful in other applications which store certificate chains,
   e.g.  Certificate Transparency logs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-cert-abridge-02"/>
        </reference>
        <reference anchor="I-D.kampanakis-tls-scas-latest">
          <front>
            <title>Suppressing CA Certificates in TLS 1.3</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="5" month="January" year="2023"/>
            <abstract>
              <t>   A TLS client or server that has access to the complete set of
   published intermediate certificates can inform its peer to avoid
   sending certificate authority certificates, thus reducing the size of
   the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
