<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-pquip-hybrid-signature-spectrums-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="hale-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-pquip-hybrid-signature-spectrums-02"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2023" month="November" day="06"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatiblity, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-hale-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 138?>

<!--

# Todos

- add discussion
- extend with discussion points from private emails between Britta, Nina and IETF
- revise re Brendan's email
  - change terminology 'proof composability'?
  - change terminology 'next-gen' vs 'post-quantum'?
- change terminology using 'black-box'?


-->

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk
of store and decrypt attacks, where data encrypted today using
traditional algorithms could be decrypted in the future by an attacker
with a Cryptographically-Relevant Quantum Computer (CRQC). While
traditional authentication is only at risk once a CRQC exists, it is
important to consider the transition to post-quantum authentication
before this point.  This is particularly relevant for systems where
algorithm turn-over is complex or takes a long time (e.g., long-lived
systems with hardware roots of trust), or where future checks on past
authenticity play a role (e.g., digital signatures on legal documents).</t>
      <t>One approach to design quantum-resistant protocols, particularly during
the transition period from traditional to post-quantum algorithms, is
incorporating hybrid signatures schemes, which combine both traditional
and post-quantum (or more generally next-generation) algorithms in one
cryptographic scheme. Hybridization has been looked at for key
encapsulation <xref target="HYBRIDKEM"/>, and in an initial sense for digital
signatures <xref target="HYBRIDSIG"/>. Compared to key encapsulation, hybridization of
digital signatures, where the verification tag may be expected to attest
to both standard and post-quantum components, is subtler to design and
implement due to the potential separability of the hybrid/dual
signatures and the risk of downgrade/stripping attacks.  There are also
a range of requirements and properties that may be required from dual
signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of
different hybrid signature scheme designs and different security goals
for them. It is intended as a resource for designers and implementers of
hybrid signature schemes to help them decide what properties they do and
do not require from their scheme.  It intentionally does not propose
concrete hybrid signature combiners or instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a
final version of this document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>01: Significant fleshing out after feedback from IETF 118.</t>
          </li>
          <li>
            <t>00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperatbility of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
migration, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future migration to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, next generation algorithms have been heavily vetted. Thus, if
and when further information on caveats and implementation issues come
to light, it is less likely that a "break" will be
catastrophic. Instead, such vulnerabilities and issues may represent a
weakening of security - which may in turn be offset if a hybrid approach
has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity
to a protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term committment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptograpthic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompassess more specific concepts of hybrid signature
security, such as 'hybrid unforgability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication is not simply provided by the sender
to the receiver through correct verification of the digital
signature(s), but potentially through further investigation on the
receiver side that may extend well beyond traditional signature
verification behavior. For instance, this can intuitively be seen in
cases of a message containing a context note on hybrid authentication,
that is then signed by all component algorithms/the hybrid signature
scheme. If an adversary removes one component signature but not the
other, then artifacts in the message itself point to the possible
existence of hybrid signature such as a label stating “this message must
be hybrid signed”. This might be a counter measure against stripping
attacks if the verifier expects a hybrid signature scheme to have this
property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional
signature security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input
a hybrid signature (and message) and output a valid component signature
(and potentially different message) that will verify correctly. In other
words, separation of the hybrid signature into component signatures
implies that the component signature will fail verification (of the
component signature scheme) entirely. Therefore, authentication is
provided by the sender to the receiver through correct verification of
the digital signature(s), as in traditional signature security
experiments. It is not dependent on other components, such as message
content checking, or protocol level aspects, such as public key
provenance. As an illustrative example distinguishing WNS from SNS,
consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and
<tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m'
= (hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with
the hybrid artifact embedded in the message instead of the signature,
could be correctly verified. The separation would be identifiable
through further investigation but the signature verification itself
would not fail. Thus, this case shows WNS (assuming the verification
algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on
the public key certificate chains to explicitly define hybrid use of the
public key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without
<tt>Sigma_2.pk</tt>. This implies pushing the hybrid artifacts into the
protocol and system level and a dependency on the security of other
verification algorithms (namely those in the certificate chain). This
further requires that security analysis of a hybrid digital signature
requires analysis of the key provenance, i.e., not simply that a valid
public key is used but how its hybridization and hybrid artifacts have
been managed throughout the entire chain. External dependencies such as
this may imply hybrid artifacts lie outside the scope of the signature
algorithm itself. SNS may potentially be achieveable based on
dependencies at the system level.</t>
          <!--
However, since those artifacts are outside the security definition
scope for a digital signature, namely definitions such EUF-CMA, we do
not include them in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component
signatures needed to achieve a successful verification present in the
hybrid signature, but also that verification of both component
algorithms occurs simultaneously. Namely, "missing" information needs to
be computed by the verifier so they cannot “quit” the verification
process before both component signatures are verified. SV mimics
traditional digital signatures guarantees, essentially ensuring that the
hybrid digital signature behaves as a single algorithm vs. two separate
component stages. Alternatively phrased, under an SV guarantee it is not
possible for an unerring verifier to initiate termination of the hybrid
verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
          <!--

What the sender is assured of is that one of two cases occurred: either
1) the receiver ignored the digital signatures or 2) the receiver
initiated verification of the digital signatures (resulting in either
successful or failed verification). WNS complicates this situation,
resulting in six cases instead of two: 1) the receiver ignored the
digital signatures, 2) the receiver verified the full hybrid combination
(with success or failure); 3) the receiver initiated verification of the
hybrid digital signatures, but terminated once the standard component
succeeded or failed; 4) the receiver initiated verification of the
hybrid digital signatures, but terminated once the post-quantum
component succeeded or failed; 5) the receiver initiated verification of
the standard signature only (with success or failure), and 6) the
receiver initiated verification of the post-quantum signature only (with
success or failure). It may initially appear that (3) and (5) (resp. (4)
and (6)) are similar, however (3) and (4) are precisely the cases
eliminated by SNS, i.e. that the verifier does not take as input the
hybrid digital signatures, instead only attempting verification on one
component. SNS thus improves the situation to only four options. Still,
the verifier can still terminate upon correctly checking only one
component signature without actually verifying both parts. One could
argue that a receiver who has checked the accuracy of their
implementation should be assured that both components are verifying.
This misconstrues the original intent though, which is to correctly
mirror traditional digital signatures properties in hybrid digital
signatures; ideally, the sender should be assured that there are only
two options: 1) ignore the digital signatures or 2) verify the digital
signatures (resulting in either failure or full
verification). Simultaneous Verification addresses this property.

-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined,
based on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be
made that is generalizable to all such signatures. Such generality can
also result in simplified constructions whereas more tailored hybrid
variants might be more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other
cryptographic components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature
constructions are expected to be as performant as possible. For most
hybrid signatures this means that the computation time should only
minimally exceed the sum of the component signature computation time. It
is noted that performance of any variety may come at the cost of other
properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>,
hybrid signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts
are used), public keys, and the hybrid signature.  For the hybrid
signature, size should no more than minimally exceed the signature size
of the two component signatures. In some cases, it may be possible for a
hybrid signature to be smaller than the concatenationation of the two
component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>, duplicated information should
be avoided when possible. This might concern repeated information in
hybrid certificates or in the communication of component certificates in
additional to hybrid certificates (for example to achieve
backwards/forwards-compatibility), or sending multiple public keys or
signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to
detect the change during verification. An example of this includes
simple concatenation of signatures without any artifacts used. Nested
signatures (where a message is signed by one component algorithm and
then the message-signature combination is signed by the second component
algorithm) may also fall into this category, dependent on whether the
inner or outer signature is stripped off without any artifacts
remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message, signature,
or at the protocol level, etc.). This may enable the verifier to detect
if a component signature is stripped away from a hybrid signature, but
that detectability depends highly on the type of artifact and
permissions.  For instance, if a message contains a label artifact "This
message must be signed with a hybrid signature" then the system must be
allowed to analyze the message contents for possible artifacts. Whether
a hybrid signature offers (Weak/Strong) Non-Separability might also
depend on the implementation and policy of the protocol or application
the hybrid signature is used in on the verifier side. Such policies may
be further ambiguous to the sender, meaning that the type of
authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting
a new message as the message/inner signature combination and verify only
the outer signature.  In this case, the inner signature-tag is an
artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the
actual message, the certificate, or in other non-signature components,
this notion more closely ties to traditional algorithm security notions
(such as EUF-CMA) where security is dependent on the internal construct
of the signature algorithm and its verification. In this type, the
verifier can detect artifacts on an algorithmic level during
verification. For example, the signature itself may encode the
information that a hybrid signature scheme is used. Examples of this
type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but also only
when the verifier has verified both signatures. Moreover, no information
is leaked to the receiver during the verification process on the
possibile validity/invalidity of the component signatures until both
verify (or fail to verify). This construct most closely mirrors
traditional digital signatures where, assuming that the verifier does
verify a signature at all, the result is either a positive verification
of a the full signature or a failure if the signature is not valid. For
hybrid signatures, a <tt>full signature</tt> implies the hybridization of both
component algorithms, and therefore the strongest non-separability
notion enforces an all-or-nothing approach to verification. Examples of
algorithms providing this type of security can be found in
<xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--

Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.

-->

</section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping
attacks. This, however, depends strongly on where such evidence resides
(e.g., in the message, the signature, or somewhere on the protocol level
instead of at the algorithmic level). Even commonly discussed hybrid
approaches, such as concatenation, are not inherently tied to one type
of security (e.g., WNS or SNS). This can lead to ambiguities when
comparing different approaches and assumptions about security or lack
thereof. Thus in this section we cover artifact locations and also walk
through a high-level comparison of a few hybrid categories to show how
artifact location can differ within a given approach.  Artifact location
is tied to non-separability notions above; thus the selection of a given
security guarantee and general hybrid approach must also include finer
grained selection of artifact placement.</t>
      <!--

In this section we exemplify the difference in non-separability guarantees
depending on the artifact location for three types of hybridization, namely
concatenation, nesting, and 'fused' hybrid explained next.

-->

<!--

While the above discussion about the non-separability spectrum covers a spectrum
of security guarantees and existence of artifacts are linked to achieving those,
this (sub-)section covers some specific examples of artifact placement.

-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within
the message to the signature algorithm to the protocol level and even
into policy, as shown in <xref target="tab-artifact-location"/>.  For example, one
artifact location could be in the message to be signed, e.g., containing
a label artifact.  Depending on the hybrid type, it might be possible to
strip this away. For example, a quantum attacker could strip away the
quantum-secure signature of a concatenated dual signature, and (being
able to forge, e.g., ECDSA signatures) remove the label artifact from
the message as well. So, for many applications and threat models, adding
an artificat in the message might not prevent stripping attacks.
Another artifact location could be in the public key certificates as
described in <xref target="I-D.ounsworth-pq-composite-sigs"/>. In yet another case,
artifacts may be present through the fused hybrid method, thus making
them part of the signature at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent
on system policy, then cryptographic analysis must necessarily be
reliant on specific policies and it may not be possible to describe a
scheme's security in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in
different locations even within a single, common approach. We look at
the following categories of approaches: concatenation, nesting, and
fusion.  This is to illustrate that a given approach does not inherently
imply a specific non-separability notion and that there are subtleties
to the selection decision, since hybrid artifacts are related to
non-separability guarantees.  Additionally, this comparison highlights
how artifacts placement can be identical in two different hybrid
approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation,
nesting, and fusion) for clarity in description, before showing how each
one may have artifacts in different locations in
<xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component
algorithms <tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is
calculated as a concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID,
m)</tt>.</t>
          </li>
        </ul>
        <!--

WNS may be a goal of a concatenation approach.  NB: I took it out
because I don't see a reason why there shouldn't been a policy or
protocol artificat making concatenation SNS.

-->

<ul spacing="normal">
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in
a layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
        </ul>
        <!--

WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted
in a stripping attack) may be goals of a nesting approach.

-->

<ul spacing="normal">
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly
separated to form one or more valid component constructs. For example,
if both signature schemes are signatures schemes constructed through the
Fiat-Shamir transform, the component signatures would include responses
r_1 and r_2 and challenges c_1 and c_2, where c_1 and c_2 are hashes
computed over the respective commitments comm_1 and comm_2 (and the
message).  A fused hybrid signature could consist of the component
responses, r_1 and r_2 and and a challenge c that is computed as a hash
over both commitments, i.e., c = Hash(comm_1,comm_2,message).  As such,
c does not belong to either of the component signatures but rather both,
meaning that the signatures are 'entangled'.</t>
          </li>
        </ul>
        <!--

SNS and potentially SV are goals of a true hybrid approach.

-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type
of combiner, there are in fact several possible artifact locations
depending on implementation choices. Artifacts help to support detection
in the case of stripping attacks, which means that different artifact
locations imply different overall system implementation considerations
to be able to achieve such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as
there are no prescribed artifacts and therefore non-separability is not
achieved.  However, as can be seen, this does not imply that every
implementation using concatenation fails to achieve
non-separability. Thus, it is advisable for implementors to be
transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable
as the authenticity of the message relies on the validity of the
signature, and the artifact location means that the signature in turn
relies on the authentic content of the message (the artifact
label). This creates a risk of circular dependency. Alternative
approaches such as cases 3 and 4 solve this circular dependency by
provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may
be similar among some approaches. For instance, case 3 and case 6 both
contain artifacts in the certificate. Naturally these examples are
high-level and further specification on concrete schemes in the
categories are needed before prescribing non-separability guarantees to
each, but this does indicate how there could be a strong similarity
between such guarantees.  Such comparisons allow for a systematic
decision process, where security is compared and identified and, if
schemes are similar in the desired security goal, then decisions between
schemes can be based on performance and implementation ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire
chain must then also use a similar combiner if a straightforward
security argument is to be made. Other cases, such as 8, 9, 10, and 11
put artifacts within the signature itself, meaning that these bear the
closest resemblance to traditional schemes where message authenticity is
dependent on signature validity.</t>
        <!--

The artifact placements in nesting combiners may be surprisingly similar
to those in concatenation option cases 2, 3, and 4. Namely, if `sig_2 =
Sigma_2.Sign(hybridAlgID, (m, sig_1))`, then the "message" `(m, sig_1)`
input into `Sigma_2.Sign` actually contains the artifact and acts as a
label.  Unless an additional label is provided within $m$ itself,
$sig_1$ does not therefore contain an artifact. Where the artifact is
located is necessarily dependent upon the threat model; guessing which
algorithm is more at risk from a stripping attack and choosing the order
of nesting accordingly may change the location of an artifact.

Under a fused combiner, artifacts of hybridization are present within
the signature. This can be coupled with artifacts in the message, such
as through use of a label, and/or artifacts in the certificate if keys
are also provisioned in a combined certificate.

-->

</section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the
case of FIPS approval considerations as well as NIST, which has provided
basic guidance on hybrid signature use. NIST provides the following
guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to
approved (or even existing) signature schemes. Such a new, singular
algorithm relies on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security
of the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm
implementation in a black-box way. It may potentially change the
specifics of the other component algorithm implementations. As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
blackbox way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA,
the adversary 'wins' the security experiment if it can produce a new
message such that a message-signature pair <tt>(m, sig)</tt> with it correctly
verifies. This traditional security notion is challenged under a hybrid
construct.</t>
      <t>The most straightforward comparison would be for the adversary to
attempt to produce a new message <tt>m'</tt> that a message-hybrid signature
pair <tt>(m', sig_h)</tt> correctly verifies.  However, such a guarantee
depends on the signature being strongly non-separable. Otherwise, in
practical terms a security experiment must capture the case that an
existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of traditional
security analysis and represent considerations that would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used
in security protocols. It is an informational document and does not
directly affect any other Internet draft. The security considerations
for any specific implementation or incorporation of a hybrid scheme
should be discussed in the relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS.</name>
        <t>There is an inherent mutual exclusion between backwards compatibility
and SNS.  While WNS allows for a valid separation under leftover
artifacts, SNS will ensure verification failure if a receiver attempts
separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability.</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process
hybrid signatures, all differences between the legacy signature format
and the hybrid signature format must be allowed to be ignored, including
skipping verification of signatures additional to the classical
signature. As such, if a system does skip an component signature,
security does not rely on the security of all component signatures. Note
that this mutual exclusion occurs at the verification stage, as a hybrid
signature that is verified by a system that can process both component
schemes can provide hybrid unforgeability even if another (legacy)
system, processing the same hybrid signature, loses that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval.</name>
        <t>It seems that the more simultaneous verification is enforced by the
hybrid design, the higher is the need-for-approval as simultaneous
verification algorithms fuse (or 'entangle') the verification of the
component algorithms such that verification operations from the
different component schemes depend on each other in some way. For
example, concatenation of signatures in a black-box way without any
artefacts is, e.g., FIPS-approved, but the component signatures are
usually verified separately and no 'simultaneous verification' is
enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="September" year="2023"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="2" month="February" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite Signatures For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>CableLabs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="11" month="February" year="2024"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-12"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
