<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mls-pq-ciphersuites-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="MLS Cipher Suites with ML-KEM">ML-KEM and Hybrid Cipher Suites for Messaging Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mls-pq-ciphersuites-02"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization/>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R. L." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 52?>

<t>This document registers new cipher suites for Messaging Layer Security (MLS) based on "post-quantum" algorithms, which are intended to be resilient to attack by quantum computers.
These cipher suites are constructed using the new Module-Lattice Key Encapsulation Mechanism (ML-KEM), optionally in combination with traditional elliptic curve KEMs, together with appropriate authenticated encryption, hash, and signature algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mlswg.github.io/mls-pq-ciphersuites/#go.draft-ietf-mls-pq-ciphersuites.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mls-pq-ciphersuites/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mlswg/mls-pq-ciphersuites/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The potential availability of a cryptographically-relevant quantum computer has caused concern that well-funded adversaries could overturn long-held assumptions about the security assurances of classical Key Exchange Mechanisms (KEMs) and classical cryptographic signatures, which are fundamental to modern security protocols, including the MLS protocol <xref target="RFC9420"/>.</t>
      <t>Of particular concern are "harvest now, decrypt later" attacks, by which an attacker could collect encrypted traffic now, before a quantum computer exists, and later use a quantum computer to break the confidentiality protections on the collected traffic.</t>
      <t>In response to these concerns, the cryptographic community has defined "post-quantum" algorithms, which are designed to be resilient to attacks by quantum computers.
Symmetric algorithms can be made post-quantum secure simply by using longer keys and hashes.
For asymmetric operations such as KEMs and signatures, entirely new algorithms are needed.</t>
      <t>In this document, we define ciphersuites that use the post-quantum secure Module-Lattice-Based KEM (ML-KEM) <xref target="MLKEM"/> together with appropriate symmetric algorithms, and either traditional or Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="MLDSA"/> post-quantum signature algorithms.
The traditional signature cipher suites address the risk of "harvest now, decrypt later" attacks, while not taking on the additional cost of post-quantum signatures.
The cipher suites with post-quantum signatures use only post-quantum KEMs.</t>
      <t>Following the pattern of base MLS, we define several variations, to allow for users that prefer to only use NIST-approved cryptography, users that prefer a higher security level, and users that prefer a PQ/traditional hybrid KEM over pure ML-KEM:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-768 + X25519 (128-bit security, Non-NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 + P-256 (128-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-1024 + P-384 (192-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 (128-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (192-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-768 (192-bit security, NIST, pure PQ)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (256-bit security, NIST, pure PQ)</t>
        </li>
      </ul>
      <t>Some parts of the community wish to support the 128-bit security level with the same the Authenticated Encryption with Authenticated Data (AEAD) <xref target="RFC5116"/> algorithm and hash function as used in the traditional cipher suites registered in <xref target="RFC9420"/> (AES128 GCM <xref target="GCM"/> and HMAC <xref target="RFC2104"/> with SHA-256 <xref target="SHS"/>), while other parts of the community would like to follow recent recommendations to transition immediately to AES256 GCM <xref target="GCM"/> and HMAC <xref target="RFC2104"/> with SHA-384 <xref target="SHS"/>.</t>
      <t>For all of the cipher suites defined in this document, we use SHAKE256 (Section 3.2 of <xref target="FIPS202"/>) as the Key Derivation Function (KDF).
For the cipher suites at the 192-bit or 256-security levels, we use AES256 GCM <xref target="GCM"/> as the AEAD algorithm.
For the cipher suites at the 192-bit security level we use HMAC <xref target="RFC2104"/> with SHA-384, while for the 256-bit security level we use HMAC <xref target="RFC2104"/> with SHA-512 <xref target="SHS"/>.</t>
      <t>For the PQ/T hybrid KEMs and the pure ML-KEM HPKE integration, we use the KEMs defined in <xref target="I-D.ietf-hpke-pq"/>.
The signature schemes for ML-DSA-65 and ML-DSA-87 <xref target="MLDSA"/> are defined in <xref target="I-D.ietf-tls-mldsa"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="mls-cipher-suites">
        <name>MLS Cipher Suites</name>
        <t>This document requests that IANA add the following entries to the "MLS Cipher Suites" registry, replacing "XXXX" with the RFC number assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Rec</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">MLS_128_MLKEM768X25519_AES128GCM_SHA256_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">MLS_128_MLKEM768X25519_AES256GCM_SHA384_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">MLS_128_MLKEM768P256_AES128GCM_SHA256_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD4</td>
              <td align="left">MLS_128_MLKEM768P256_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD5</td>
              <td align="left">MLS_192_MLKEM1024P384_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD6</td>
              <td align="left">MLS_128_MLKEM768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD7</td>
              <td align="left">MLS_192_MLKEM1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD8</td>
              <td align="left">MLS_192_MLKEM768_AES256GCM_SHA384_MLDSA65</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD9</td>
              <td align="left">MLS_256_MLKEM1024_AES256GCM_SHA512_MLDSA87</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>The mapping of cipher suites to HPKE primitives <xref target="I-D.ietf-hpke-hpke"/>, HMAC hash functions, and TLS signature schemes <xref target="RFC8446"/> is as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">KDF</th>
              <th align="left">AEAD</th>
              <th align="left">Hash</th>
              <th align="left">Signature</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0xTBD1</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0001</td>
              <td align="left">SHA256</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD2</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD3</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0001</td>
              <td align="left">SHA256</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD4</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD5</td>
              <td align="left">0x0051</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD6</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD7</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD8</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa65</td>
            </tr>
            <tr>
              <td align="left">0xTBD9</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA512</td>
              <td align="left">mldsa87</td>
            </tr>
          </tbody>
        </table>
        <t>The hash used for the MLS transcript hash is the one referenced in the cipher suite name. "SHA246", "SHA384" and "SHA512" refer to the SHA-256, SHA-384, and SHA-512 functions defined in <xref target="SHS"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The first seven ciphersuites defined in this document combine a post-quantum (or PQ/T hybrid) KEM with a traditional signature algorithm. As such, they are designed to provide confidentiality against quantum and classical attacks, but provide authenticity against classical attacks only.  Thus, these cipher suites do not provide full post-quantum security, only post-quantum confidentiality.</t>
      <t>The last two cipher suites also use post-quantum signature algorithms.</t>
      <t>For security considerations related to the KEMs used in this document, please see the documents that define those KEMs <xref target="I-D.ietf-hpke-pq"/> and <xref target="I-D.irtf-cfrg-hybrid-kems"/>.
For security considerations related to the post-quantum signature algorithms used in this document, please see <xref target="I-D.ietf-tls-mldsa"/> and <xref target="I-D.ietf-lamps-dilithium-certificates"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLKEM">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLDSA">
          <front>
            <title>Module-lattice-based digital signature standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.204"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="FIPS202">
          <front>
            <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC5116" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         </author>
            <date day="4" month="November" year="2025"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public key encryption
   (HPKE).  This scheme provides a variant of public key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes a variant that authenticates possession of a pre-shared key.
   HPKE works for any combination of an asymmetric KEM, key derivation
   function (KDF), and authenticated encryption with additional data
   (AEAD) encryption function.  We provide instantiations of the scheme
   using widely used and efficient primitives, such as Elliptic Curve
   Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation
   function (HKDF), and SHA2.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-hpke-02"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="27" month="January" year="2026"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-08"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
      </references>
    </references>
    <?line 136?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work would not be possible without the hard work of the CFRG Hybrid KEM design team: Aron Wussler, Bas Westerbaan, Deirdre Connolly, Mike Ounsworth, Nick Sullivan, and Stephen Farrell.
Thanks also to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
