<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-01"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="May" day="24"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 138?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk of
store and decrypt attacks, where data encrypted today using traditional
algorithms could be decrypted in the future by an attacker with a
Cryptographically-Relevant Quantum Computer (CRQC). While traditional
authentication is only at risk once a CRQC exists, it is important to
consider the transition to post-quantum authentication before this point.
This is particularly relevant for systems where algorithm turn-over is
complex or takes a long time (e.g., long-lived systems with hardware roots of
trust), or where future checks on past authenticity play a role (e.g.,
digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms means
that less cryptanalysis of such algorithms is available than for
long-established counterparts, such as RSA and elliptic-curve based solutions
for confidentiality and authenticity. This has drawn attention to hybrid
cryptographic schemes, which combine both traditional and post-quantum (or
more generally next-generation) algorithms in one cryptographic scheme. These
may offer increased assurance for implementers, namely that as long as the
security of one of the two component algorithms of the hybrid scheme holds,
the confidentiality or authenticity offered by that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Conservative users may not have complete trust in the
post-quantum algorithms or implementations available, while also recognizing
a need to start post-quantum transition. For such users, hybridization can
support near-term transition while also avoiding trusting solo post-quantum
algorithms too early. On the other hand, hybrid schemes, particularly for
authentication, may introduce significant complexity into a system or a
transition process, so might not be the right choice for all.  For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and in an
initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their scheme. It does not attempt to answer the question of whether or not a
hybrid scheme is desirable for, or should be used in a given case. It also
intentionally does not propose concrete hybrid signature combiners or
instantiations thereof.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
transition, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future transitions to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Cryptography
Standardization Process <xref target="NIST_PQC_FAQ"/>. Thus, if and when further information
on caveats and implementation issues come to light, it is less likely that a
"break" will be catastrophic. Instead, such vulnerabilities and issues may
represent a weakening of security - which may in turn be offset if a hybrid
approach has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity to a
protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication that is normally assured under
correct verification of digital signature(s), is now potentially also
reliant on further investigation on the receiver side that may extend
well beyond traditional signature verification behavior. For instance,
this can intuitively be seen in cases of a message containing a context
note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one
component signature but not the other, then artifacts in the message
itself point to the possible existence of hybrid signature such as a
label stating “this message must be hybrid signed”. This might be a
counter measure against stripping attacks if the verifier expects a
hybrid signature scheme to have this property. However, it places the
responsibility of signature validity not only on the correct format of
the message, as in a traditional signature security guarantee, but the
precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component signatures
needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs
simultaneously. Namely, "missing" information needs to be computed by the
verifier so they cannot “quit” the verification process before both component
signatures are verified. SV mimics traditional digital signatures guarantees,
essentially ensuring that the hybrid digital signature behaves as a single
algorithm vs. two separate component stages. Alternatively phrased, under an
SV guarantee it is not possible for an unerring verifier to initiate
termination of the hybrid verification upon successful verification of one
component algorithm without also knowing if the other component succeeded or
failed.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example to achieve backwards/forwards-compatibility), or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible
validity/invalidity of the component signatures until both verify (or fail to
verify). This construct most closely mirrors traditional digital signatures
where, assuming that the verifier does verify a signature at all, the result
is either a positive verification of the full signature or a failure if the
signature is not valid. For fused hybrid signatures, a <tt>full signature</tt>
implies the fusion of both component algorithms, and therefore the strongest
non-separability notion enforces an all-or-nothing approach to
verification. Examples of algorithms providing this type of security can be
found in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach.  Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash(comm_1,comm_2,message).  As such, c does not belong to either of the
component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the
adversary 'wins' the security experiment if it can produce a new message such
that a message-signature pair <tt>(m, sig)</tt> correctly verifies. This traditional
security notion is challenged under a hybrid construct.</t>
      <t>The most straightforward comparison would be for the adversary to attempt to
produce a new message <tt>m'</tt> that a message-hybrid signature pair <tt>(m', sig_h)</tt>
correctly verifies.  However, such a guarantee depends on the signature being
strongly non-separable. Otherwise, in practical terms a security experiment
must capture the case that an existing or new message <tt>m</tt> could be verified
with a component signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly
verifies under <tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of
traditional security analysis and represent considerations that would need to
be accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip an component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="10" month="September" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
