<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-require-tls13-11" category="bcp" consensus="true" submissionType="IETF" updates="9325" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="require-tls1.3">New Protocols Using TLS Must Require TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-11"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="14"/>
    <area>Security</area>
    <workgroup>Using TLS in Applications</workgroup>
    <keyword>TLS</keyword>
    <keyword>TLS Transition</keyword>
    <keyword>TLS Support</keyword>
    <keyword>Interoperability</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 123?>

<t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it
improves both security and privacy over TLS 1.2.  Therefore, new protocols
that use TLS must require TLS 1.3.  As DTLS 1.3 is not widely available or
deployed, this prescription does not pertain to DTLS (in any DTLS version);
it pertains to TLS only.</t>
      <t>This document updates RFC9325 and discusses post-quantum cryptography and the
security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-require-tls13/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Using TLS in Applications Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richsalz/draft-use-tls13"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>This document specifies that, since TLS 1.3 use is widespread, new protocols
that use TLS must require and assume its existence.  It updates <xref target="RFC9325"/>
as described in <xref target="rfc9325-updates"/>.  As DTLS 1.3 is not widely available or
deployed, this prescription does not pertain to DTLS (in any DTLS version);
it pertains to TLS only.</t>
      <t>TLS 1.3 <xref target="TLS13"/> is in widespread use and fixes most known deficiencies with
TLS 1.2.  Examples of this include encrypting more of the traffic so that it
is not readable by outsiders and removing most cryptographic primitives
now considered weak. Importantly, the protocol has had comprehensive
security proofs and should provide excellent security without any additional
configuration.</t>
      <t>TLS 1.2 <xref target="TLS12"/> is in use and can be configured such that it provides good
security properties.  However, TLS 1.2 suffers from several deficiencies, as
described in <xref target="sec-considerations"/>.  Addressing them usually requires
bespoke configuration.</t>
      <t>This document updates RFC9325 and discusses post-quantum cryptography
and fixed weaknesses in TLS 1.2 as a rationale for that update.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography-pqc">
      <name>Implications for post-quantum cryptography (PQC)</name>
      <t>Cryptographically-relevant quantum computers (CRQC), once available, will
have a huge impact on TLS traffic (see, e.g., <xref section="2" sectionFormat="of" target="I-D.ietf-pquip-pqc-engineers"/>).  To mitigate this, TLS applications will
need to migrate to Post-Quantum Cryptography (PQC) <xref target="PQC"/>.  Detailed
considerations of when an application requires PQC or when a CRQC is a threat
that an application need to protect against, are beyond the scope of this
document.</t>
      <t>For TLS it is important to note that the focus of these efforts within
the TLS WG is TLS 1.3
or later, and that TLS 1.2 will not be supported (see <xref target="TLS12FROZEN"/>).
This is one more reason for new protocols require TLS to default to TLS 1.3,
where
PQC is actively being standardized, as this gives new applications
the option to use PQC.</t>
    </section>
    <section anchor="tls-use-by-other-protocols-and-applications">
      <name>TLS Use by Other Protocols and Applications</name>
      <t>Any new protocol that uses TLS <bcp14>MUST</bcp14> specify as its default TLS 1.3.
For example, QUIC <xref target="QUICTLS"/> requires TLS 1.3 and specifies that endpoints
<bcp14>MUST</bcp14> terminate the connection if an older version is used.</t>
      <t>If deployment considerations are a concern, the protocol <bcp14>MAY</bcp14> specify TLS 1.2 as
an additional, non-default option.
As a counter example, the Usage Profile for DNS over TLS <xref target="DNSTLS"/> specifies
TLS 1.2 as the default, while also allowing TLS 1.3.
For newer specifications that choose to support TLS 1.2, those preferences are
to be reversed.</t>
      <t>The initial TLS handshake allows a client to specify which versions of the
TLS protocol it supports and the server is intended to pick the highest
version that it also supports.  This is known as the "TLS version
negotiation," and protocol and negotiation details are discussed in <xref section="4.2.1" sectionFormat="comma" target="TLS13"/> and <xref section="E" sectionFormat="comma" target="TLS12"/>.  Many TLS libraries provide a way
for applications to specify the range of versions they want, including an
open interval where only the lowest or highest version is specified.</t>
      <t>If the application is using a TLS implementation that supports this,
and if it knows that the TLS implementation will use the highest version
supported, then
clients <bcp14>SHOULD</bcp14> specify just the minimum version they want.
This <bcp14>MUST</bcp14> be TLS 1.3 or TLS 1.2, depending on the circumstances described
in the above paragraphs.</t>
    </section>
    <section anchor="rfc9325-updates">
      <name>Changes to RFC 9325</name>
      <t><xref target="RFC9325"/> provides recommendations for ensuring the security of deployed
services that use TLS and, unlike this document, DTLS as well.
At the time it was published, it described availability of TLS 1.3
as "widely available." The transition and adoption mentioned in that
document has grown, and this document now makes two changes
to the recommendations in <xref section="3.1.1" sectionFormat="comma" target="RFC9325"/>:</t>
      <ul spacing="normal">
        <li>
          <t>That section says that TLS 1.3 <bcp14>SHOULD</bcp14> be supported; this document mandates
that TLS 1.3 <bcp14>MUST</bcp14> be supported for new TLS-using protocols.</t>
        </li>
        <li>
          <t>That section says that TLS 1.2 <bcp14>MUST</bcp14> be supported; this document says that
TLS 1.2 <bcp14>MAY</bcp14> be supported as described above.</t>
        </li>
      </ul>
      <t>Again, these changes only apply to TLS, and not DTLS.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>TLS 1.2 was specified with several cryptographic primitives and design choices
that have, over time, become significantly weaker. The purpose of this section is to
briefly survey several such prominent problems that have affected the protocol.
It should be noted, however, that TLS 1.2 can be configured securely; it is
merely much more difficult to configure it securely as opposed to using its
modern successor, TLS 1.3. See <xref target="RFC9325"/> for a more thorough guide on the
secure deployment of TLS 1.2.</t>
      <t>Firstly, the TLS 1.2 protocol, without any extensions, is vulnerable to
renegotiation attacks (see <xref target="RENEG1"/> and <xref target="RENEG2"/>)  and the
Triple Handshake attack (see <xref target="TRIPLESHAKE"/>).
Broadly, these attacks
exploit the protocol's support for renegotiation in order to inject a prefix
chosen by the attacker into the plaintext stream. This is usually a devastating
threat in practice, that allows e.g. obtaining secret cookies in a web setting.
In light of
the above problems, <xref target="RFC5746"/> specifies an extension that prevents this
category of attacks. To securely deploy TLS 1.2, either renegotiation must be
disabled entirely, or this extension must be used. Additionally, clients must
not allow servers to renegotiate the certificate during a connection.</t>
      <t>Secondly, the original key exchange methods specified for the protocol, namely
RSA key exchange and finite field Diffie-Hellman, suffer from several
weaknesses. Similarly, to securely deploy the protocol, these key exchange
methods must be disabled.
See <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/> for details.</t>
      <t>Thirdly, symmetric ciphers which were widely-used in the protocol, namely RC4
and CBC cipher suites, suffer from several weaknesses. RC4 suffers from
exploitable biases in its key stream; see <xref target="RFC7465"/>. CBC cipher suites have
been a source of vulnerabilities throughout the years. A straightforward
implementation of these cipher suites inherently suffers from the Lucky13 timing
attack <xref target="LUCKY13"/>. The first attempt to implement the cipher suites in
constant time introduced an even more severe vulnerability <xref target="LUCKY13FIX"/>.
There have been further similar vulnerabilities throughout the
years exploiting CBC cipher suites; refer to, e.g., <xref target="CBCSCANNING"/>
for an example and a survey of similar works.</t>
      <t>In addition, TLS 1.2 was affected by several other attacks that
TLS 1.3 is immune to:
BEAST <xref target="BEAST"/>, Logjam <xref target="WEAKDH"/>, FREAK <xref target="FREAK"/>, and SLOTH <xref target="SLOTH"/>.</t>
      <t>And finally, while
application layer traffic is always encrypted, most of the handshake
messages are not. Therefore, the privacy provided is suboptimal.
This is a protocol issue that cannot be addressed by configuration.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="TLS12FROZEN">
          <front>
            <title>TLS 1.2 is in Feature Freeze</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="April" year="2025"/>
            <abstract>
              <t>   Use of TLS 1.3, which fixes some known deficiencies in TLS 1.2, is
   growing.  This document specifies that outside of urgent security
   fixes (as determine by TLS WG consensus), new TLS Exporter Labels, or
   new Application-Layer Protocol Negotiation (ALPN) Protocol IDs, no
   changes will be approved for TLS 1.2.  This prescription does not
   pertain to DTLS (in any DTLS version); it pertains to TLS only.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-08"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="QUICTLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="DNSTLS">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="PQC" target="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">
          <front>
            <title>What Is Post-Quantum Cryptography?</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="TRIPLESHAKE" target="https://mitls.org/pages/attacks/3SHAKE">
          <front>
            <title>Triple Handshakes Considered Harmful Breaking and Fixing Authentication over TLS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG1" target="https://web.archive.org/web/20091231034700/http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html">
          <front>
            <title>Understanding the TLS Renegotiation Attack</title>
            <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RENEG2" target="https://web.archive.org/web/20091228061844/http://extendedsubset.com/?p=8">
          <front>
            <title>Authentication Gap in TLS Renegotiation</title>
            <author initials="M." surname="Ray" fullname="Marsh Ray">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13" target="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">
          <front>
            <title>Lucky Thirteen: Breaking the TLS and DTLS record protocols</title>
            <author initials="N. J." surname="Al Fardan">
              <organization/>
            </author>
            <author initials="K. G." surname="Paterson">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LUCKY13FIX" target="https://nds.rub.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf">
          <front>
            <title>Systematic fuzzing and testing of TLS libraries</title>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBCSCANNING" target="https://www.usenix.org/system/files/sec19-merget.pdf">
          <front>
            <title>Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities</title>
            <author initials="R." surname="Merget" fullname="Robert Merget">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
              <organization/>
            </author>
            <author initials="C." surname="Young" fullname="Craig Young">
              <organization/>
            </author>
            <author initials="J." surname="Fliegenschmidt" fullname="Janis Fliegenschmidt">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk" fullname="JÃ¶rg Schwenk">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BEAST" target="http://www.hpcc.ecs.soton.ac.uk/dan/talks/bullrun/Beast.pdf">
          <front>
            <title>Here come the xor ninjas</title>
            <author initials="T." surname="Duong" fullname="Thai Duong">
              <organization/>
            </author>
            <author initials="J." surname="Rizzo" fullname="Juliano Rizzo">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEAKDH" target="https://dl.acm.org/doi/pdf/10.1145/2810103.2813707">
          <front>
            <title>Imperfect forward secrecy: How Diffie-Hellman fails in practice</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="ThomÃ©">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FREAK" target="https://inria.hal.science/hal-01114250/file/messy-state-of-the-union-oakland15.pdf">
          <front>
            <title>A messy state of the union: Taming the composite state machines of TLS</title>
            <author initials="B." surname="Beurdouche" fullname="Benjamin Beurdouche">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet" fullname="CÃ©dric Fournet">
              <organization/>
            </author>
            <author initials="M." surname="Kohlweiss" fullname="Markulf Kohlweiss">
              <organization/>
            </author>
            <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
              <organization/>
            </author>
            <author initials="P.-Y." surname="Strub" fullname="Pierre-Yves Strub">
              <organization/>
            </author>
            <author initials="J. K." surname="Zinzindohoue" fullname="Jean Karim Zinzindohoue">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLOTH" target="https://inria.hal.science/hal-01244855/file/SLOTH_NDSS16.pdf">
          <front>
            <title>Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH</title>
            <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
              <organization/>
            </author>
            <author initials="G." surname="Leurent" fullname="GaÃ«tan Leurent">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="RFC5746">
          <front>
            <title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Ray" initials="M." surname="Ray"/>
            <author fullname="S. Dispensa" initials="S." surname="Dispensa"/>
            <author fullname="N. Oskov" initials="N." surname="Oskov"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5746"/>
          <seriesInfo name="DOI" value="10.17487/RFC5746"/>
        </reference>
        <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
            <author fullname="Carrick Bartle" initials="C." surname="Bartle">
              <organization>Roblox</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
        </reference>
        <reference anchor="RFC7465">
          <front>
            <title>Prohibiting RC4 Cipher Suites</title>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7465"/>
          <seriesInfo name="DOI" value="10.17487/RFC7465"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
