<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-shbs-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="HSS and XMSS for X.509">Internet X.509 Public Key Infrastructure: Algorithm Identifiers for HSS and XMSS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-shbs-02"/>
    <author initials="K." surname="Bashiri" fullname="Kaveh Bashiri">
      <organization>BSI</organization>
      <address>
        <email>kaveh.bashiri.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Gazdag" fullname="Stefan Gazdag">
      <organization>genua GmbH</organization>
      <address>
        <email>ietf@gazdag.de</email>
      </address>
    </author>
    <author initials="D." surname="Van Geest" fullname="Daniel Van Geest">
      <organization>CryptoNext Security</organization>
      <address>
        <email>daniel.vangeest@cryptonext-security.com</email>
      </address>
    </author>
    <author initials="S." surname="Kousidis" fullname="Stavros Kousidis">
      <organization>BSI</organization>
      <address>
        <email>kousidis.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="04"/>
    <area>sec</area>
    <workgroup>LAMPS - Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document specifies algorithm identifiers and ASN.1 encoding formats for
the Stateful Hash-Based Signature Schemes (S-HBS) Hierarchical Signature System
(HSS), eXtended Merkle Signature Scheme (XMSS), and XMSS^MT, a multi-tree
variant of XMSS. This specification applies to the Internet X.509 Public Key
infrastructure (PKI) when those digital signatures are used in Internet X.509
certificates and certificate revocation lists.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-shbs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        LAMPS Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/x509-hbs/draft-x509-shbs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateful Hash-Based Signature Schemes (S-HBS) such as HSS, XMSS and XMSS^MT
combine Merkle trees with One Time Signatures (OTS) in order to provide digital
signature schemes that remain secure even when quantum computers become
available. Their theoretic security is well understood and depends only on the
security of the underlying hash function. As such they can serve as an
important building block for quantum computer resistant information and
communication technology.</t>
      <t>The private key of S-HBS is a finite collection of OTS keys, hence only a
limited number of messages can be signed and the private key's state must be
updated and persisted after signing to prevent reuse of OTS keys.  While the
right selection of algorithm parameters would allow a private key to sign a
virtually unbounded number of messages (e.g. 2^60), this is at the cost of a
larger signature size and longer signing time. Due to the statefulness of the
private key and the limited number of signatures that can be created, S-HBS
might not be appropriate for use in interactive protocols. However, in some use
cases the deployment of S-HBS may be appropriate. Such use cases are described
and discussed later in <xref target="use-cases-shbs-x509"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-cases-shbs-x509">
      <name>Use Cases of S-HBS in X.509</name>
      <t>As many cryptographic algorithms that are considered to be quantum-resistant,
S-HBS have several pros and cons regarding their practical usage. On the
positive side they are considered to be secure against a classical as well as a
quantum adversary, and a secure instantiation of S-HBS may always be built as
long as a cryptographically secure hash function exists. Moreover, S-HBS offer
small public key sizes, and, in comparison to other post-quantum signature
schemes, the S-HBS can offer relatively small signature sizes (for certain
parameter sets). While key generation and signature generation may take longer
than classical alternatives, fast and minimal verification routines can be
built.  The major negative aspect is the statefulness.  Private keys always
have to be handled in a secure manner, S-HBS necessitate a special treatment of
the private key in order to avoid security incidents like signature forgery
<xref target="MCGREW"/>, <xref target="SP800208"/>. Therefore, for S-HBS, a secure environment <bcp14>MUST</bcp14> be used
for key generation and key management.</t>
      <t>Note that, in general, root CAs offer such a secure environment and the number
of issued signatures (including signed certificates and CRLs) is often moderate
due to the fact that many root CAs delegate OCSP services or the signing of
end-entity certificates to other entities (such as subordinate CAs) that use
stateless signature schemes. Therefore, many root CAs should be able to handle
the required state management, and S-HBS offer a viable solution.</t>
      <t>As the above reasoning for root CAs usually does not apply for subordinate CAs,
it is <bcp14>NOT RECOMMENDED</bcp14> for subordinate CAs to use S-HBS for issuing end-entity
certificates. Moreover, S-HBS <bcp14>MUST NOT</bcp14> be used for end-entity certificates.</t>
      <t>However, S-HBS <bcp14>MAY</bcp14> be used for code signing certificates, since they are
suitable and recommended in such non-interactive contexts. For example, see the
recommendations for software and firmware signing in <xref target="CNSA2.0"/>. Some
manufactures use common and well-established key formats like X.509 for their
code signing and update mechanisms. Also there are multi-party IoT ecosystems
where publicly trusted code signing certificates are useful.</t>
    </section>
    <section anchor="algorithm-identifiers-and-parameters">
      <name>Algorithm Identifiers and Parameters</name>
      <t>In this document, we define new OIDs for identifying the different stateful
hash-based signature algorithms. An additional OID is defined in <xref target="I-D.draft-ietf-lamps-rfc8708bis"/> and
repeated here for convenience. For all of the OIDs, the parameters <bcp14>MUST</bcp14> be
absent.</t>
      <section anchor="hss-algorithm-identifier">
        <name>HSS Algorithm Identifier</name>
        <t>The object identifier and public key algorithm identifier for HSS is defined in
<xref target="I-D.draft-ietf-lamps-rfc8708bis"/>. The definitions are repeated here for reference.</t>
        <t>The object identifier for an HSS public key is <tt>id-alg-hss-lms-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>Note that the <tt>id-alg-hss-lms-hashsig</tt> algorithm identifier is also referred to
as <tt>id-alg-mts-hashsig</tt>. This synonym is based on the terminology used in an
early draft of the document that became <xref target="RFC8554"/>.</t>
        <t>The public key and signature values identify the hash function and the height used in the
HSS/LMS tree. <xref target="RFC8554"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-LMS"/> permits the registration of additional identifiers in the future.</t>
      </section>
      <section anchor="xmss-algorithm-identifier">
        <name>XMSS Algorithm Identifier</name>
        <t>The object identifier for an XMSS public key is <tt>id-alg-xmss-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) algorithms(6) TBD1 }
]]></artwork>
        <t>The public key and signature values identify the hash function and the height used in the
XMSS tree. <xref target="RFC8391"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-XMSS"/> permits the registration of additional identifiers in the future.</t>
      </section>
      <section anchor="xmssmt-algorithm-identifier">
        <name>XMSS^MT Algorithm Identifier</name>
        <t>The object identifier for an XMSS^MT public key is <tt>id-alg-xmssmt-hashsig</tt>:</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) algorithms(6) TBD2 }
]]></artwork>
        <t>The public key and signature values identify the hash function and the height used in the
XMSS^MT tree. <xref target="RFC8391"/> and <xref target="SP800208"/> define these values, but an IANA registry
<xref target="IANA-XMSS"/> permits the registration of additional identifiers in the future.</t>
      </section>
    </section>
    <section anchor="public-key-identifiers">
      <name>Public Key Identifiers</name>
      <t>Certificates conforming to <xref target="RFC5280"/> can convey a public key for any public key
algorithm. The certificate indicates the algorithm through an algorithm
identifier. An algorithm identifier consists of an OID and optional parameters.</t>
      <t><xref target="RFC8554"/> and <xref target="RFC8391"/> define the raw octet string encodings of the public
keys used in this document. When used in a SubjectPublicKeyInfo type, the
subjectPublicKey BIT STRING contains the raw octet string encodings of the
public keys.</t>
      <t>This document defines ASN.1 OCTET STRING types for encoding the public keys
when not used in a SubjectPublicKeyInfo. The OCTET STRING is mapped to a
subjectPublicKey (a value of type BIT STRING) as follows: the most significant
bit of the OCTET STRING value becomes the most significant bit of the BIT
STRING value, and so on; the least significant bit of the OCTET STRING
becomes the least significant bit of the BIT STRING.</t>
      <section anchor="hss-public-keys">
        <name>HSS Public Keys</name>
        <t>The HSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-HSS-LMS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-hss-lms-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The HSS public key is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8554"/> defines the raw octet string encoding of an HSS public key using the
<tt>hss_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on
the contents and format of an HSS public key. Note that the single-tree signature
scheme LMS is instantiated as HSS with number of levels being equal to 1.</t>
      </section>
      <section anchor="xmss-public-keys">
        <name>XMSS Public Keys</name>
        <t>The XMSS public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS public key is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8391"/> defines the raw octet string encoding of an HSS public key using the
<tt>xmss_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information
on the contents and format of an XMSS public key.</t>
      </section>
      <section anchor="xmssmt-public-keys">
        <name>XMSS^MT Public Keys</name>
        <t>The XMSS^MT public key identifier is as follows:</t>
        <artwork><![CDATA[
pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }
]]></artwork>
        <t>The XMSS^MT public key is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-PublicKey ::= OCTET STRING
]]></artwork>
        <t><xref target="RFC8391"/> defines the raw octet string encoding of an HSS public key using the
<tt>xmssmt_public_key</tt> structure. See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information
on the contents and format of an XMSS^MT public key.</t>
      </section>
    </section>
    <section anchor="key-usage-bits">
      <name>Key Usage Bits</name>
      <t>The intended application for the key is indicated in the keyUsage certificate
extension <xref target="RFC5280"/>.
When one of the AlgorithmIdentifiers specified in this document appears in the SubjectPublicKeyInfo
field of a certification authority (CA) X.509 certificate <xref target="RFC5280"/>, the
certificate key usage extension <bcp14>MUST</bcp14> contain at least one of the
following values: digitalSignature, nonRepudiation, keyCertSign, or
cRLSign. However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>When one of these AlgorithmIdentifiers appears in the SubjectPublicKeyInfo
field of an end entity X.509 certificate <xref target="RFC5280"/>, the certificate key usage
extension <bcp14>MUST</bcp14> contain at least one of the following values: digitalSignature
or nonRepudiation. However, it <bcp14>MUST NOT</bcp14> contain other values.</t>
      <t>Note that for certificates that indicate <tt>id-alg-hss-lms-hashsig</tt> the above
definitions are more restrictive than the requirement defined in <xref section="4" sectionFormat="of" target="I-D.draft-ietf-lamps-rfc8708bis"/>.</t>
    </section>
    <section anchor="signature-algorithms">
      <name>Signature Algorithms</name>
      <t>This section identifies OIDs for signing using HSS, XMSS, and XMSS^MT. When
these algorithm identifiers appear in the algorithm field as an
AlgorithmIdentifier, the encoding <bcp14>MUST</bcp14> omit the parameters field. That is, the
AlgorithmIdentifier <bcp14>SHALL</bcp14> be a SEQUENCE of one component, one of the OIDs
defined in the following subsections.</t>
      <t>When the signature algorithm identifiers described in this document are used to
create a signature on a message, no digest algorithm is applied to the message
before signing.  That is, the full data to be signed is signed rather than
a digest of the data.</t>
      <t>For HSS, the signature value is described in section 6.4 of <xref target="RFC8554"/>. For XMSS
and XMSS^MT the signature values are described in sections B.2 and C.2 of
<xref target="RFC8391"/>, respectively. The octet string representing the signature is encoded
directly in the OCTET STRING without adding any additional ASN.1 wrapping. For
the Certificate and CertificateList structures, the signature value is wrapped
in the "signatureValue" OCTET STRING field.</t>
      <section anchor="hss-signature-algorithm">
        <name>HSS Signature Algorithm</name>
        <t>The HSS public key OID is also used to specify that an HSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the HSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= {
   iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
   smime(16) alg(3) 17 }
]]></artwork>
        <t>The HSS signature is defined as follows:</t>
        <artwork><![CDATA[
HSS-LMS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8554"/> for more information on the contents and
format of an HSS signature.</t>
      </section>
      <section anchor="xmss-signature-algorithm">
        <name>XMSS Signature Algorithm</name>
        <t>The XMSS public key OID is also used to specify that an XMSS signature was
generated on the full message, i.e. the message was not hashed before being
processed by the XMSS signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The XMSS signature is defined as follows:</t>
        <artwork><![CDATA[
XMSS-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
      <section anchor="xmssmt-signature-algorithm">
        <name>XMSS^MT Signature Algorithm</name>
        <t>The XMSS^MT public key OID is also used to specify that an XMSS^MT signature
was generated on the full message, i.e. the message was not hashed before being
processed by the XMSS^MT signature algorithm.</t>
        <artwork><![CDATA[
id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   TBD }
]]></artwork>
        <t>The XMSS^MT signature is defined as follows:</t>
        <artwork><![CDATA[
XMSSMT-HashSig-Signature ::= OCTET STRING
]]></artwork>
        <t>See <xref target="SP800208"/> and <xref target="RFC8391"/> for more information on the contents and
format of an XMSS^MT signature.</t>
        <t>The signature generation <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/>.</t>
      </section>
    </section>
    <section anchor="key-generation">
      <name>Key Generation</name>
      <t>The key generation for XMSS and XMSS^MT <bcp14>MUST</bcp14> be performed according to 7.2 of
<xref target="SP800208"/></t>
    </section>
    <section anchor="sec-asn1">
      <name>ASN.1 Module</name>
      <t>For reference purposes, the ASN.1 syntax is presented as an ASN.1 module here.
This ASN.1 Module builds upon the conventions established in <xref target="RFC5911"/>.</t>
      <artwork><![CDATA[
X509-SHBS-2024
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-shbs-2024(TBD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS
  PUBLIC-KEY, SIGNATURE-ALGORITHM
    FROM AlgorithmInformation-2009  -- RFC 5911 [CMSASN1]
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-algorithmInformation-02(58) }

  sa-HSS-LMS-HashSig, pk-HSS-LMS-HashSig
    FROM MTS-HashSig-2013
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
        id-smime(16) id-mod(0) id-mod-mts-hashsig-2013(64) };

--
-- Object Identifiers
--

-- id-alg-hss-lms-hashsig is defined in [RFC8708]

id-alg-xmss-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) algorithms(6) TBD1 }

id-alg-xmssmt-hashsig  OBJECT IDENTIFIER ::= {
   iso(1) identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) algorithms(6) TBD2 }

--
-- Signature Algorithms and Public Keys
--

-- sa-HSS-LMS-HashSig is defined in [RFC8708]

sa-XMSS-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmss-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSS-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmss-hashsig } }

sa-XMSSMT-HashSig SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   PARAMS ARE absent
   PUBLIC-KEYS { pk-XMSSMT-HashSig }
   SMIME-CAPS { IDENTIFIED BY id-alg-xmssmt-hashsig } }

-- pk-HSS-LMS-HashSig is defined in [RFC8708]

pk-XMSS-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmss-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

pk-XMSSMT-HashSig PUBLIC-KEY ::= {
   IDENTIFIER id-alg-xmssmt-hashsig
   -- KEY no ASN.1 wrapping --
   PARAMS ARE absent
   CERT-KEY-USAGE
      { digitalSignature, nonRepudiation, keyCertSign, cRLSign } }

--
-- Public Key (pk-) Algorithms
--
PublicKeys PUBLIC-KEY ::= {
   -- This expands PublicKeys from RFC 5912
   pk-HSS-LMS-HashSig |
   pk-XMSS-HashSig |
   pk-XMSSMT-HashSig,
   ...
}

--
-- Signature Algorithms (sa-)
--
SignatureAlgs SIGNATURE-ALGORITHM ::= {
   -- This expands SignatureAlgorithms from RFC 5912
   sa-HSS-LMS-HashSig |
   sa-XMSS-HashSig |
   sa-XMSSMT-HashSig,
   ...
}

END
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements of <xref target="SP800208"/> <bcp14>MUST</bcp14> be taken into account.</t>
      <t>For S-HBS it is crucial to stress the importance of a correct state management.
If an attacker were able to obtain signatures for two different messages
created using the same OTS key, then it would become computationally feasible
for that attacker to create forgeries <xref target="BH16"/>. As noted in <xref target="MCGREW"/> and
<xref target="ETSI-TR-103-692"/>, extreme care needs to be taken in order to avoid the risk
that an OTS key will be reused accidentally.  This is a new requirement that
most developers will not be familiar with and requires careful handling.</t>
      <t>Various strategies for a correct state management can be applied:</t>
      <ul spacing="normal">
        <li>
          <t>Implement a track record of all signatures generated by a key pair associated
to a S-HBS instance. This track record may be stored outside the
device which is used to generate the signature. Check the track record to
prevent OTS key reuse before a new signature is released. Drop the new
signature and hit your PANIC button if you spot OTS key reuse.</t>
        </li>
        <li>
          <t>Use a S-HBS instance only for a moderate number of signatures such
that it is always practical to keep a consistent track record and be able to
unambiguously trace back all generated signatures.</t>
        </li>
        <li>
          <t>Apply the state reservation strategy described in Section 5 of <xref target="MCGREW"/>, where
upcoming states are reserved in advance by the signer. In this way the number of
state synchronisations between nonvolatile and volatile memory is reduced.</t>
        </li>
      </ul>
    </section>
    <section anchor="backup-and-restore-management">
      <name>Backup and Restore Management</name>
      <t>Certificate Authorities have high demands in order to ensure the availability
of signature generation throughout the validity period of signing key pairs.</t>
      <t>Usual backup and restore strategies when using a stateless signature scheme
(e.g. SLH-DSA) are to duplicate private keying material and to operate
redundant signing devices or to store and safeguard a copy of the private
keying material such that it can be used to set up a new signing device in case
of technical difficulties.</t>
      <t>For S-HBS such straightforward backup and restore strategies will lead to OTS
reuse with high probability as a correct state management is not guaranteed.
Strategies for maintaining availability and keeping a correct state are
described in Section 7 of <xref target="SP800208"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a module OID from the "SMI for PKIX Module
Identifier" registry for the ASN.1 module in <xref target="sec-asn1"/>.</t>
      <t>One object identifier for the ASN.1 module in Appendix A is requested
for the SMI Security for PKIX Module Identifiers (1.3.6.1.5.5.7.0)
registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">id-mod-pkix1-shbs-2024</td>
            <td align="left">[EDNOTE: THIS RFC]</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to update the SMI Security for PKIX Algorithms
<xref target="SMI-PKIX"/> (1.3.6.1.5.5.7.6) registry with four additional entries:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-alg-xmss-hashsig</td>
            <td align="left">[EDNOTE: THIS RFC]</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">id-alg-xmssmt-hashsig</td>
            <td align="left">[EDNOTE: THIS RFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.draft-ietf-lamps-rfc8708bis">
          <front>
            <title>Use of the HSS/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies the conventions for using the Hierarchical Signature System (HSS) / Leighton-Micali Signature (LMS) hash-based signature algorithm with the Cryptographic Message Syntax (CMS). In addition, the algorithm identifier and public key syntax are provided. The HSS/LMS algorithm is one form of hash-based digital signature; it is described in RFC 8554.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8708"/>
          <seriesInfo name="DOI" value="10.17487/RFC8708"/>
        </reference>
        <reference anchor="RFC5911">
          <front>
            <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5911"/>
          <seriesInfo name="DOI" value="10.17487/RFC5911"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="SP800208" target="https://doi.org/10.6028/NIST.SP.800-208">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2020" month="October" day="29"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3279">
          <front>
            <title>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="L. Bassham" initials="L." surname="Bassham"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI). Digital signatures are used to sign certificates and certificate revocation list (CRLs). Certificates include the public key of the named subject. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3279"/>
          <seriesInfo name="DOI" value="10.17487/RFC3279"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="MCGREW" target="https://tubiblio.ulb.tu-darmstadt.de/id/eprint/101633">
          <front>
            <title>State Management for Hash-Based Signatures</title>
            <author initials="D." surname="McGrew">
              <organization/>
            </author>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <author initials="S." surname="Fluhrer">
              <organization/>
            </author>
            <author initials="S." surname="Gazdag">
              <organization/>
            </author>
            <author initials="D." surname="Butin">
              <organization/>
            </author>
            <author initials="J." surname="Buchmann">
              <organization/>
            </author>
            <date year="2016" month="November" day="02"/>
          </front>
        </reference>
        <reference anchor="BH16" target="https://eprint.iacr.org/2016/1042.pdf">
          <front>
            <title>Oops, I did it again – Security of One-Time Signatures under Two-Message Attacks.</title>
            <author initials="L." surname="Bruinderink">
              <organization/>
            </author>
            <author initials="S." surname="Hülsing">
              <organization/>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="CNSA2.0" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
          <front>
            <title>Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) Cybersecurity Advisory (CSA)</title>
            <author initials="" surname="National Security Agency (NSA)">
              <organization/>
            </author>
            <date year="2022" month="September" day="07"/>
          </front>
        </reference>
        <reference anchor="ETSI-TR-103-692" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103692/01.01.01_60/tr_103692v010101p.pdf">
          <front>
            <title>State management for stateful authentication mechanisms</title>
            <author initials="" surname="European Telecommunications Standards Institute (ETSI)">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA-LMS" target="https://www.iana.org/assignments/leighton-micali-signatures/">
          <front>
            <title>Leighton-Micali Signatures (LMS)</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-XMSS" target="https://iana.org/assignments/xmss-extended-hash-based-signatures/">
          <front>
            <title>XMSS: Extended Hash-Based Signatures</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SMI-PKIX" target="https://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-numbers-1.3.6.1.5.5.7.6">
          <front>
            <title>SMI Security for PKIX Algorithms</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 604?>

<section anchor="hss-x509-v3-certificate-example">
      <name>HSS X.509 v3 Certificate Example</name>
      <t>This section shows a self-signed X.509 v3 certificate using HSS.</t>
      <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            e8:91:d6:06:91:4f:ce:f3
        Signature Algorithm: HSS
        Issuer: C=US, ST=VA, L=Herndon, O=Bogus CA
        Validity
            Not Before: May 14 08:58:11 2024 GMT
            Not After : May 14 08:58:11 2034 GMT
        Subject: C=US, ST=VA, L=Herndon, O=Bogus CA
        Subject Public Key Info:
            Public Key Algorithm: HSS
                HSS public key:
                PQ key material:
                    00:00:00:01:00:00:00:05:00:00:00:04:74:e4:73:
                    a8:23:a6:6a:7e:9f:a5:45:a8:fa:63:c6:fb:17:8f:
                    af:fe:28:d1:82:d3:95:92:3e:f9:e2:5f:92:20:56:
                    00:09:e4:36:f9:39:a8:ea:8d:e7:79:02:61:a8:42
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                D6:FD:27:12:44:AD:D2:76:19:C0:FC:6D:52:95:6B:19:
                1B:F8:4C:9D:37:9E:6E:F0:7A:98:F0:6C:6E:C5:A2:14
            X509v3 Authority Key Identifier:
                D6:FD:27:12:44:AD:D2:76:19:C0:FC:6D:52:95:6B:19:
                1B:F8:4C:9D:37:9E:6E:F0:7A:98:F0:6C:6E:C5:A2:14
            X509v3 Basic Constraints:
                CA:TRUE
            X509v3 Key Usage:
                Certificate Sign, CRL Sign
    Signature Algorithm: HSS
    Signature Value:
        00:00:00:00:00:00:00:00:00:00:00:04:b8:20:60:54:98:f9:
        ca:6b:fb:d4:91:a0:24:0c:19:f6:e2:4c:94:5d:b1:52:41:93:
        85:8f:dd:97:2a:e4:76:8a:cd:36:7f:05:d6:35:ed:c4:8e:ff:
        72:fe:16:41:54:e4:0b:2a:aa:e6:52:8c:03:25:5e:bd:79:b0:
        48:c8:71:65:8c:31:bf:d0:8e:1a:59:88:37:c6:74:8d:62:4d:
        7d:f2:e0:29:6e:46:58:43:a5:cd:6c:6e:65:19:66:50:59:f4:
        94:51:ca:e0:f9:91:ac:92:c4:c0:04:78:cf:5b:9e:36:35:14:
        0e:8b:84:3d:77:af:ef:58:2b:34:2e:c5:01:c5:45:09:ac:28:
        8c:e1:db:c5:bf:19:d1:a8:0e:02:72:21:82:e5:f2:fc:9f:bd:
        1f:72:31:23:62:f7:2b:60:80:49:21:7e:46:b5:cb:80:b2:4d:
        6c:9a:68:8a:2e:84:ec:06:47:80:1b:da:c4:40:07:2f:c2:57:
        02:39:cb:8c:06:9f:38:55:2f:18:80:2a:7d:08:e4:10:d0:f7:
        41:7f:26:0e:4c:6a:73:78:a4:f7:1b:db:2d:b1:6c:16:b8:64:
        f1:9c:69:2e:d7:b4:a8:d9:49:c0:c8:df:33:de:ac:ad:89:1a:
        f1:14:42:b4:39:3c:cb:2d:1a:93:96:61:d8:ba:70:0c:b4:64:
        23:80:ac:17:34:f5:e4:67:36:d1:2c:dc:b1:7c:ec:1a:41:3f:
        be:28:f8:7a:c4:b9:f2:a0:8c:cf:8b:68:c3:98:02:09:5c:72:
        4f:f5:4e:c7:22:37:8f:2d:67:f0:86:75:fc:ab:34:07:a7:bc:
        9c:0c:b8:d6:90:93:a2:92:4c:a0:eb:7b:83:10:ed:ea:73:a2:
        93:ac:8e:d3:e5:6a:93:ac:5f:17:5a:6a:67:84:9e:84:4b:64:
        35:8b:2d:d0:47:8c:9d:9d:8c:d3:d5:99:a2:ed:e4:84:5e:bc:
        5e:9a:f4:07:51:9d:08:94:19:95:46:c5:94:b1:e3:8a:9a:e3:
        0f:80:9e:b7:9a:eb:a2:33:83:40:9f:47:e7:a4:9e:26:01:cf:
        57:60:cf:ae:78:a2:0d:1b:a2:4d:41:aa:45:08:15:4c:ee:ad:
        87:3b:74:58:f1:60:19:67:62:45:2b:da:c8:74:dc:a3:02:d3:
        29:26:2c:b0:55:67:0b:a5:b8:a2:c2:1b:16:6a:9e:5f:23:02:
        9d:b8:4a:61:8a:ab:3e:91:ef:0b:ab:be:ff:46:9d:c3:1f:2a:
        b0:93:1d:86:64:42:d4:d9:31:ec:b1:5b:2c:8e:78:e6:41:4c:
        5d:0a:f7:ec:d7:51:c8:5d:7f:de:df:ef:87:2a:2e:d6:3d:e7:
        23:3b:1e:e1:86:ca:96:95:50:45:60:10:3d:95:f1:47:cf:d2:
        d7:de:5e:db:65:a7:15:9e:bd:dc:f6:96:0e:f8:90:26:1a:8b:
        cb:6a:7b:d2:32:fc:e5:99:4b:82:82:48:ee:56:f4:dc:a9:7c:
        61:7f:60:94:c7:53:53:31:71:fe:5e:31:42:07:4d:9b:d3:4e:
        48:39:75:56:33:67:6a:d6:b5:2c:36:9a:41:fd:a7:c7:fa:10:
        2d:3d:50:a6:d5:c3:f6:2a:ab:ba:31:40:c7:2d:ec:d4:74:43:
        c2:6e:2e:9b:a9:0d:36:9d:b7:c5:55:8e:08:09:8e:54:a2:a1:
        9c:af:61:8d:b3:a3:4a:51:67:2d:60:7a:1c:f0:72:9b:90:5e:
        42:a5:1a:af:74:e8:82:64:e4:78:d9:e9:4d:74:04:35:e3:71:
        fd:0a:c8:f8:3a:fa:e4:a2:fe:08:eb:e1:69:84:ee:d0:ba:60:
        f4:7d:80:8a:06:e6:df:32:68:da:07:4f:15:2e:82:75:92:6c:
        e2:bf:ac:e7:ab:a4:e0:a3:ab:2c:71:1b:81:e5:8d:1d:d8:44:
        c7:fd:a1:46:51:84:7b:e3:8a:b8:9b:04:28:63:26:0d:44:16:
        1d:7f:b0:e2:76:c5:0e:c3:0a:d3:5a:da:ed:b7:28:f7:e9:55:
        e6:d1:1f:0d:46:b9:1d:4a:79:7e:bd:4b:60:d3:bc:54:ef:95:
        e3:e9:1c:57:1e:3a:48:b5:98:89:e4:92:cb:48:aa:db:ab:08:
        31:7f:08:3f:d9:a8:3b:2d:81:40:cf:60:90:08:ba:a2:ca:0a:
        0b:a7:76:2a:98:40:3c:03:e6:a2:a1:ce:8a:a4:bd:ab:04:87:
        35:cc:b5:ef:da:92:d2:be:98:08:74:89:b2:e4:cd:78:75:7f:
        8f:b8:fe:9c:02:07:a2:07:cb:34:e1:0d:e1:9b:4a:74:69:97:
        f1:1c:5e:5f:28:2c:82:97:b8:08:c7:4f:97:33:90:83:df:d1:
        c7:db:7a:28:1d:98:4e:ef:d5:c2:30:4f:a1:b8:ed:c6:c5:15:
        11:d6:ee:f3:97:f4:22:95:48:12:f8:5f:ba:15:71:e5:5f:19:
        44:50:c1:e1:70:bd:3e:48:a8:f3:2c:62:ad:8f:8a:9f:64:c7:
        92:a7:ec:77:8c:5a:78:99:73:7e:77:12:61:28:90:92:a7:e0:
        46:9a:39:29:1d:06:a1:5e:5c:f2:d6:bb:49:73:e2:88:da:ef:
        3f:93:2e:98:b6:7d:01:b5:56:bc:30:08:2a:0a:22:4b:45:92:
        b3:72:94:ff:07:e1:fe:f3:4e:58:38:cf:0e:e1:45:15:e1:93:
        5a:21:52:77:5e:e6:98:17:16:71:b9:e7:8a:a2:2c:5a:d9:d7:
        0b:15:86:70:69:6f:47:80:7e:87:c7:d0:3d:4b:f6:8f:ca:7d:
        8b:6a:45:27:ee:10:72:b7:df:6c:43:1d:75:e3:ae:64:1d:b3:
        30:85:32:32:2a:c2:8f:21:67:58:25:dc:51:6d:a3:6a:06:d1:
        5d:77:b1:dc:33:6c:ba:0c:be:fa:c2:61:8f:30:18:c3:c1:c7:
        6e:6b:d8:17:1d:bf:67:be:ca:af:94:cc:5b:f2:49:a7:00:00:
        00:05:16:46:55:cf:04:6f:4f:43:be:87:22:e6:11:92:45:5d:
        17:31:92:6f:17:15:2c:b5:f6:37:d1:fb:a5:8f:83:1c:ac:7c:
        54:ce:2d:95:ef:b0:d4:44:c8:d5:d8:a3:e5:0a:b4:ba:f0:d0:
        c5:ab:6a:34:88:72:d7:32:22:27:54:13:1b:60:0f:cd:32:e7:
        cc:33:06:47:68:46:80:06:72:11:f7:74:ab:eb:38:23:30:68:
        ad:48:01:e4:77:5e:34:e4:b1:c3:e9:46:a4:96:da:71:12:19:
        b1:c2:7f:53:0f:f6:cd:4a:cf:12:e8:ea:25:1b:89:f6:35:54:
        e9:9b:e1:02:d5:f8:d4:8b:92:56:43:fd:05:3b:4b:0b:dd:8a:
        20:05:2e:18:7e:a1:a8:e8:55:18:3d:40:ff:5e:35:a3:c3:fb
]]></artwork>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
    </section>
    <section anchor="xmss-x509-v3-certificate-example">
      <name>XMSS X.509 v3 Certificate Example</name>
      <t>[EDNOTE: To be provided once id-alg-xmss-hashsig is assigned]</t>
    </section>
    <section anchor="xmssmt-x509-v3-certificate-example">
      <name>XMSS^MT X.509 v3 Certificate Example</name>
      <t>[EDNOTE: To be provided once id-alg-xmssmt-hashsig is assigned]</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks for Russ Housley and Panos Kampanakis for helpful suggestions.</t>
      <t>This document uses a lot of text from similar documents <xref target="SP800208"/>,
(<xref target="RFC3279"/> and <xref target="RFC8410"/>) as well as <xref target="I-D.draft-ietf-lamps-rfc8708bis"/>. Thanks go to the authors of
those documents. "Copying always makes things easier and less error prone" -
<xref target="RFC8411"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
