<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-04"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="November" day="26"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 124?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk of
store and decrypt attacks, where data encrypted today using traditional
algorithms could be decrypted in the future by an attacker with a
Cryptographically-Relevant Quantum Computer (CRQC). While traditional
authentication is only at risk once a CRQC exists, it is important to
consider the transition to post-quantum authentication before this point.
This is particularly relevant for systems where algorithm turn-over is
complex or takes a long time (e.g., long-lived systems with hardware roots of
trust), or where future checks on past authenticity play a role (e.g.,
digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms means
that less cryptanalysis of such algorithms is available than for
long-established counterparts, such as RSA and elliptic-curve based solutions
for confidentiality and authenticity. This has drawn attention to hybrid
cryptographic schemes, which combine both traditional and post-quantum (or
more generally next-generation) algorithms in one cryptographic scheme. These
may offer increased assurance for implementers, namely that as long as the
security of one of the two component algorithms of the hybrid scheme holds,
the confidentiality or authenticity offered by that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Conservative users may not have complete trust in the
post-quantum algorithms or implementations available, while also recognizing
a need to start post-quantum transition. For such users, hybridization can
support near-term transition while also avoiding trusting solo post-quantum
algorithms too early. On the other hand, hybrid schemes, particularly for
authentication, may introduce significant complexity into a system or a
transition process, so might not be the right choice for all.  For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and in an
initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their scheme. It does not attempt to answer the question of whether or not a
hybrid scheme is desirable for, or should be used in a given case. It also
intentionally does not propose concrete hybrid signature combiners or
instantiations thereof. As with the data authenticity guarantees provided by
any digital signature, the security guarantees discussed in this document
are reliant on correct provisioning of the keys involved, e.g. entity
authentication.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum transition
or use in long-term post-quantum deployment, hence the reference to
post-quantum algorithms through this draft.  However, the majority of the
discussion in this document applies equally well to future transitions to
other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize a
signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within the
digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in the
case of signature stripping.</t>
          </li>
          <li>
            <t>Stripping attack: A stripping attack refers to a case where an adversary
takes a message and hybrid signature pair and attempts to submit (a
potential modification of) the pair to a component algorithm verifier.  A
common example of a stripping attack includes a message and hybrid
signature, comprised of concatenated post-quantum and traditional
signatures, where an adversary simply removes the post-quantum component
signature and submits the message and traditional component signature to a
traditional verifier. Stripping attacks should not be confused with
component message forgery attacks.</t>
          </li>
          <li>
            <t>Component message forgery attacks: A forgery attack refers to a case where
an adversary attempts to forge a (non-hybrid) signature on a message using
the public key associated with a component algorithm. An common example of
such an attack would be a quantum attacker compromising the key associated
with a traditional component algorithm and forging a message and signature
pair.  Message forgery attacks may be formalized with experiments such as
EUF-CMA, while the difference introduced in component message forgery
attacks is that the key is accepted for both hybrid and single algorithm
use. Further discussions on this appear under <xref target="euf-cma-challenges"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well. In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks (e.g., component message forgeries).
Thus, even in a relatively simple algorithm subtleties and caveats on
implementation and use can arise over time. Given the complexity of next
generation algorithms, the chance of such discoveries and caveats needs to
be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Cryptography
Standardization Process <xref target="NIST_PQC_FAQ"/>. Thus, if and when further information
on caveats and implementation issues come to light, it is less likely that a
"break" will be catastrophic. Instead, such vulnerabilities and issues may
represent a weakening of security - which may in turn be offset if a hybrid
approach has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity to a
protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. In terms of risk to data confidentiality
guarantees and therefore key exchange and KEM algorithms, application
of this equation is straightforward. In contrast, it may not be obvious
why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where the
security assumption for the scheme, e.g. EUF-CMA, is maintained as long as at
least one of the component schemes is EUF-CMA secure without a
prioritisation. We call this notion 'hybrid unforgeability'; it is a specific
type of hybrid authentication. For example, the concatenation combiner in
<xref target="HYBRIDSIG"/> is 'hybrid unforgeable'. As mentioned above, this might be
incompatible with backward-compatibility, where the EUF-CMA security of the
hybrid signature relies solely on the security of one of the component
schemes instead of relying on both, e.g., the dual message combiner using
nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our discussion
below. Note that unlike EUF-CMA security, SUF-CMA security of the hybrid
scheme may rely on SUF-CMA security of both component schemes achieving
SUF-CMA, depending on the hybridization approach.  For instance, this can be
clearly seen under a concatenation combiner where the hybrid signature is
comprised of two distinct component signatures; in that case, if either
component signature does not offer SUF-CMA, the hybrid does not achieve
SUF-CMA.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security assumed
for only one component scheme generally use hybrid techniques for their
'functional transition' pathway support, while fully trusting either the
traditional or post-quantum algorithm. E.g., hybrid signatures may be used as
a transition step for when a system or system-of-systems is comprised of some
verifiers that support traditional signatures only while other verifiers are
upgraded to also support post-quantum signatures. In this example, a system
manager is using hybrid signatures as a 'functional transition' support, but
not yet expecting different security guarantees. As such, EUF-CMA security is
assumed for one component algorithm.</t>
            <t>In contrast, use cases where a hybrid scheme is used with e.g., EUF-CMA
security assumed for both component schemes without prioritisation between
them can use hybrid techniques for both functional transition and security
transition, where it may not be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that
an adversary cannot simply “remove” one of the component signatures without
evidence left behind. For example there are artifacts that a carefully
designed verifier may be able to identify, or that are identifiable in later
audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from
potentially creating a valid component digital signature from a hybrid one (a
signature stripping attack), but rather implies that such a digital signature
will contain artifacts of the separation. Thus authentication that is
normally assured under correct verification of digital signature(s), is now
potentially also reliant on further investigation on the receiver side that
may extend well beyond traditional signature verification behavior. For
instance, this can intuitively be seen in cases of a message containing a
context note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one component
signature but not the other, then artifacts in the message itself point to
the possible existence of hybrid signature such as a label stating “this
message must be hybrid signed”. This might be a counter measure against
stripping attacks if the verifier expects a hybrid signature scheme to have
this property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature may
be verified by only verifying one component signature, allowing the scheme to
be used by legacy receivers. In general this means verifying the traditional
component signature scheme, potentially ignoring the post-quantum signature
entirely. This provides an option to transition sender systems to
post-quantum algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided
a hybrid digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component
signature. Backwards compatibility may be further decomposed to subcategories
where component key provenance is either separate or hybrid so as to support
implementations that cannot recognize (and/or process) hybrid signatures or
keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
post-quantum) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot use
and/or process hybrid or post-quantum signatures, whereas in forwards
compatibility the system has those capabilities and can choose what to
support (e.g., for efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component signatures
needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs roughly
simultaneously. Namely, "missing" information needs to be computed by the
verifier so that a normally functioning verification algorithm cannot “quit”
the verification process before both component signatures are verified. This
may additionally cover some error-injection and similar attacks, where an
adversary attempts to make an otherwise honest verifier skip component algorithm
verification. SV mimics traditional digital signatures guarantees, essentially
ensuring that the hybrid digital signature behaves as a single algorithm vs.
two separate component stages. Alternatively phrased, under an SV guarantee it
is not possible for an otherwise honest verifier to initiate termination of the
hybrid verification upon successful verification of one component algorithm
without also knowing if the other component succeeded. Note that SV does not
prevent dishonest verification, such as if a verifier maliciously implements a
customized verification algorithm that is designed with intention to subvert
the hybrid verification process or skips signature verification altogether.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example to achieve backwards/forwards-compatibility), or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible validity of the
component signatures until both verify (or verification failure may or may
not be attributable to a specific component algorithm). This construct most
closely mirrors traditional digital signatures where, assuming that the
verifier does verify a signature at all, the result is either a positive
verification of the full signature or a failure if the signature is not
valid. For fused hybrid signatures, a <tt>full signature</tt> implies the fusion of
both component algorithms, and therefore this type of construction has the
potential to achieve the strongest non-separability notion which ensures an
all-or-nothing approach to verification, regardless of adversarial
action. Examples of algorithms providing this type of security can be found
in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach.  Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash((comm_1, comm_2), Hash2(message)).  As such, c does not belong to either
of the component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the
adversary 'wins' the security experiment if it can produce a new message such
that a message-signature pair <tt>(m, sig)</tt> correctly verifies. This traditional
security notion has several layers of nuance under a hybrid construct.</t>
      <t>The most straightforward extension of the traditional EUF-CMA security game
would be for the adversary to attempt to produce a new message <tt>m'</tt> that a
message-hybrid signature pair <tt>(m', sig_h)</tt> correctly verifies.  However,
achieving EUF-CMA security in such a straightforward way depends on the
signature choice being strongly non-separable.</t>
      <t>Otherwise, in practical terms, a security experiment must capture the case
that an existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Verify</tt>. As noted in <xref target="I-D.ounsworth-pq-composite-sigs"/>, if such
component-wise verification is possible, some concatenated or nested hybrid
signatures actually do not achieve EUF-CMA. To mitigate the issue, dedicated
keys can be used for the hybrid signature, i.e., keys which are not allowed
to be used in cases of standalone component algorithm verification.  While
such a policy requirement alleviates the risk of an EUF-CMA attack such
component message forgeries and as that described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>, it is a policy mitigation and is beyond
the scope of normal security analysis and cryptographic modeling.  Such
subtleties in considerations would need to be accounted for depending on the
signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip an component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Falko Strenzke, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="10" month="September" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
