<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-pquip-pqc-signature-migration-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="PQC Signature Migration Guidance">Guidance for Migration to Composite, Dual, or PQC-Only Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-pquip-pqc-signature-migration-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="28"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>

<t>This document provides guidance for migration from traditional digital
signature algorithms to post-quantum cryptographic (PQC) signature
algorithms. It compares three models under discussion in the IETF for
PKI-based protocols: composite certificates, dual
certificates, and PQC-only certificates. The goal is to help operators
and engineers working on cryptographic libraries, network security, and
PKI/key management infrastructure select an approach that balances
interoperability, security, and operational efficiency during the
transition to post-quantum authentication.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/tireddy2/pqc-cert-guidance"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of cryptographically relevant quantum computer (CRQC) poses a
threat to widely deployed public-key algorithms such as RSA and elliptic-curve
cryptography (ECC). Post-quantum algorithms are being standardized by NIST
and other bodies, but migration is not immediate. In the meantime, protocols
need to ensure that authentication mechanisms remain secure against both
classical and quantum adversaries.</t>
      <t>For data authentication, the primary concern is the risk of on-path
attackers equipped with CRQCs. Such adversaries could break
certificate-based mechanisms that rely on traditional algorithms
(e.g., RSA, ECDSA), allowing them to impersonate servers and clients, and mount
man-in-the-middle (MitM) attacks. In this scenario, attackers could also
suppress PQC certificates and present only traditional ones, enabling
downgrades. These risks highlight the need to transition certificate-based
authentication toward post-quantum security, using hybrid signature
schemes as an intermediate step before PQC-only adoption.</t>
      <t>The IETF has developed two hybrid transition models for use in TLS, IKEv2/IPsec,
JOSE/COSE, and PKIX:</t>
      <ul spacing="compact">
        <li>
          <t>Composite certificates: A single X.509 certificate that contains a composite
public key and composite signature, combining a traditional and a PQC algorithm
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Dual certificates: Two separate certificates, one traditional and one PQC algorithm,
issued for the same identity, presented and validated together <xref target="RFC9763"/>.</t>
        </li>
      </ul>
      <t>Another approach is using a Post-Quantum certificate,</t>
      <ul spacing="compact">
        <li>
          <t>PQC-only certificates: A certificate or signature that uses only a PQ
algorithm (<xref target="I-D.ietf-lamps-dilithium-certificates"/> for ML-DSA and
<xref target="I-D.ietf-lamps-x509-slhdsa"/> for SLH-DSA).</t>
        </li>
      </ul>
      <t>This document provides guidance on selecting among the two hybrid
certificate models and the PQC-only model depending on the deployment
context, the readiness of the supporting ecosystem, and security
requirements.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms "composite certificates", "dual certificates", and
"PQC-only certificates" as introduced in the Introduction.</t>
      <t>Composite: A key, certificate, or signature that merges traditional
and PQC algorithms into one object.</t>
      <t>The terms hybrid signature scheme and hybrid signature are used as
defined in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
    </section>
    <section anchor="motivation-for-pqc-signatures">
      <name>Motivation for PQC Signatures</name>
      <t>Unlike "Harvest Now, Decrypt Later" attacks that target confidentiality,
this risk directly impacts authentication and trust. Once a CRQC is
available, the continued use of traditional certificates becomes untenable.
In practice, however, the availability of a CRQC may not be publicly disclosed.
Similar to a zero-day vulnerability, an adversary could secretly exploit CRQC
capabilities to compromise traditional certificates without alerting the wider
ecosystem.</t>
      <t>Addressing this risk requires replacing traditional signatures with PQC signatures, which in turn
demands ecosystem-wide upgrades involving cryptographic libraries, HSMs, TPMs, CAs, intermediate CAs,
and dependent protocols. Because these transitions take years of planning, coordination, and
investment, preparations will have to begin well before a CRQC is publicly known.</t>
    </section>
    <section anchor="composite-certificates">
      <name>Composite certificates</name>
      <t>A composite certificate contains both a traditional public key
algorithm (e.g., ECDSA) and a post-quantum algorithm (e.g., ML-DSA)
within a single X.509 certificate. This design enables both algorithms
to be used in parallel, the traditional component ensures
compatibility with existing infrastructure, while the post-quantum
component introduces resistance against future quantum attacks.</t>
      <t>Composite certificates are defined in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum
algorithms like ML-DSA with traditional algorithms such as
RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide
additional protection against vulnerabilities or implementation bugs
in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies
how composite certificates are used for TLS 1.3 authentication. In
this case, relying parties validate a single certification path
anchored in a multi-algorithm trust anchor, without the need for
parallel chains.</t>
      <section anchor="advantages">
        <name>Advantages</name>
        <ul spacing="compact">
          <li>
            <t>A single certificate chain supports both traditional and PQC algorithms, thereby
simplifying certificate management.</t>
          </li>
          <li>
            <t>A single composite certificate, conveyed within one certificate chain, reduces
protocol message size compared to transmitting multiple separate signatures,
each requiring its own certificate chain.</t>
          </li>
          <li>
            <t>No need to manage or validate multiple parallel certificate chains.</t>
          </li>
          <li>
            <t>No significant modifications to the base protocol are required to support the
composite approach.</t>
          </li>
        </ul>
      </section>
      <section anchor="disadvantages">
        <name>Disadvantages</name>
        <ul spacing="compact">
          <li>
            <t>Requires clients, servers, and CAs to support composite public keys
and composite signature verification, which are not widely deployed at the
time of writing of the specification.</t>
          </li>
          <li>
            <t>Introduces new certificate formats and signature generation and verification
mechanisms, requiring updates to PKI infrastructure.</t>
          </li>
          <li>
            <t>Requires multiple migration steps, with deployments moving from
Traditional-only to Composite, and later from Composite to PQC-only.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="dual-certificates">
      <name>Dual Certificates</name>
      <t>Dual certificates rely on issuing two separate certificates for the same
identity: one with a traditional algorithm (e.g., RSA or ECDSA) and one with
a post-quantum algorithm (e.g., ML-DSA). Both certificates are presented
and validated during authentication, providing hybrid assurance without
requiring new certificate formats.</t>
      <section anchor="advantages-1">
        <name>Advantages</name>
        <ul spacing="compact">
          <li>
            <t>Uses standard, single-algorithm X.509 certificates and chains,
maximizing compatibility with existing PKI infrastructures.</t>
          </li>
          <li>
            <t>Maintains clear separation between traditional and PQC keys.</t>
          </li>
          <li>
            <t>Requires only one migration step, with deployments moving from
Traditional-only to Dual certificates, and later removing support for
Traditional certificates.</t>
          </li>
          <li>
            <t>Better suited for multi-tenancy cases, where different tenants may
prefer different combinations of traditional and PQ algorithms, avoiding the
need for consensus on a composite set.</t>
          </li>
          <li>
            <t>Facilitates simpler future transitions to new PQC algorithms, since a new
PQC certificate can simply be issued and paired with an existing certificate,
without requiring new composite definitions.</t>
          </li>
        </ul>
      </section>
      <section anchor="disadvantages-1">
        <name>Disadvantages</name>
        <ul spacing="compact">
          <li>
            <t>Increases protocol message size due to the transmission of multiple
certificate chains and signatures.</t>
          </li>
          <li>
            <t>Requires management of multiple certificates.</t>
          </li>
          <li>
            <t>Requires significant protocol changes to support validation of two end-entity
certificates and to ensure they are cryptographically bound to the same
identity, as protocols typically validate only a single certificate.</t>
          </li>
          <li>
            <t>Complicates debuggability and troubleshooting, since validation failures
may arise from either chain.</t>
          </li>
          <li>
            <t>Increases operational cost, as operators must obtain and manage two end-entity
certificates from CAs, which can be significant in large-scale deployments.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="pqc-only-certificates">
      <name>PQC-Only Certificates</name>
      <t>PQC-only certificates represent the final stage of migration. They use
only a post-quantum algorithm and provide no fallback to traditional algorithms.</t>
      <section anchor="advantages-2">
        <name>Advantages</name>
        <ul spacing="compact">
          <li>
            <t>Simpler model without the complexity of hybrid signature scheme.</t>
          </li>
          <li>
            <t>Forward-looking design, avoiding eventual deprecation of traditional
algorithms.</t>
          </li>
          <li>
            <t>Reduced operational burden compared to managing dual or composite certificates.</t>
          </li>
        </ul>
      </section>
      <section anchor="disadvantages-2">
        <name>Disadvantages</name>
        <ul spacing="compact">
          <li>
            <t>Risk if a deployed PQC algorithm is broken due to a bug.</t>
          </li>
          <li>
            <t>No interoperability with legacy systems that only support traditional
algorithms.</t>
          </li>
          <li>
            <t>Deployment is only feasible once PQC algorithms are standardized and
broadly supported across the ecosystem.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="negotiation-of-authentication-schemes">
      <name>Negotiation of Authentication Schemes</name>
      <t>During the transition, endpoints may support multiple authentication
schemes (e.g., traditional, composite, dual, or PQC-only). Clients
advertise their supported schemes using the protocol's negotiation
mechanism (for example, the 'signature_algorithms' extension in TLS
<xref target="RFC8446"/>), and servers select from the client's list or fail the
authentication if no common option is available. In practice,
deployments are expected to prefer PQC-only or hybrid signature scheme
over traditional ones, with the choice between PQC-only
and hybrid signature scheme influenced by regulatory mandates or
by whether defense-in-depth is prioritized.</t>
    </section>
    <section anchor="operational-and-ecosystem-considerations">
      <name>Operational and Ecosystem Considerations</name>
      <t>Migration to post-quantum authentication requires addressing broader
ecosystem dependencies, including trust anchors, hardware security modules,
and constrained devices.</t>
      <section anchor="trust-anchors-and-transitions">
        <name>Trust Anchors and Transitions</name>
        <t>Trust anchors represent the ultimate root of trust in a PKI. If existing
trust anchors are RSA or ECC-based, then new PQC-capable trust anchors will
need to be distributed. Operators will have to plan for a phased introduction of
PQC trust anchors, which may involve:</t>
        <ul spacing="compact">
          <li>
            <t>Rolling out composite trust anchors that support both traditional and PQC
signatures.</t>
          </li>
          <li>
            <t>Establishing parallel trust anchor hierarchies and phasing out the
traditional hierarchy once PQC adoption is universal.</t>
          </li>
          <li>
            <t>Ensuring secure and authenticated distribution of updated trust anchors
to clients, especially devices that cannot be easily updated.</t>
          </li>
        </ul>
        <t>Deployments migrating from traditional to post-quantum authentication
may have to operate with multiple trust anchors for a period of time.
A new PQC or composite root may be introduced, or alternatively a PQ
intermediate may be added beneath an existing traditional root,
leading to different trust chain models:</t>
        <ul spacing="compact">
          <li>
            <t>Traditional chain: anchored in a Traditional root (e.g., RSA/ECDSA),
which may issue a PQC intermediate.</t>
          </li>
          <li>
            <t>PQC chain: anchored in a PQC root (e.g., ML-DSA, SLH-DSA).</t>
          </li>
          <li>
            <t>Parallel roots: both a traditional root and a PQC root are distributed as
trust anchors, with separate hierarchies operating in parallel until the
traditional root can be phased out.</t>
          </li>
          <li>
            <t>Composite chain: anchored in a composite root and using composite
algorithms, with a single certificate chain that combines traditional and
PQC public keys and signatures. This forms a distinct chain, rather
than two parallel ones.</t>
          </li>
        </ul>
        <t>During this coexistence phase, clients generally fall into five categories:</t>
        <ol spacing="compact" type="1"><li>
            <t>Legacy-only: trust only traditional roots and support only
traditional algorithms.</t>
          </li>
          <li>
            <t>Mixed: trust only traditional roots but support both traditional and
PQC algorithms. These clients can validate PQC certificates only if a PQC
intermediate is cross-signed by a traditional root.</t>
          </li>
          <li>
            <t>Dual-trust: trust both traditional and PQC roots, supporting both
algorithm families.</t>
          </li>
          <li>
            <t>Composite-trust: trusts composite root and support composite
algorithms, validating a single chain that integrates traditional and PQ
signatures.</t>
          </li>
          <li>
            <t>PQC-only: trust only PQC roots and support only PQC algorithms.</t>
          </li>
        </ol>
        <t>The main challenge is that servers cannot easily distinguish between mixed
clients (2) and dual-trust clients (3), since both advertise PQC algorithms,
but only dual-trust clients actually recognize PQC roots. To ensure
compatibility with mixed clients (2), servers may default to sending longer
PQC chains that include a cross-signed PQC root (i.e., a PQC root certificate
signed by a traditional root). However, this is unnecessary and even counterproductive
for dual-trust clients (3), which already trust the PQC root directly;
such clients will fail to validate the cross-signed PQC root. For dual-trust clients,
including the cross-signed PQC root only increases message size and introduces
validation errors.</t>
        <t><xref target="I-D.ietf-tls-trust-anchor-ids"/> (TAI) addresses this problem by allowing
clients to indicate, on a per-connection basis, which trust anchors they
recognize. Servers can use that information to select a compatible certificate
chain, reducing unnecessary chain elements and providing operators with better
telemetry on PQC adoption. TAI also enables PQC-capable clients to tell PQC-aware
servers exactly which PQC trust anchors they recognize, while still supporting
traditional roots for compatibility with legacy servers.</t>
        <t>In all cases, the long-term goal is a transition to PQC-only roots and
certificate chains. Hybrid signature schemes help bridge
the gap, but operators will have to plan carefully for the eventual retirement of
traditional and composite roots once PQC adoption is widespread.</t>
      </section>
      <section anchor="multiple-transitions-and-crypto-agility">
        <name>Multiple Transitions and Crypto-Agility</name>
        <t>Post-quantum migration is not a single event. There may be multiple
transitions over time, as:</t>
        <ul spacing="compact">
          <li>
            <t>Traditional signature algorithms are gradually retired.</t>
          </li>
          <li>
            <t>Initial PQC signature algorithms are standardized and deployed.</t>
          </li>
          <li>
            <t>New PQC signature algorithms may replace early ones due to cryptanalysis or
efficiency improvements.</t>
          </li>
        </ul>
        <t>Protocols and infrastructures will have to be designed with crypto-agility in mind,
supporting:</t>
        <ul spacing="compact">
          <li>
            <t>Negotiation of standalone PQC algorithms and hybrid signature schemes.</t>
          </li>
          <li>
            <t>Phased migration paths, including initial use of hybrid signature schemes,
eventual transition to PQC-only certificates, and later migration
to new PQC algorithms as cryptanalysis or security policy guidance evolves.</t>
          </li>
          <li>
            <t>Protection against downgrade attacks across all transition phases.</t>
          </li>
        </ul>
      </section>
      <section anchor="support-from-hardware-security-modules-hsms">
        <name>Support from Hardware Security Modules (HSMs)</name>
        <t>Many organizations rely on HSMs for secure key storage and operations.
Challenges include:</t>
        <ul spacing="compact">
          <li>
            <t>HSMs must be upgraded to support PQC algorithms and, where relevant,
composite or dual key management models.</t>
          </li>
          <li>
            <t>PQC algorithms often have larger key sizes and signatures, requiring
sufficient memory and processing capability in HSMs.</t>
          </li>
          <li>
            <t>For dual certificate deployments, HSMs can manage the underlying
traditional and PQC private keys independently, and no API changes are
required. The security protocol is responsible for coordinating how
signatures from both keys are used. By contrast, supporting composite
keys and composite signing operations will require HSM and API extensions
to represent composite private keys and perform multi-algorithm signing
atomically.</t>
          </li>
        </ul>
        <t>Without HSM vendor support for PQC, migration may be delayed or require
software-based fallback solutions, which will weaken security.</t>
      </section>
      <section anchor="constrained-devices-and-iot-environments">
        <name>Constrained Devices and IoT Environments</name>
        <t>Constrained environments, such as IoT devices, present unique challenges
for PQC deployment due to limited processing, memory, and bandwidth.
Guidance is provided in <xref target="I-D.ietf-pquip-pqc-hsm-constrained"/>, including
the use of seeds for efficient key generation, PQC-protected firmware
updates, and other techniques for enabling PQC in lightweight HSMs and
resource-constrained devices.</t>
      </section>
    </section>
    <section anchor="transition-considerations">
      <name>Transition Considerations</name>
      <t>A deployment will typically adopt one of three models, PQC-only certificates,
dual certificates, or composite certificates.</t>
      <t>The choice depends on several factors, including:</t>
      <ul spacing="compact">
        <li>
          <t>Frequency and duration of system upgrades</t>
        </li>
        <li>
          <t>The expected timeline for CRQC availability</t>
        </li>
        <li>
          <t>Operational flexibility to deploy, enable, and retire PQC algorithms</t>
        </li>
        <li>
          <t>Availability of automated certificate provisioning mechanisms
(e.g., ACME <xref target="RFC8555"/>, CMP <xref target="RFC9810"/>)</t>
        </li>
      </ul>
      <t>Deployments with limited flexibility benefit from hybrid signature schemes.
These approaches mitigate risks associated with delays in
transitioning to PQC and provide an immediate safeguard against zero-day
vulnerabilities. Both approaches improve resilience during migration, but
they do so in different ways and carry different operational trade-offs.</t>
      <t>Hybrid signature schemes enhance resilience during the adoption of
PQC by:</t>
      <ul spacing="compact">
        <li>
          <t>Providing defense in depth: security is maintained as long as either
the PQC or traditional algorithm remains unbroken.</t>
        </li>
        <li>
          <t>Reducing exposure to unforeseen vulnerabilities: immediate protection
against weaknesses in PQC algorithms.</t>
        </li>
      </ul>
      <t>However, each approach comes with long-term implications.</t>
      <section anchor="composite-certificates-1">
        <name>Composite Certificates</name>
        <t>Composite certificate embeds both a traditional and a PQC algorithm into a
single certificate and signature. However, once a traditional algorithm is no
longer secure against CRQCs, it will have to be deprecated. For discussion
of the security impact in security protocols (e.g., TLS, IKEv2)
versus artifact-signing use cases, see Section <xref target="suf"/>.</t>
        <t>To complete the transition to a fully quantum-resistant authentication model,
operators will need a PQC CA root and CA intermediates, resulting in PQC-only
end-entity certificates.</t>
        <t>Protocol configurations (e.g., TLS, IKEv2) will likewise
need to be updated to negotiate only PQC-based authentication, ensuring that
the entire certification path and protocol handshake are cryptographically
resistant to quantum attacks and no longer depend on any traditional
algorithms.</t>
      </section>
      <section anchor="dual-certificates-1">
        <name>Dual Certificates</name>
        <t>When CRQCs become available, the traditional certificate chain will no
longer be secure. At that point, the traditional chain must be removed,
and the protocol configuration updated so that only the PQC certificate
chain is presented and validated. This requires careful coordination
during the transition, since legacy clients that cannot process PQC
certificates will lose access once the traditional chain is withdrawn.
Dual certificate deployments therefore defer, but do not avoid, the need
to update protocol configurations and move to a PQC-only environment.</t>
      </section>
      <section anchor="suf">
        <name>Loss of Strong Unforgeability in Composite and Dual Certificates</name>
        <t>A deployment may choose to continue using a composite or dual certificate
configuration even after a traditional algorithm has been broken by the
advent of a CRQC. While this may simplify operations by avoiding
re-provisioning of trust anchors, it introduces a significant risk:
security properties degrade once one component of the hybrid is no longer
secure.</t>
        <t>In composite certificates, the composite signature will no longer achieve Strong
Unforgeability under chosen message attack (SUF-CMA) (see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>
and Section 10.2 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/>). A CRQC can forge the
broken traditional signature component (s1<em>) over a message (m). That forged
component can then be combined with the valid post-quantum component (s2) to
produce a new composite signature (m, (s1</em>, s2)) that verifies successfully,
thereby violating SUF-CMA.</t>
        <t>In dual certificate deployments where the client requires both a
traditional and a PQC chain, the SUF-CMA property is likewise not achieved once
the traditional algorithm is broken.</t>
        <t>In protocols such as TLS and IKEv2, a composite signature remains
secure against impersonation as long as at least one component algorithm
remains unbroken, because verification succeeds only if every
component signature validates over the same canonical message defined
by the authentication procedure. However, in artifact signing
use cases, the break of a single component does not enable forgery of a
composite signature but does enable "repudiation": multiple distinct
composite signatures can exist for the same artifact, undermining the
"one signature, one artifact" guarantee. This creates ambiguity about
which composite signature is authentic, complicating long-term
non-repudiation guarantees.</t>
        <t>Hybrid signature schemes should not be used for artifact signing (e.g., software packages),
since the loss of SUF-CMA makes them unsuitable for long-term non-repudiation.
In security protocols (e.g., TLS, IKEv2), hybrid signature schemes may continue to
function for a limited time after a CRQC is realized, since they still provide
impersonation resistance as long as one component algorithm remains secure.
This situation does not constitute a zero-day vulnerability requiring an
immediate upgrade. However, operators will have to plan an orderly migration
to PQC-only certificates in order to restore SUF-CMA security guarantees.</t>
      </section>
    </section>
    <section anchor="migration-guidance">
      <name>Migration Guidance</name>
      <ul spacing="compact">
        <li>
          <t>Long-term to adopt and deploy:: Dual certificates have been standardized in
<xref target="RFC9763"/>. However, at the time of writing, none of
the security protocols (e.g., TLS, IKEv2, JOSE/COSE) have
adopted this mechanism. The proposals are being discussed in IKEv2
(<xref target="I-D.hu-ipsecme-pqt-hybrid-auth"/>), TLS
(<xref target="I-D.yusef-tls-pqt-dual-certs"/>), and in the form of paired
certificates with a single certificate
(<xref target="I-D.bonnell-lamps-chameleon-certs"/>).</t>
        </li>
        <li>
          <t>Medium-term to adopt and deploy: Composite certificates become viable once
ecosystem support across PKIX, IPsec, JOSE/COSE, and TLS is mature.
Composite ML-DSA is already being standardized in the LAMPS WG
(<xref target="I-D.ietf-lamps-pq-composite-sigs"/>) and leveraged in
<xref target="I-D.reddy-tls-composite-mldsa"/> for TLS,
<xref target="I-D.hu-ipsecme-pqt-hybrid-auth"/> for IPsec/IKEv2, and
<xref target="I-D.prabel-jose-pq-composite-sigs"/> for JOSE/COSE.</t>
        </li>
        <li>
          <t>Long-to-medium term to adopt and deploy: PQC-only certificates are the final goal, once PQ
algorithms are well-established, trust anchors have been updated,
HSMs and devices support PQC operations, and traditional
algorithms are fully retired. Work to enable PQC signatures is already
underway in JOSE/COSE <xref target="I-D.ietf-cose-dilithium"/>, TLS <xref target="I-D.ietf-tls-mldsa"/>,
and IPsec <xref target="I-D.ietf-ipsecme-ikev2-pqc-auth"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="use-of-slh-dsa-in-pqc-only-deployments">
      <name>Use of SLH-DSA in PQC-Only Deployments</name>
      <t>SLH-DSA does not introduce any new hardness assumptions beyond those inherent
to its underlying hash functions. It builds upon established cryptographic
foundations, making it a reliable and robust digital signature scheme for a
post-quantum world. While attacks on lattice-based schemes such as ML-DSA are
currently hypothetical, if realized they could compromise the security of those
schemes. SLH-DSA would remain unaffected by such attacks due to its distinct
mathematical foundations, helping to ensure the ongoing security of systems and
protocols that rely on it for digital signatures. Unlike ML-DSA, SLH-DSA is not
defined for use in composite certificates and is intended to be deployed directly
in PQC-only certificate hierarchies.</t>
      <t>SLH-DSA may be used for both end-entity and CA certificates. It provides strong
post-quantum security but produces larger signatures than ML-DSA or traditional
algorithms. At security levels 1, 3, and 5, two parameter sets are available:</t>
      <ul spacing="compact">
        <li>
          <t>"Small" (s) variants minimize signature size, ranging from 7856 bytes
(128-bit) to 29792 bytes (256-bit).</t>
        </li>
        <li>
          <t>"Fast" (f) variants optimize key generation and signing speed, with
signature sizes from 17088 bytes (128-bit) to 29792 bytes (256-bit),
but slower verification performance.</t>
        </li>
      </ul>
      <t>Because of these large signatures, SLH-DSA will increase handshake size in
protocols such as TLS 1.3 or IKEv2. However, the impact on performance is
minimal for long-lived connections or large data transfers, where handshake
overhead is amortized over session duration (e.g., DTLS-in-SCTP in 3GPP N2
interfaces, or signature authentication in IKEv2 using PQC
<xref target="I-D.ietf-ipsecme-ikev2-pqc-auth"/>).</t>
      <t>In deployments where minimizing handshake size is critical, operators may
prefer SLH-DSA for root and intermediate certificates while using smaller-
signature algorithms (e.g., ML-DSA) in end-entity certificates or in the
"CertificateVerify" message.</t>
      <t>Mechanisms such as Abridged TLS Certificate Chains <xref target="I-D.ietf-tls-cert-abridge"/> and
Suppressing CA Certificates <xref target="I-D.kampanakis-tls-scas-latest"/> reduce handshake size
by limiting certificate exchange to only end-entity certificates. In such cases,
intermediate certificates are assumed to be known to the peer, allowing the use of
larger signature algorithms like SLH-DSA for those certificates without adding
overhead to the handshake.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Hybrid signature schemes are designed to provide defense in depth during the migration to PQC.
Their goal is to ensure that authentication remains secure as long as at least one of the algorithms
in use remains unbroken. However, several important security considerations arise.</t>
      <section anchor="downgrade-attacks">
        <name>Downgrade Attacks</name>
        <t>Implementations must ensure downgrade protection so that an adversary cannot
suppress PQC or hybrid schemes and force reliance solely on traditional
algorithms. This is especially important in scenarios where a CRQC is
available but not publicly disclosed. Without downgrade protection, a MitM
attacker could impersonate servers by presenting only traditional
certificates even when PQC certificates are supported.</t>
      </section>
      <section anchor="strong-unforgeability-versus-existential-unforgeability">
        <name>Strong Unforgeability versus Existential Unforgeability</name>
        <t>In hybrid signature schemes, once one component algorithm
is broken (e.g., the traditional algorithm under a CRQC), the overall scheme
no longer achieves SUF-CMA. While Existential Unforgeability under chosen message attack
(EUF-CMA) (see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>) is still
preserved by the PQC component, meaning that an adversary who can obtain signatures on
arbitrary messages still cannot forge a valid PQC signature on any new message that
was not previously signed. The loss of SUF-CMA means that hybrid mechanisms will
have be eventually retired once traditional algorithms are no longer secure.</t>
      </section>
      <section anchor="operational-risks">
        <name>Operational Risks</name>
        <t>Managing multiple certificate paths (composite, dual, and PQC-only) increases
the risk of misconfiguration and operational errors. For example, a server
might continue using a hybrid signature scheme after the traditional algorithm
is broken, fail to revoke traditional certificates that are no longer secure,
or select the wrong chain for a given client, resulting in clients receiving a
certificate path they cannot validate.</t>
        <t>Clear operational guidance and automated monitoring are essential to minimize
these risks. Operators need best practices for certificate lifecycle and
migration planning, along with automated checks to ensure PQC chains remain
present, valid, and not replaced by weaker alternatives.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Martin McGrath, Suresh P. Nair, and German Peinado for the detailed review.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="20" month="September" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet security
   best practices and regulatory guidelines.  Composite ML-DSA is
   applicable in any application that uses X.509 or PKIX data structures
   that accept ML-DSA, but where the operator wants extra protection
   against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-08"/>
        </reference>
        <reference anchor="RFC9763">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="A. Becker" initials="A." surname="Becker"/>
            <author fullname="R. Guthrie" initials="R." surname="Guthrie"/>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document defines a new Certificate Signing Request (CSR) attribute, relatedCertRequest, and a new X.509 certificate extension, RelatedCertificate. The use of the relatedCertRequest attribute in a CSR and the inclusion of the RelatedCertificate extension in the resulting certificate together provide additional assurance that two certificates each belong to the same end entity. This mechanism is particularly useful in the context of non-composite hybrid authentication, which enables users to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9763"/>
          <seriesInfo name="DOI" value="10.17487/RFC9763"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-07"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-tls-trust-anchor-ids">
          <front>
            <title>TLS Trust Anchor Identifiers</title>
            <author fullname="Bob Beck" initials="B." surname="Beck">
              <organization>OpenSSL</organization>
            </author>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Devon O'Brien" initials="D." surname="O'Brien">
         </author>
            <author fullname="Kyle Nekritz" initials="K." surname="Nekritz">
              <organization>Meta</organization>
            </author>
            <date day="15" month="September" year="2025"/>
            <abstract>
              <t>   This document defines the TLS Trust Anchors extension, a mechanism
   for relying parties to convey trusted certification authorities.  It
   describes individual certification authorities more succinctly than
   the TLS Certificate Authorities extension.

   Additionally, to support TLS clients with many trusted certification
   authorities, it supports a mode where servers describe their
   available certification paths and the client selects from them.
   Servers may describe this during connection setup, or in DNS for
   lower latency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-trust-anchor-ids-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-hsm-constrained">
          <front>
            <title>Adapting Constrained Devices for Post-Quantum Cryptography</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Ben S" initials="B." surname="S">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   This document offers guidance on incorporating Post-Quantum
   Cryptography (PQC) into resource-constrained devices, including IoT
   devices and lightweight Hardware Security Modules (HSMs), which
   operate under tight limitations on compute power, memory, storage,
   and energy.  It highlights how the Root of Trust acts as the
   foundation for secure operations, enabling features such as seed-
   based key generation to reduce the need for persistent storage,
   efficient approaches to managing ephemeral keys, and methods for
   offloading cryptographic tasks in low-resource environments.
   Additionally, it examines how PQC affects firmware update mechanisms
   in such constrained systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-hsm-constrained-01"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-09"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-pqc-auth">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   Signature-based authentication methods are utilized in IKEv2
   [RFC7296].  The current version of the Internet Key Exchange Version
   2 (IKEv2) protocol supports traditional digital signatures.

   This document specifies a generic mechanism for integrating post-
   quantum cryptographic (PQC) digital signature algorithms into the
   IKEv2 protocol.  The approach allows for seamless inclusion of any
   PQC signature scheme within the existing authentication framework of
   IKEv2.  Additionally, it outlines how Module-Lattice-Based Digital
   Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-
   DSA), can be employed as authentication methods within the IKEv2
   protocol, as they have been standardized by NIST.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9810">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="M. Ounsworth" initials="M." surname="Ounsworth"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides interactions between client systems and PKI components such as a Registration Authority (RA) and a Certification Authority (CA).</t>
              <t>This document adds support for management of certificates containing a Key Encapsulation Mechanism (KEM) public key and uses EnvelopedData instead of EncryptedValue. This document also includes the updates specified in Section 2 and Appendix A.2 of RFC 9480.</t>
              <t>This document obsoletes RFC 4210, and together with RFC 9811, it also obsoletes RFC 9480. Appendix F of this document updates Section 9 of RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9810"/>
          <seriesInfo name="DOI" value="10.17487/RFC9810"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.hu-ipsecme-pqt-hybrid-auth">
          <front>
            <title>Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="Jun Hu" initials="J." surname="Hu">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yasufumi Morioka" initials="Y." surname="Morioka">
              <organization>NTT DOCOMO, INC.</organization>
            </author>
            <author fullname="Guilin WANG" initials="G." surname="WANG">
              <organization>Huawei</organization>
            </author>
            <date day="1" month="May" year="2025"/>
            <abstract>
              <t>   One IPsec area that would be impacted by Cryptographically Relevant
   Quantum Computer (CRQC) is IKEv2 authentication based on traditional
   asymmetric cryptographic algorithms: e.g RSA, ECDSA; which are widely
   deployed authentication options of IKEv2.  There are new Post-Quantum
   Cryptographic (PQC) algorithms for digital signature like NIST
   [ML-DSA], however it takes time for new cryptographic algorithms to
   mature, so there is security risk to use only the new algorithm
   before it is field proven.  This document describes a IKEv2 hybrid
   authentication scheme that could contain both traditional and PQC
   algorithms, so that authentication is secure as long as one algorithm
   in the hybrid scheme is secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-02"/>
        </reference>
        <reference anchor="I-D.yusef-tls-pqt-dual-certs">
          <front>
            <title>Post-Quantum Traditional (PQ/T) Hybrid Authentication with Dual Certificates in TLS 1.3</title>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Ciena</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="18" month="June" year="2025"/>
            <abstract>
              <t>   This document extends the TLS 1.3 authentication mechanism to allow
   the negotiation and use of two signature algorithms to enable dual-
   algorithm hybrid authentication, ensuring that an attacker would need
   to break both algorithms to compromise the session.  The two
   signature algorithms come from two independent certificates that
   together produce a single Certificate and CertificateVerify message.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-yusef-tls-pqt-dual-certs-00"/>
        </reference>
        <reference anchor="I-D.bonnell-lamps-chameleon-certs">
          <front>
            <title>A Mechanism for Encoding Differences in Paired Certificates</title>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="D. Hook" initials="D." surname="Hook">
              <organization>KeyFactor</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <date day="16" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies a method to efficiently convey the
   differences between two certificates in an X.509 version 3 extension.
   This method allows a relying party to extract information sufficient
   to reconstruct the paired certificate and perform certification path
   validation using the reconstructed certificate.  In particular, this
   method is especially useful as part of a key or signature algorithm
   migration, where subjects may be issued multiple certificates
   containing different public keys or signed with different CA private
   keys or signature algorithms.  This method does not require any
   changes to the certification path validation algorithm as described
   in RFC 5280.  Additionally, this method does not violate the
   constraints of serial number uniqueness for certificates issued by a
   single certification authority.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonnell-lamps-chameleon-certs-06"/>
        </reference>
        <reference anchor="I-D.prabel-jose-pq-composite-sigs">
          <front>
            <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
            <author fullname="Lucas Prabel" initials="L." surname="Prabel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sun Shuzhou" initials="S." surname="Shuzhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="22" month="August" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for PQ/T
   hybrid composite signatures.  The composite algorithms described
   combine ML-DSA as the post-quantum component and either ECDSA or
   EdDSA as the traditional component.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prabel-jose-pq-composite-sigs-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-cert-abridge">
          <front>
            <title>Abridged Compression for WebPKI Certificates</title>
            <author fullname="Dennis Jackson" initials="D." surname="Jackson">
              <organization>Mozilla</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This draft defines a new TLS Certificate Compression scheme which
   uses a shared dictionary of root and intermediate WebPKI
   certificates.  The scheme smooths the transition to post-quantum
   certificates by eliminating the root and intermediate certificates
   from the TLS certificate chain without impacting trust negotiation.
   It also delivers better compression than alternative proposals whilst
   ensuring fair treatment for both CAs and website operators.  It may
   also be useful in other applications which store certificate chains,
   e.g.  Certificate Transparency logs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-cert-abridge-02"/>
        </reference>
        <reference anchor="I-D.kampanakis-tls-scas-latest">
          <front>
            <title>Suppressing CA Certificates in TLS 1.3</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="5" month="January" year="2023"/>
            <abstract>
              <t>   A TLS client or server that has access to the complete set of
   published intermediate certificates can inform its peer to avoid
   sending certificate authority certificates, thus reducing the size of
   the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
