<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-03"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="November" day="06"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 124?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk of
store and decrypt attacks, where data encrypted today using traditional
algorithms could be decrypted in the future by an attacker with a
Cryptographically-Relevant Quantum Computer (CRQC). While traditional
authentication is only at risk once a CRQC exists, it is important to
consider the transition to post-quantum authentication before this point.
This is particularly relevant for systems where algorithm turn-over is
complex or takes a long time (e.g., long-lived systems with hardware roots of
trust), or where future checks on past authenticity play a role (e.g.,
digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms means
that less cryptanalysis of such algorithms is available than for
long-established counterparts, such as RSA and elliptic-curve based solutions
for confidentiality and authenticity. This has drawn attention to hybrid
cryptographic schemes, which combine both traditional and post-quantum (or
more generally next-generation) algorithms in one cryptographic scheme. These
may offer increased assurance for implementers, namely that as long as the
security of one of the two component algorithms of the hybrid scheme holds,
the confidentiality or authenticity offered by that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Conservative users may not have complete trust in the
post-quantum algorithms or implementations available, while also recognizing
a need to start post-quantum transition. For such users, hybridization can
support near-term transition while also avoiding trusting solo post-quantum
algorithms too early. On the other hand, hybrid schemes, particularly for
authentication, may introduce significant complexity into a system or a
transition process, so might not be the right choice for all.  For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and in an
initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their scheme. It does not attempt to answer the question of whether or not a
hybrid scheme is desirable for, or should be used in a given case. It also
intentionally does not propose concrete hybrid signature combiners or
instantiations thereof. As with the data authenticity guarantees provided by
any digital signature, the security guarantees discussed in this document
are reliant on correct provisioning of the keys involved, e.g. entity
authentication.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
transition, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future transitions to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize a
signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within the
digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in the
case of signature stripping.</t>
          </li>
          <li>
            <t>Stripping attack: A stripping attack refers to a case where an adversary
takes a message and hybrid signature pair and attempts to submit (a
potential modification of) the pair to a component algorithm verifier.  A
common example of a stripping attack includes a message and hybrid
signature, comprised of concatenated post-quantum and traditional
signatures, where an adversary simply removes the post-quantum component
signature and submits the message and traditional component signature to a
traditional verifier.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well. In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Cryptography
Standardization Process <xref target="NIST_PQC_FAQ"/>. Thus, if and when further information
on caveats and implementation issues come to light, it is less likely that a
"break" will be catastrophic. Instead, such vulnerabilities and issues may
represent a weakening of security - which may in turn be offset if a hybrid
approach has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity to a
protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. In terms of risk to data confidentiality
guarantees and therefore key exchange and KEM algorithms, application
of this equation is straightforward. In contrast, it may not be obvious
why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where the
security assumption for the scheme, e.g. EUF-CMA, is maintained as long as at
least one of the component schemes is EUF-CMA secure without a
prioritisation. We call this notion 'hybrid unforgeability'; it is a specific
type of hybrid authentication. For example, the concatenation combiner in
<xref target="HYBRIDSIG"/> is 'hybrid unforgeable'. As mentioned above, this might be
incompatible with backward-compatibility, where the EUF-CMA security of the
hybrid signature relies solely on the security of one of the component
schemes instead of relying on both, e.g., the dual message combiner using
nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our discussion
below. Note that unlike EUF-CMA security, SUF-CMA security of the hybrid
scheme may rely on SUF-CMA security of both component schemes achieving
SUF-CMA, depending on the hybridization approach.  For instance, this can be
clearly seen under a concatenation combiner where the hybrid signature is
comprised of two distinct component signatures; in that case, if either
component signature does not offer SUF-CMA, the hybrid does not achieve
SUF-CMA.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security assumed
for only one component scheme generally use hybrid techniques for their
'functional transition' pathway support, while fully trusting either the
traditional or post-quantum algorithm. E.g., hybrid signatures may be used as
a transition step for when a system or system-of-systems is comprised of some
verifiers that support traditional signatures only while other verifiers are
upgraded to also support post-quantum signatures. In this example, a system
manager is using hybrid signatures as a 'functional transition' support, but
not yet expecting different security guarantees. As such, EUF-CMA security is
assumed for one component algorithm.</t>
            <t>In contrast, use cases where a hybrid scheme is used with e.g., EUF-CMA
security assumed for both component schemes without prioritisation between
them can use hybrid techniques for both functional transition and security
transition, where it may not be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that
an adversary cannot simply “remove” one of the component signatures without
evidence left behind. For example there are artifacts that a carefully
designed verifier may be able to identify, or that are identifiable in later
audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from
potentially creating a valid component digital signature from a hybrid one (a
signature stripping attack), but rather implies that such a digital signature
will contain artifacts of the separation. Thus authentication that is
normally assured under correct verification of digital signature(s), is now
potentially also reliant on further investigation on the receiver side that
may extend well beyond traditional signature verification behavior. For
instance, this can intuitively be seen in cases of a message containing a
context note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one component
signature but not the other, then artifacts in the message itself point to
the possible existence of hybrid signature such as a label stating “this
message must be hybrid signed”. This might be a counter measure against
stripping attacks if the verifier expects a hybrid signature scheme to have
this property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature may
be verified by only verifying one component signature, allowing the scheme to
be used by legacy receivers. In general this means verifying the traditional
component signature scheme, potentially ignoring the post-quantum signature
entirely. This provides an option to transition sender systems to
post-quantum algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided
a hybrid digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component
signature. Backwards compatibility may be further decomposed to subcategories
where component key provenance is either separate or hybrid so as to support
implementations that cannot recognize (and/or process) hybrid signatures or
keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
post-quantum) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot use
and/or process hybrid or post-quantum signatures, whereas in forwards
compatibility the system has those capabilities and can choose what to
support (e.g., for efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component signatures
needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs roughly
simultaneously. Namely, "missing" information needs to be computed by the
verifier so that a normally functioning verification algorithm cannot “quit”
the verification process before both component signatures are verified. This
may additionally cover some error-injection and similar attacks, where an
adversary attempts to make an otherwise honest verifier skip algorithm steps.
SV mimics traditional digital signatures guarantees, essentially ensuring that
the hybrid digital signature behaves as a single algorithm vs. two separate
component stages. Alternatively phrased, under an SV guarantee it is not
possible for an otherwise honest verifier to initiate termination of the
hybrid verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example to achieve backwards/forwards-compatibility), or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible
validity/invalidity of the component signatures until both verify (or fail to
verify). This construct most closely mirrors traditional digital signatures
where, assuming that the verifier does verify a signature at all, the result
is either a positive verification of the full signature or a failure if the
signature is not valid. For fused hybrid signatures, a <tt>full signature</tt>
implies the fusion of both component algorithms, and therefore the strongest
non-separability notion ensures an all-or-nothing approach to verification,
regardless of adversarial action. Examples of algorithms providing this type
of security can be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach.  Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash(comm_1,comm_2,message).  As such, c does not belong to either of the
component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the
adversary 'wins' the security experiment if it can produce a new message such
that a message-signature pair <tt>(m, sig)</tt> correctly verifies. This traditional
security notion has several layers of nuance under a hybrid construct.</t>
      <t>The most straightforward extension of the traditional EUF-CMA security game
would be for the adversary to attempt to produce a new message <tt>m'</tt> that a
message-hybrid signature pair <tt>(m', sig_h)</tt> correctly verifies.  However,
achieving EUF-CMA security in such a straightforward way depends on the
signature choice being strongly non-separable.</t>
      <t>Otherwise, in practical terms, a security experiment must capture the case
that an existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Verify</tt>. As noted in <xref target="I-D.ounsworth-pq-composite-sigs"/>, if such
component-wise verification is possible, some concatenated or nested hybrid
signatures actually do not achieve EUF-CMA. To mitigate the issue, dedicated
keys can be used for the hybrid signature, i.e., keys which are not allowed
to be used in cases of standalone component algorithm verification.  While
such a policy requirement alleviates the risk of an EUF-CMA attack such as
that described in <xref target="I-D.ounsworth-pq-composite-sigs"/>, it is a policy
mitigation and is beyond the scope of normal security analysis and
cryptographic modeling.  Such subtleties in considerations would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip an component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Falko Strenzke, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="10" month="September" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
