<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-driscoll-pqt-hybrid-terminology-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="PQT Hybrid Terminology">Terminology for Post-Quantum Traditional Hybrid Schemes</title>
    <seriesInfo name="Internet-Draft" value="draft-driscoll-pqt-hybrid-terminology-00"/>
    <author fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>florence.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2022" month="July" day="08"/>
    <area>SEC</area>
    <workgroup>TBD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms.  This document defines terminology for such schemes.  It is intended to ensure consistency and clarity across different protocols, standards, and organisations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-driscoll-pqt-hybrid-terminology/"/>.
      </t>
      <t>
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The mathematical problems of integer factorisation and discrete logarithms over finite fields or elliptic curves underpin most of the asymmetric algorithms used for key establishment and digital signatures on the internet.  These problems, and hence the algorithms based on them, will be vulnerable to attacks using Shor's Algorithm on a sufficiently large general-purpose quantum computer, known as a Cryptographically Relevant Quantum Computer (CRQC).  It is difficult to predict when, or if, such a device will exist.  However, it is necessary to defend against this possibility.  Data encrypted today with an algorithm vulnerable to a quantum computer could be stored for decryption by a future attacker with a CRQC.  Signing algorithms that are expected to be in use for many years are also at risk if a CRQC is developed during the operational lifetime of the algorithm.</t>
      <t>Preparing for the potential development of a CRQC requires modifying standardised protocols to use asymmetric algorithms that are believed to be secure against quantum computers as well as today's classical computers.  These algorithms are called post-quantum, while algorithms based on integer factorisation, finite-field discrete logarithms or elliptic-curve discrete logarithms are called traditional algorithms.</t>
      <t>During the transition from traditional to post-quantum algorithms there may be a desire or a requirement for protocols that use both types of algorithm.  Most post-quantum algorithms are less well studied than traditional asymmetric algorithms, so a designer may choose to combine a post-quantum algorithm with a traditional algorithm to add protection against an attacker with a CRQC to the security properties provided by the traditional algorithm.  A designer may also choose to implement a post-quantum algorithm alongside a traditional algorithm for ease of migration from an ecosystem where only traditional algorithms are implemented and used, to one which uses post-quantum algorithms. Work on solutions that could use both types of algorithm includes <xref target="I-D.ietf-ipsecme-ikev2-multiple-ke"/>, <xref target="I-D.ietf-tls-hybrid-design"/>, <xref target="I-D.ounsworth-pq-composite-sigs"/>, <xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>.
Schemes that combine post-quantum and traditional algorithms for key establishment or digital signatures are often called hybrids. For example, NIST define hybrid key establishment to be a "scheme that is a combination of two or more components that are themselves cryptographic key-establishment schemes"<xref target="NIST_PQC_FAQ"/> and ETSI define hybrid key exchanges to be "constructions that combine a traditional key exchange...with a post-quantum key exchange...into a single key exchange"<xref target="ETSI_TS103774"/>.  The word hybrid is also used in cryptography to describe encryption schemes that combine asymmetric and symmetric algorithms <xref target="RFC9180"/>, so using it in the post-quantum context overloads it and risks misunderstandings.  However, this terminology is well-established amongst the post-quantum cryptography community so an attempt to move away from its use could lead to multiple definitions for the same concept, resulting in confusion and lack of clarity.</t>
      <t>This document provides language for constructions that combine traditional and post-quantum algorithms.   Specific solutions for enabling use of multiple asymmetric algorithms in cryptographic schemes may in fact be more general than this, allowing the use of solely traditional, or solely post-quantum algorithms.  However, where relevant, we focus on post-quantum traditional combinations as these are the motivation for the wider work in the IETF.  It is intended as a terminology guide for other documents to add clarity and consistency across different protocols, standards, and organisations.  Additionally, it aims to reduce misunderstanding about use of the word "hybrid" as well as defining a shared language for different types of post-quantum traditional hybrid constructions.</t>
      <t>In this document, a "cryptographic algorithm" is defined, as in <xref target="NIST_SP_800-152"/>, to be a "well-defined computational procedure that takes variable inputs, often including a cryptographic key, and produces an output".  Examples include RSA, ECH, CRYSTALS-Kyber and CRYSTALS-Dilithium.   The expression "cryptographic scheme" is used to mean a construction that uses an algorithm or a group of algorithms to achieve a particular cryptographic outcome, e.g. key agreement.  A cryptographic scheme may be made up of a number of functions. For example, a Key Encapsulation Mechanism (KEM) is a cryptographic scheme consisting of three functions: Key Generation, Encapsulation and Decapsulation.  A cryptographic protocol incorporates one or more cryptographic schemes.  For example, TLS is a cryptographic protocol which includes schemes for key agreement, record layer encryption, and server authentication.</t>
    </section>
    <section anchor="primitives">
      <name>Primitives</name>
      <t>This section introduces terminology related to cryptographic algorithms, as well as to hybrid constructions for cryptographic schemes.</t>
      <dl>
        <dt><strong>Traditional Algorithm</strong>:</dt>
        <dd>
          <t>An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms.</t>
        </dd>
        <dt><strong>Post-Quantum Algorithm</strong>:</dt>
        <dd>
          <t>An asymmetric cryptographic algorithm that is believed to be secure against quantum computers as well as classical computers.</t>
        </dd>
        <dt><strong>Component Algorithm</strong>:</dt>
        <dd>
          <t>Each cryptographic algorithm that forms part of a cryptographic scheme.</t>
        </dd>
        <dt><strong>Single-Algorithm Scheme</strong>:</dt>
        <dd>
          <t>A cryptographic scheme with one component algorithm.
</t>
          <t>A single-algorithm scheme could use either a traditional algorithm or a post-quantum algorithm.</t>
        </dd>
        <dt><strong>Multi-Algorithm Scheme</strong>:</dt>
        <dd>
          <t>A cryptographic scheme with more than one component algorithm.</t>
        </dd>
        <dt><strong>Post-Quantum Traditional (PQT) Hybrid Scheme</strong>:</dt>
        <dd>
          <t>A cryptographic scheme that uses two or more component algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
        </dd>
        <dt><strong>PQT Hybrid Key Encapsulation Mechanism</strong>:</dt>
        <dd>
          <t>A Key Encapsulation Mechanism (KEM) that uses two or more component algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
        </dd>
        <dt><strong>PQT Hybrid Public Key Encryption</strong>:</dt>
        <dd>
          <t>A Public Key Encryption (PKE) scheme that uses two or more component algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
        </dd>
        <dt><strong>PQT Hybrid Digital Signature</strong>:</dt>
        <dd>
          <t>A digital signature scheme that uses two or more component algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.
</t>
          <t>PQT Hybrid KEMs, PQT Hybrid PKE, and PQT Hybrid Digital Signatures are all examples of PQT Hybrid schemes.</t>
        </dd>
        <dt><strong>PQT Hybrid Combiner</strong>:</dt>
        <dd>
          <t>A method that takes two or more component algorithms and combines them to form a PQT Hybrid scheme.</t>
        </dd>
      </dl>
    </section>
    <section anchor="functionality">
      <name>Functionality</name>
      <t>This section describes properties that may be desired from or achieved by a PQT Hybrid scheme.</t>
      <dl>
        <dt><strong>Hybrid Confidentiality</strong>:</dt>
        <dd>
          <t>The property that confidentiality is achieved provided that at least one component algorithm remains secure.</t>
        </dd>
      </dl>
      <t>EDNOTE 1: In the PQT Hybrid case what does this property mean if the attacker has a quantum computer?</t>
      <dl>
        <dt><strong>Hybrid Authentication</strong>:</dt>
        <dd>
          <t>The property that authentication is achieved provided that at least one component algorithm remains secure.</t>
        </dd>
      </dl>
      <t>EDNOTE 2: This may benefit from expanding.  Whether this is achieved or not depends on whether the verifier verifies all signatures, which they may not do in all cases, or may not be defined in the protocol.  Either the definition of hybrid authentication could be expanded or more definitions could be added to this section.</t>
      <t>EDNOTE 3: It may be useful to distinguish between source authentication (i.e. authentication of the sender of a particular message) and identity authentication (i.e. authentication of the identity of the sender).</t>
      <t>EDNOTE 4: Other properties may be desired from a PQT Hybrid scheme e.g. backwards compatibility, crypt agility.  Should these be defined here?</t>
    </section>
    <section anchor="cryptographic-elements">
      <name>Cryptographic Elements</name>
      <t>This section introduces terminology related to cryptographic elements and their inclusion in hybrid schemes.</t>
      <dl>
        <dt><strong>Cryptographic Element</strong>:</dt>
        <dd>
          <t>Any data (private or public) that is an input or output value for a cryptographic algorithm or a function making up a cryptographic algorithm.
</t>
          <t>Types of cryptographic elements include public keys, private keys, plaintexts, ciphertexts, shared secrets, and signature values.</t>
        </dd>
        <dt><strong>Component Cryptographic Element</strong>:</dt>
        <dd>
          <t>A cryptographic element of a component algorithm in a multi-algorithm scheme.</t>
        </dd>
        <dt><strong>Composite Cryptographic Element</strong>:</dt>
        <dd>
          <t>A cryptographic element that incorporates multiple component cryptographic elements of the same type in a multi-algorithm scheme.
</t>
          <t>For example, a composite cryptographic public key is made up of two component public keys.</t>
        </dd>
        <dt><strong>Cryptographic Element Combiner</strong>:</dt>
        <dd>
          <t>A method that takes two or more component cryptographic elements of the same type and combines them to form a composite cryptographic element.
</t>
          <t>A cryptographic element combiner could be concatenation, such as where two component public keys are concatenated to form a composite public key as in <xref target="I-D.ietf-tls-hybrid-design"/>, or something more involved such as the dualPRF defined in <xref target="BINDEL"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocols">
      <name>Protocols</name>
      <t>This section introduces terminology related to the use of PQT Hybrid schemes in protocols.</t>
      <dl>
        <dt><strong>PQT Hybrid Protocol</strong>:</dt>
        <dd>
          <t>A protocol that incorporates one or more PQT Hybrid schemes.
</t>
          <t>A PQT Hybrid protocol that provides hybrid confidentiality may use a PQT Hybrid KEM, PQT Hybrid PKE, or a different combination of primitives.  A PQT Hybrid protocol that provides hybrid authentication may use a PQT Hybrid Digital Signature or could alternatively use a PQT Hybrid KEM or PQT Hybrid PKE to prove possession of long-term component private keys.</t>
          <t>PQT Hybrid protocols that offer both confidentiality and authentication do not necessarily offer both hybrid confidentiality and hybrid authentication.  For example, <xref target="I-D.ietf-tls-hybrid-design"/> provides hybrid confidentiality but does not address hybrid authentication.  Therefore, if the design in <xref target="I-D.ietf-tls-hybrid-design"/> is used with X.509 certificates as defined in <xref target="RFC5280"/> only authentication with a single algorithm is achieved.</t>
        </dd>
        <dt><strong>Composite PQT Hybrid Protocol</strong>:</dt>
        <dd>
          <t>A protocol that incorporates one or more PQT Hybrid schemes in such a way that the protocol fields and message flow are the same as those in a version of the protocol that uses single-algorithm schemes.
</t>
          <t>In a composite PQT Hybrid protocol, changes are primarily made to the formats of the cryptographic elements, while the protocol fields and message flow remain largely unchanged.  In implementations most changes are likely to be made to the cryptographic libraries, with minimal changes to the protocol libraries.</t>
        </dd>
        <dt><strong>Non-composite PQT Hybrid Protocol</strong>:</dt>
        <dd>
          <t>A protocol that incorporates one or more PQT Hybrid schemes in such a way that the formats of the component cryptographic elements are the same as when they are used as part of single-algorithm schemes.
</t>
          <t>In a non-composite PQT Hybrid protocol, changes are primarily made to the protocol fields, the message flow, or both, while changes to cryptographic elements are minimised.  In implementations, most changes are likely to be made to the protocol libraries, with minimal changes to the cryptographic libraries.</t>
        </dd>
      </dl>
      <t>NOTE: It is possible for a PQT Hybrid protocol to be designed that is neither entirely composite nor entirely non-composite.  For example, in a protocol that offers both confidentiality and authentication the key establishment could be done in a composite manner while the authentication is done in a non-composite manner.</t>
    </section>
    <section anchor="certificates">
      <name>Certificates</name>
      <t>This section introduces terminology related to the use of certificates in hybrid schemes.</t>
      <dl>
        <dt><strong>PQT Hybrid Certificate</strong>:</dt>
        <dd>
          <t>A digital certificate that contains public keys for two or more component algorithms where at least one is a traditional algorithm, and at least one is a post-quantum algorithm.
</t>
          <t>A PQT Hybrid certificate could be used to facilitate a PQT Hybrid authentication protocol.  However, a PQT Hybrid authentication protocol does not need to use a PQT Hybrid certificate; separate certificates could be used for individual component algorithms.</t>
          <t>The component public keys in a PQT Hybrid certificate could be included as a composite public key or as individual component public keys.</t>
          <t>The use of a PQT Hybrid certificate does not necessarily achieve hybrid authentication of the identity of the sender; this is determined by properties of the chain of trust. For example, an end-entity certificate that contains a composite public key as defined in <xref target="I-D.ounsworth-pq-composite-keys"/> but which is signed using a single-algorithm digital signature scheme could be used to provide hybrid authentication of the source of a message, but would not achieve hybrid authentication of the identity of the sender.</t>
        </dd>
      </dl>
      <t>EDNOTE 5: Is it helpful to define composite and non-composite certificates?</t>
      <t>TODO 1: Terminology for certificate chains and PKI.</t>
      <t>TODO 2: Terminology for algorithm specification.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines security-relevant terminology to be used in documents specifying PQT Hybrids.  However, the document itself does not have a security impact on internet protocols.  The security considerations for each PQT Hybrid protocol are specific to that protocol and should be discussed in the relevant documents.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="BINDEL" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="ETSI_TS103774" target="https://www.etsi.org/deliver/etsi_ts/103700_103799/103744/01.01.01_60/ts_103744v010101p.pdf">
        <front>
          <title>CYBER; Quantum-safe Hybrid Key Exchanges</title>
          <author>
            <organization>ETSI TS 103 744 V1.1.1</organization>
          </author>
          <date year="2020" month="December"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="NIST_SP_800-152" target="https://doi.org/10.6028/NIST.SP.800-152">
        <front>
          <title>NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems</title>
          <author initials="E. B." surname="Barker" fullname="Elaine B. Barker">
            <organization>Information Technology Laboratory</organization>
          </author>
          <author initials="M." surname="Smid" fullname="Miles Smid">
            <organization>Information Technology Laboratory</organization>
          </author>
          <author initials="D." surname="Branstad" fullname="Dannis Branstad">
            <organization>Information Technology Laboratory</organization>
          </author>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2015" month="October"/>
        </front>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth" target="https://www.ietf.org/archive/id/draft-becker-guthrie-noncomposite-hybrid-auth-00.txt">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design" target="https://www.ietf.org/archive/id/draft-ietf-tls-hybrid-design-04.txt">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron">
            <organization>University of Haifa and Amazon Web Services</organization>
          </author>
          <date day="11" month="January" year="2022"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-04"/>
      </reference>
      <reference anchor="I-D.ietf-ipsecme-ikev2-multiple-ke" target="https://www.ietf.org/archive/id/draft-ietf-ipsecme-ikev2-multiple-ke-06.txt">
        <front>
          <title>Multiple Key Exchanges in IKEv2</title>
          <author fullname="C. Tjhai">
            <organization>Post-Quantum</organization>
          </author>
          <author fullname="M. Tomlinson">
            <organization>Post-Quantum</organization>
          </author>
          <author fullname="G. Bartlett">
            <organization>Quantum Secret</organization>
          </author>
          <author fullname="S. Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="D. Van Geest">
            <organization>ISARA Corporation</organization>
          </author>
          <author fullname="O. Garcia-Morchon">
            <organization>Philips</organization>
          </author>
          <author fullname="Valery Smyslov">
            <organization>ELVIS-PLUS</organization>
          </author>
          <date day="13" month="June" year="2022"/>
          <abstract>
            <t>   This document describes how to extend the Internet Key Exchange
   Protocol Version 2 (IKEv2) to allow multiple key exchanges to take
   place while computing a shared secret during a Security Association
   (SA) setup.  The primary application of this feature in IKEv2 is the
   ability to perform one or more post-quantum key exchanges in
   conjunction with the classical (Elliptic Curve) Diffie-Hellman key
   exchange, so that the resulting shared key is resistant against
   quantum computer attacks.  Another possible application is the
   ability to combine several key exchanges in situations when no single
   key exchange algorithm is trusted by both initiator and responder.

   This document updates RFC7296 by renaming a transform type 4 from
   "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and
   renaming a field in the Key Exchange Payload from "Diffie-Hellman
   Group Num" to "Key Exchange Method".  It also renames an IANA
   registry for this transform type from "Transform Type 4 - Diffie-
   Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange
   Method Transform IDs".  These changes generalize key exchange
   algorithms that can be used in IKEv2.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-multiple-ke-06"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-keys" target="https://www.ietf.org/archive/id/draft-ounsworth-pq-composite-keys-02.txt">
        <front>
          <title>Composite Public and Private Keys For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala">
            <organization>CableLabs</organization>
          </author>
          <author fullname="Jan Klaussner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="8" month="June" year="2022"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptalanysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementors may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected.  For digital signatures, this is
   referred to as "dual", and for encryption key establishment this as
   reffered to as "hybrid".  This document, and its companions, defines
   a specific instantiation of the dual and hybrid paradigm called
   "composite" where multiple cryptographic algorithms are combined to
   form a single key, signature, or key encapsulation mechanism (KEM)
   such that they can be treated as a single atomic object at the
   protocol level.

   EDNOTE: the terms "dual" and "hybrid" are currently in flux.  We
   anticipate an Informational draft to normalize terminology, and will
   update this draft accordingly.

   This document defines the structures CompositePublicKey and
   CompositePrivateKey, which are sequences of the respective structure
   for each component algorithm.  The generic composite variant is
   defined which allows arbitrary combinations of key types to be placed
   in the CompositePublicKey and CompositePrivateKey structures without
   needing the combination to be pre-registered or pre-agreed.  The
   explicit variant is also defined which allows for a set of algorithm
   identifier OIDs to be registered together as an explicit composite
   algorithm and assigned an OID.

   This document is intended to be coupled with corresponding documents
   that define the structure and semantics of composite signatures and
   encryption, such as [draft-ounsworth-pq-composite-sigs-05] and draft-
   ounsworth-pq-composite-kem (yet to be published).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-keys-02"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs" target="https://www.ietf.org/archive/id/draft-ounsworth-pq-composite-sigs-07.txt">
        <front>
          <title>Composite Signatures For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala">
            <organization>CableLabs</organization>
          </author>
          <date day="8" month="June" year="2022"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementer may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected.  For digital signatures, this is
   referred to as "dual", and for encryption key establishment this as
   referred to as "hybrid".  This document, and its companions, defines
   a specific instantiation of the dual and hybrid paradigm called
   "composite" where multiple cryptographic algorithms are combined to
   form a single key, signature, or key encapsulation mechanism (KEM)
   such that they can be treated as a single atomic object at the
   protocol level.

   EDNOTE: the terms "dual" and "hybrid" are currently in flux.  We
   anticipate an Informational draft to normalize terminology, and will
   update this draft accordingly.

   This document defines the structures CompositeSignatureValue, and
   CompositeParams, which are sequences of the respective structure for
   each component algorithm.  The generic composite variant is defined
   which allows arbitrary combinations of signature algorithms to be
   used in the CompositeSignatureValue and CompositeParams structures
   without needing the combination to be pre-registered or pre-agreed.
   The explicit variant is also defined which allows for a set of
   signature algorithm identifier OIDs to be registered together as an
   explicit composite signature algorithm and assigned an OID.

   This document is intended to be coupled with corresponding documents
   that define the structure and semantics of composite public and
   private keys and encryption [I-D.draft-ounsworth-pq-composite-keys-
   01], however may also be used with non-composite keys, such as when a
   protocol combines multiple certificates into a single cryptographic
   operation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-07"/>
      </reference>
      <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="S. Santesson" initials="S." surname="Santesson">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen">
            <organization/>
          </author>
          <author fullname="R. Housley" initials="R." surname="Housley">
            <organization/>
          </author>
          <author fullname="W. Polk" initials="W." surname="Polk">
            <organization/>
          </author>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC9180" target="https://www.rfc-editor.org/info/rfc9180">
        <front>
          <title>Hybrid Public Key Encryption</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="K. Bhargavan" initials="K." surname="Bhargavan">
            <organization/>
          </author>
          <author fullname="B. Lipp" initials="B." surname="Lipp">
            <organization/>
          </author>
          <author fullname="C. Wood" initials="C." surname="Wood">
            <organization/>
          </author>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9180"/>
        <seriesInfo name="DOI" value="10.17487/RFC9180"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
