<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-pquip-hybrid-signature-spectrums-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="hale-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-pquip-hybrid-signature-spectrums-00"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security considerations
for hybrid digital signature schemes, including proof composability, non-separability of the ingredient signatures given a hybrid signature,
backwards/forwards compatiblity, hybrid generality, and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP mailing list
pqc@ietf.org or on the GitHub repository which contains the draft:
https://github.com/dconnolly/draft-hale-pquip-hybrid-signature-spectrums</t>
    </abstract>
  </front>
  <middle>
    <?line 135?>

<!--

# Todos

- shorten the text and revise as appropriate to an IETF draft instead of research paper
- include figures in ascii
- add discussion
- extend with discussion points from private emails between Britta, Nina and IETF
- extend with discussion points fromn IETF mailing lists - for both be very careful to provide
acknowledgements!!
- double-check and extend/refer to Florence' draft

> I left statements from Douglas' hybrid KEM draft in, because we might want to pull from them
-->

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in protocols has
largely been on confidentiality, given the potential risk of store and decrypt
attacks, where data encrypted today using traditional algorithms could be
decrypted in the future by an attacker with a Cryptographically-Relevant Quantum
Computer (CRQC). While traditional authentication is only at risk once a CRQC
exists, it is important to consider the transition to post-quantum authentication
before this point.  This is particularly relevant for systems where algorithm
turn-over is complex or takes a long time (e.g., long-lived systems with hardware
roots of trust), or where future checks on past authenticity play a role (e.g.,
digital signatures on legal documents).</t>
      <t>One approach to designing quantum-resistant protocols, particularly during the
transition period from traditional to post-quantum algorithms, is incorporating
PQ/T Hybrid schemes, which combine both traditional and post-quantum algorithms
in one cryptographic scheme. Hybridization has been looked at for key
encapsulation <xref target="HYBRIDKEM"/>, and in an initial sense for digital signatures
<xref target="HYBRIDSIG"/>. Compared to key encapsulation, hybridization of digital signatures,
where the verification tag may be expected to attest to both standard and
post-quantum components, is subtler to design and implement due to the
potential separability of the composite signatures and the risk of downgrade
attacks.  There are also a range of requirements and properties that may be
required from PQ/T signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature schemes
to help them decide what properties they do and do not require from their scheme.
It intentionally does not propose concrete hybrid signature combiners or
instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a final version of this
document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>TBD-00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>
and hybrid key encapsulation mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In particular, we follow the
definition of 'post-quantum algorithm', 'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>'Signature scheme': A signature scheme is defined via the following three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm, which generates a public
verifying key <tt>pk</tt> and a secret signing key <tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which takes as input a secret
signing key <tt>sk</tt> and a message <tt>m</tt>, and outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as input a public verifying key
<tt>pk</tt>, a signature <tt>sig</tt> and a message <tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept</tt> ($b=1$) or
<tt>reject</tt> ($b=0$) of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>'Hybrid signature scheme':  Following <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid
signature scheme to be "a multi-algorithm digital signature scheme made up of two or more component
digital signature algorithms ...". We require that the security of the component schemes is based
on the hardness of different cryptographic assumptions. In contrast to <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>,
we will use the more general term 'hybrid signature scheme' instead of requiring one
post-quantum and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to allow also the
combination of several post-quantum algorithms. The term 'composite' scheme is often used as a synonym
for 'hybrid scheme'. This is different from <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used
at the protocol level.</t>
          </li>
          <li>
            <t>'Hybrid signature': A hybrid signature is the output of the hybrid signature scheme's signature
generation. As synonyms we might use 'composite signature' or 'dual signature'.  For example, NIST define a dual signature as "two or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>.</t>
          </li>
          <li>
            <t>'Component (signature) scheme': Component signature schemes are the cryptographic algorithms
contributing to the hybrid signature scheme. This has a similar purpose as in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.
In this draft, we will use 'ingredient signature scheme' as a synonym.</t>
          </li>
          <li>
            <t>'Next-generation algorithms': Similarly to the case of hybrid KEMs <xref target="I-D.ietf-tls-hybrid-design"/>,
hybrid signatures are mostly motiviated as preparation for the post-quantum migration. Following
<xref target="I-D.ietf-tls-hybrid-design"/>, we opt to use the more generic term "next-generation" and "traditional"
algorithm instead of "post-quantum" and "classical" algorithms.</t>
          </li>
          <li>
            <t>'Artifact':  An artifact is evidence of the sender's intent to hybridize a signature that remains even if a component algorithm tag is removed. Artifacts can be e.g., at the algorithmic level (e.g., within the digital signature), or at the protocol level (e.g., within the certificate), or on the system policy level (e.g., within the message). Artifacts should be easily identifiable by the receiver in the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures,
it is worth taking a look at why hybrid digital signatures are desirable
for some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that summarizes these well.
In addition, we explicate the motivation for hybrid signatures here.</t>
        <t><strong>Complexity.</strong> Next-generation algorithms and their underlying hardness assumptions
are often more complex than traditional algorithms and as such carry a higher risk of implementation
mistakes and revision of parameters compared to traditional algorithms, such as RSA. RSA is a relatively simple algorithm to understand and
explain, yet during its existence and use there have been multiple attacks and refinements, such as
adding requirements to how padding and keys are chosen, and implementation issues such as cross-protocol
attacks. Thus, even in a relatively simple algorithm subtleties and caveats on implementation and
use can arise over time. Given the complexity of next generation algorithms, the chance of such discoveries and
caveats needs to be taken into account.</t>
        <t>Of note, next generation algorithms have been heavily vetted. Thus, if and when further information
on caveats and implementation issues come to light, it is less likely that a "break" will be
catastrophic. Instead, such vulnerabilities and issues may represent a weakening of security - which
may in turn be offset if a hybrid approach has been used.</t>
        <t>The complexity of next-generation algorithms needs to be balanced against the fact that hybridization
itself adds more complexity to a protocol and introduces the risk of implementation mistakes
in the hybridization process.</t>
        <t>One example of a next generation algorithm is the signature scheme ML-DSA
(a.k.a. Kyber-Dilithium) that has been selected for standardization by NIST. While
the scheme follows the know Fiat-Shamir transform to construct the signature scheme,
it also relies on rejection sampling that is known to give cache side channel
information (not necessarily leading to a known attack though). Furthermore,
recent attacks again some next-generation signature schemes such as MULTI-VARIATE
schemes might call into question the asymptotic and concrete security for conservative
adopters and therefore might hinder adoption.</t>
        <t><strong>Time.</strong>
The need to transition to quantum-resistant algorithms
now while simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards hybridization.
Mosca’s equation <xref target="MOSCA"/> very simply illustrates the risk of post-quantum
transition delay: $l + d &gt; q$, where l is the information life-span, d is the time for
system transition to post-quantum algorithms, and q is the time before a quantum
computer is ready to execute cryptanalysis. As opposed to key exchange and KEMs,
it may not be obvious why there is urgency for an adoption of next-generation signatures;
namely, while encryption is subject to store-now-decrypt-later attacks, there may not
seem to be a parallel notion for authenticity, i.e., 'store-now-modify-later attacks'.
However, in larger systems, including national systems, space systems, large healthcare
support systems, and critical infrastructure, where acquisition and procurement time can be
measured in years and algorithm replacement may be difficult or even practically
impossible, this equation can have drastic implications.
In such systems, algorithm turn-over can be complex and difficult and can take considerable
time (such as in long-lived systems with hardware deployment),
meaning that an algorithm may be
committed to long-term, with no option for replacement. Long-term
committment creates further urgency for immediate next-generation algorithm selection.
Additionally, for some sectors future checks on past authenticity plays a role (e.g., many
legal, financial, auditing, and governmental systems).
The 'store-now-modify-later' analogy would present challenges in such sectors, where future
analysis of past authentication may be more critical
than in e.g., internet connection use cases. As such there is an eagerness to use
next-generation signatures algorithms for some applications.</t>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through hybridization. The following provides a
summary of these goals, while also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="unforgeability">
          <name><strong>Unforgeability</strong></name>
          <t>One goal is security of hybrid signature schemes, in particular that
EUF-CMA security is maintained as long as at least one of the ingredient schemes is EUF-CMA secure.
There might be, however, other goals in competition with this one, such as backward-compatibility,
where the EUF-CMA seucurity of the hybrid signature relies solely on the security of one of the ingredient
schemes instead of relying on both.</t>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability.</strong></name>
          <t>Under proof composability, the ingredient algorithms are combined
in such a way that it is possible to prove a security reduction from the security
properties of hybrid signature scheme to the properties of the respective ingredient
signature schemes and, potentially, other building blocks such as hash functions, KDF, etc.
Otherwise an entirely new proof of security is required, and there is a lack of
assurance that the combination builds on the standardization processes and analysis performed to
date on ingredient algorithms. The resulting hybrid signature would be, in effect, an entirely
new algorithm of its own. The more two signature schemes are entangled, the more likely it is
that an entirely new proof is required, thus not meeting proof composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest
properties of hybrid digital signatures to be discussed <xref target="HYBRIDSIG"/>. It was
defined as the guarantee that an adversary cannot simply “remove” one of the
ingredient signatures without evidence left behind. For example there are artifacts
that a carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from potentially
creating a valid ingredient digital signatures from a hybrid one (a signature
stripping attack), but rather implies that such a digital signature will contain
artifacts of the separation. Thus authentication is not simply provided by the
sender to the receiver through correct verification of the digital signature(s),
but potentially through further investigation on the receiver side that may
extend well beyond traditional signature verification behavior. For instance, this
can intuitively be seen in cases of a message containing a context note
on hybrid authentication, that is then signed by all ingredient
algorithms/the hybrid signature scheme. If an adversary removes one
ingredient signature but not the other, then artifacts in the message
itself point to the possible existence of hybrid signature such as a
label stating “this message must be hybrid signed”. This might be a counter
measure against stripping attacks if the verifier expects a hybrid signature
scheme to ensure this property. However, it places the responsibility of signature
validity not only on the correct format of the message, as in a traditional
signature security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion
of WNS, introduced in <xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take
as input a hybrid signature (and message) and output a valid ingredient signature
(and potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the component
signature will fail verification (of the component signature scheme) entirely. Therefore,
authentication is provided by the sender to the receiver through correct verification of
the digital signature(s), as in traditional signature security experiments. It is not
dependent on other components, such as message content checking, or protocol level aspects,
such as public key provenance. As an illustrative example distinguishing WNS from SNS,
consider the case of ingredient algorithms $\Sigma_1.Sign$ and $\Sigma_2.Sign$ where
the hybrid signature is computed as a concatenation $(sig_1, sig_2)$, where
$sig_1 = \Sigma_1.Sign(hybridAlgID,m)$ and $sig_2 = \Sigma_2.Sign(hybridAlgID,m)$.
In this case, separation and delivery of a new message $m^* = (hybridAlgID,m)$ along
with signature $sig_1$ and $\Sigma_1.pk$ could allow for correct verification and the
hybrid artifact is embedded in the message instead of the signature (identifiable through
further investigation but the signature verification itself would not fail). Thus, this
case shows WNS (assuming the verification algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the public
key certificate chains to explicitly define hybrid use of the public key. Namely,
that $\Sigma_1.pk$ cannot be used without $\Sigma_2.pk$. This implies pushing
the hybrid artifacts into the protocol and system level and a dependency on the
security of other verification algorithms (namely those in the certificate
chain). This further requires that security analysis of a hybrid digital signature requires
analysis of the key provenance, i.e., not simply that a valid public key is used but how it
hybridization and hybrid artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of the signature
algorithm itself. SNS may potentially be achieveable based on dependencies at the
system level.</t>
          <!--
However, since those
artifacts are outside the security definition scope for a digital
signature, namely definitions such EUF-CMA, we do not include them
in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers
to the property where a hybrid algorithm may also be used for legacy
receivers that may take a hybrid signature and verify it as being
valid using only the verification algorithm of one component scheme
(e.g., the verification algorithm of the traditional signature scheme used in the
hybrid scheme), potentially ignoring the next-generation signature entirely. This
provides an option to transition various sender system attributes to next-generation
algorithms while still supporting select legacy receivers. Notably, this is a
verification property; the sender has provided a hybrid digital signature, but
the verifier is allowed, due to internal restrictions and/or implementation, to
only verify one component signature. Backwards compatibility may be further decomposed
to subcategories where ingredient key provenance is either separate or hybrid so as to
support implementations that cannot recognize (and/or process) hybrid signatures.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
next-generation) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate ingredient signatures. Thus the key
distinction between backwards and forwards compatibility is that backwards
compatibility may be needed for legacy systems that cannot use and/or process
hybrid or next-generation signatures, whereas in forwards compatibility the
system has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was
first introduced in <xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all ingredient
signatures needed to achieve a successful verification present in the hybrid signature,
but also that verification of both component algorithms occurs simultaneously. Namely,
"missing" information needs to be computed by the verifier so they cannot “quit” the
verification process before both component signatures are verified. SV mimics traditional
digital signatures guarantees, essentially ensuring that the hybrid digital signature
behaves as a single algorithm vs. two separate component stages. Alternatively phrased,
under an SV guarantee it is not possible for an unerring verifier to initiate termination
of the hybrid verification upon successful verification of one component algorithm without
also knowing if the other component succeeded or failed.</t>
          <!--
What the sender is assured
of is that one of two cases occurred: either 1) the receiver ignored
the digital signatures or 2) the receiver initiated verification of
the digital signatures (resulting in either successful or failed
verification). WNS complicates this situation, resulting in six cases
instead of two: 1) the receiver ignored the digital signatures, 2)
the receiver verified the full hybrid combination (with success or
failure); 3) the receiver initiated verification of the hybrid digital
signatures, but terminated once the standard component succeeded or failed; 4)
the receiver initiated verification of the hybrid digital signatures,
but terminated once the post-quantum component succeeded or failed; 5)
the receiver initiated verification of the standard signature only (with success
or failure), and 6) the receiver initiated verification of the post-quantum
signature only (with success or failure). It may initially appear
that (3) and (5) (resp. (4) and (6)) are similar, however (3) and (4)
are precisely the cases eliminated by SNS, i.e. that the verifier does
not take as input the hybrid digital signatures, instead only attempting
verification on one component. SNS thus improves the situation to only
four options. Still, the verifier can still terminate upon correctly
checking only one component signature without actually verifying both
parts. One could argue that a receiver who has checked the accuracy of
their implementation should be assured that both components are verifying.
This misconstrues the original intent though, which is to correctly mirror
traditional digital signatures properties in hybrid digital signatures;
ideally, the sender should be assured that there are only two
options: 1) ignore the digital signatures or 2) verify the digital signatures
(resulting in either failure or full verification). Simultaneous Verification
addresses this property.
-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner
is defined, based on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a Fiat-Shamir
Transform, a hybrid scheme based on the transform can be made that is generalizable
to all such signatures. Such generality can also result in simplified constructions
where as more tailored hybrid variants might be more efficient in terms of sizes and
performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization
of other cryptographic components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature
constructions are expected to be as performant as possible. For most hybrid
signatures this means that the computation time should only minimally exceed
the sum of the component signature computation time. It is noted that performance
of any variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid signature
constructions are expected to be as space performant as possible. This includes messages
(as they might increase if artifacts are used), public keys, and the hybrid signature.
For the hybrid signature, size should no more than minimally exceed the signature
size of the two component signatures. In some cases, it may be possible for a hybrid
signature to even be smaller than two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>,
duplicated information should be avoided when possible. This might concern
repeated information in hybrid certificates or in the communication of component
certificates in additional to hybrid certificates (for example to acheive
backwards/forwards-comptability), or sending multiple public keys or
signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in <xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the ingredient
signatures can be stripped away with the verifier not being able to detect
the change during verification.An example of this includes simple concatenation
of signatures without any artifacts used. Nested signatures (where a message
is signed by one component algorithm and then the message-signature
combination is signed by the second component algorithm) may also fall
into this category, dependent on whether the inner or outer signature
is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the composite signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message, signature,
or at the protocol level, etc.). This may enable the verifier to detect
if a component signature is stripped away from a hybrid signature, but
that detectability depends highly on the type of artifact and permissions.
For instance, if a message contains a label artifact "This message must be
signed with a hybrid signature" then the system must be allowed to analyze
the message components for possible artifacts. Whether a hybrid signature
offers (Weak/Strong) Non-Separability might also depend on the
implementation and policy of the protocol or application the hybrid signature
is used in on the verifier side. Such policies may be further ambiguous to
the sender, meaning that the type of authenticity offered to the receiver
is unclear.
In another example, under nested signatures the
verifier could be tricked into interpreting a new message as the
message/inner signature combination and verify only the outer signature.
In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in
the actual message, the certificate, or in other non-signature
components, this notion more closely ties to traditional algorithm
security notions (such as EUF-CMA) where security is dependent on
the internal construct of the signature algorithm and its
verification. In this type, the verifier is enabled to detect artifacts
on an algorithmic level during verification. For example, the signature
itself  encodes the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notions, i.e., Strong
Non-Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but
also only when the verifier has verified both signatures. Moreover, no
information is leaked to the receiver during the verification process on
the possibile validity/invalidity of the component signatures until both
verify. This construct most closely mirrors traditional digital signatures
where, assuming that the verifier does verify a signature at all, the result
is either a positive verification of a the full signature or a failure
if the signature is not valid. For hybrid signatures, a <tt>full signature</tt>
implies the hybridization of both component algorithms, and therefore the
strongest non-separability notion enforces an all-or-nothing approach to
verification. Examples of algorithms providing this type of security can be found in
<xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.
-->

</section>
    <section anchor="artspectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the sender's intend to decrease the risk of
successful stripping attacks. This, however, depends strongly on where such evidence resides (e.g., in the message,
the signature, or somewhere on the protocol level instead of the algorithmic level). Even commonly discussed hybrid approaches,
such as concatenation, are not inherently tied one type of security (e.g., WNS, SNS, etc.). This can lead to ambiguities
when comparing different approaches and assumptions about approach security or lack thereof. Thus in this section we cover
artifact locations and also walk
through a highlevel comparison of a few hybrid approach categories to show how artifact location can differ within a given approach.
Artifact location is tied to non-separability notions above; thus the selection of a given security guarantee and general
hybrid approach must also include finer grained selection of artifact placement.</t>
      <!--
In this section we exemplify
the difference in non-separability guarantees depending on the artifact location for three types of hybridization,
namly concatenation, nesting, and 'fused' hybrid explained next.
-->

<!--
While the above discussion about the non-separability spectrum covers a spectrum of security guarantees and existence of artifacts are
linked to achieving those, this (sub-)section covers some specific examples of artifact
placement.
-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the signature algorithm
itself to the protocol level and even into policy, as shown in <xref target="tab-artifact-location"/>
For example, one artifact location could be in the message-to-be-signed, e.g., containing a label artifact.
Depending on the hybrid type, this might be stripped away though. For example, a quantum attacker could
strip away the quantum-secure signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for many applications and threat
models, adding an artificat in the message might not prevent stripping attacks.
Another artifact location could be in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In still yet another case, artifacts may be present through the fused hybrid
method, thus making them part of the signature at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between levels. For example, if the security of the hybrid scheme
is dependent on system policy, then cryptographic analysis must necessarily be reliant on specific policies and
it may not be possible to describe a scheme's security in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent       </th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                                     </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">Message                                                      </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="artspectrumexample">
        <name>Artifact Location Comparison Example</name>
        <t>Decisions on artifact locations present further considerations for implementors, namely
that if artifact placement is identical in two hybrid schemes, for example that
hybridization artifacts reside in the certificate in both cases, and if the above non-separability
guarantees are also the same for each scheme, then implementing the most performant
scheme maybe preferred. Thus it is advisable to not assume performance or
lack thereof is inherent to a particular security goal selection.</t>
        <t>We briefly summarize our example hybrid approach categories (concatenation, nesting, and fusion) before showing how
each one may have artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation refers to variants of hybridization where, for component algorithms
$\Sigma_1.Sign$ and $\Sigma_2.Sign$, the hybrid signature is calculated as a
concatenation $(sig_1, sig_2)$ such that $sig_1 = \Sigma_1.Sign(hybridAlgID,m)$
and $sig_2 = \Sigma_2.Sign(hybridAlgID,m)$.</t>
          </li>
        </ul>
        <!--
WNS may be a goal of a concatenation approach.
 NB: I took it out because I don't see a reason why there shouldn't been a policy or protocol artificat making concatenation SNS.
-->

<ul spacing="normal">
          <li>
            <t>Nesting refers to variants of hybridization where for component algorithms
$\Sigma_1.Sign$ and $\Sigma_2.Sign$, the hybrid signature is calculated in
a layered approach as $(sig_1, sig_2)$ such that, e.g., $sig_1 = \Sigma_1.Sign(hybridAlgID,m)$ and $sig_2 = \Sigma_2.Sign(hybridAlgID,(m, sig_1))$.
<!--
WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted in a stripping attack) may be goals of a nesting approach.
-->
            </t>
          </li>
          <li>
            <t>Fused hybrid refers to variants of hybridization where for component algorithms
$\Sigma_1.Sign$ and $\Sigma_2.Sign$, the hybrid signature is calculated with
entaglement to produce a single hybrid signature $sig_h$ without clear component
constructs.</t>
          </li>
        </ul>
        <!--
SNS and potentially SV are goals of a true hybrid approach.
-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">Ref</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>Concatenated</strong></td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">
                <strong>Nested</strong></td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">
                <strong>Fused</strong></td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>Under a concatenation combiner in option case 2, the artifacts lie within the message, and therefore validity of the message
&gt;NB: what's validity of a message? do you mean signautre?
&gt;BH: No, I mean message. I.e. that pointing out that it is circular reasoning to base the validity of the message on the message...
&gt; I added more discussion</t>
        <t>depends on the message itself. Option cases 3 and 4 solve this circular dependancy by provisioning keys in a combined certificate.
Option case 1 provides the weakest guarantees of hybrid identification,
as there are no prescribed artifacts.</t>
        <t>The artifact guarantees provided by a nesting combiner are similar to those provided by
concatenation option cases 2, 3, and 4. Namely, if
$sig_2 = \Sigma_2.Sign(hybridAlgID,(m, sig_1))$, then the "message"
$(m, sig_1)$ input into $\Sigma_2.Sign$ actually contains the artifact and acts as a label.
Unless an additional label is provided within $m$ itself, $sig_1$ does not therefore contain
an artifact. This presents an implementation challenge as it is necessary to guess which
algorithm is more at risk for a stripping attack and choose the order of nesting accordingly.</t>
        <t>Under a fused combiner, SNS also implies that artifacts of hybridization are present
within the signature. This can be coupled with artifacts in the message, such as
through use of a label, and/or artifacts in the certificate if keys are also provisioned
in a combined certificate.</t>
        <t>The above comparison shows similarities among some hybrid scheme choices, for insance option case 3 and
option case 6 both contain artifacts in the certificate. However, performance and correct implementation
of option case 3 and option case 6 may not be the same, illustrating possible decision points.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards specifications where
applicable. This is particularly relevant in the case of FIPS approval considerations as
well as NIST, which has provided basic guidance
on hybrid signature use. NIST provides the following guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is
generated with a NIST-approved signature scheme as specified
in FIPS 186, while another signature(s) can be generated using
different schemes</em>, e.g., ones that are not currently specified
in NIST standards...<em><tt>hybrid signatures</tt> can be accommodated by
current standards in <tt>FIPS mode,</tt> as defined in FIPS 140,
provided at least one of the component methods is a properly
implemented, NIST-approved signature algorithm</em>. For the purposes
of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as
assuring the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <!--
The emphasized texts point to two things: 1) the signature scheme
for one of the component hybrids must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity
as to whether only the algorithm must be approved and well implemented,
or if that implementation must go through an approval process as well.
As such, there is a ``black box scale`` that developers may consider
as to whether they are using at least one approved component algorithm
(``black box algorithm``), or whether the implementation of that
component algorithm has gone through an approvals review (thus making
a ``black box implementation``). The former `black box algorithm`
would suggest a straightforward path for FIPS-140 approvals based
on the NIST guidelines; however, it is not inconceivable that using
a `black box implementation` could automate much of the certification
review and therefore be attractive to developers.
>Nb: I would introdcued this level of detaila nd open the discussion about the implementation approval. That is not the point IMO, it's more about how general the constructions should be
-->

<t>We provide a scale for the different nuances of generality of the hybrid combiners. This is related to whether the resulting combiner needs a new approval process or falls under already approved specifications.
together with respective example constructions.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| --------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme base on different hard assumptions
| Separate approval needed
| --------------------------------------------------------------------|
| **No generality**
| Combiner supporting algorithms that can be reduced to (at least one)
| approved algorithm, potentially changing the component algorithms
| Uncertainty about whether separate approval is needed
| --------------------------------------------------------------------|
| **1-out-of-n generality**
| Combiner supports one component algorithm in a black-box way but
| potentially changes the other component algorithms
| No new approval needed if the black-box component is approved
| --------------------------------------------------------------------|
| **Full generality**
| Hybrid combiner acts as a wrapper, fully independet of the component
| signature schemes
| No new approval needed if at least one component is approved
| --------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The least general"combiner" would be a new construction with a security reduction
to different hardness assumptions but not necessarily to existing/approved signature schemes.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved signature schemes
but changes the specifics but such that its security can be reduced to the security of an
approved algorithm. As such it is uncertain whether a new approval would be needed as it
might depend on the combiner and changes.</t>
      <t>The second-most general construction, would be a combiner that uses at least one approved
algorithm in a black-box way while it might change the specifics of the other component algorithms.</t>
      <t>The most or 'fully' general combiner is using all algorithms in a blackbox way, for example
the concatenation combiner (with a signature being valid if all componentn signatures are valid). As long as at least one component is approved, no new approval is needed.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the adversary
'wins' the security experiment if it can produce a new message such that a message-signature
pair <tt>(m, sig)</tt> with it correctly verifies. This traditional security notion is challenged under
a hybrid construct.</t>
      <t>The most straightforward comparison would be for the adversary to attempt to produce a new
message <tt>m'</tt> that a message-hybrid signature pair <tt>(m', sig_h)</tt> correctly verifies.
However, such a guarantee depends on the signature being strongly non-separable. Otherwise,
in practical terms a security experiment must capture the case that an existing or new
message <tt>m</tt> could be verified with a component signature, e.g., to produce <tt>(m', sig_1)</tt>
that correctly verifies under <tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope
of traditional security analysis and represent considerations that would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly affect
any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <ul spacing="normal">
        <li>
          <t>There is an inherent mutual exclusion between backwards compatibility and SNS.
While WNS allows for a valid separation under leftover artifacts, SNS will ensure
verification failure if a receiver attempts separation.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order who have contributed to pushing this draft forward,
offered insights and perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer
Felix Günther
John Gray
Serge Mister
Max Pala
Mike Ounsworth
Douglas Stebila</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="September" year="2023"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="20" month="October" year="2023"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-01"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite Signatures For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>CableLabs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="23" month="October" year="2023"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-10"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
