<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-pquip-hybrid-signature-spectrums-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="hale-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-pquip-hybrid-signature-spectrums-03"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="February" day="23"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatiblity, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-hale-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 138?>

<!--

# Todos

- add discussion
- extend with discussion points from private emails between Britta, Nina and IETF
- revise re Brendan's email
  - change terminology 'proof composability'?
  - change terminology 'next-gen' vs 'post-quantum'?
- change terminology using 'black-box'?


-->

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk
of store and decrypt attacks, where data encrypted today using
traditional algorithms could be decrypted in the future by an attacker
with a Cryptographically-Relevant Quantum Computer (CRQC). While
traditional authentication is only at risk once a CRQC exists, it is
important to consider the transition to post-quantum authentication
before this point.  This is particularly relevant for systems where
algorithm turn-over is complex or takes a long time (e.g., long-lived
systems with hardware roots of trust), or where future checks on past
authenticity play a role (e.g., digital signatures on legal documents).</t>
      <t>One approach to design quantum-resistant protocols, particularly during
the transition period from traditional to post-quantum algorithms, is
incorporating hybrid signatures schemes, which combine both traditional
and post-quantum (or more generally next-generation) algorithms in one
cryptographic scheme. Hybridization has been looked at for key
encapsulation <xref target="HYBRIDKEM"/>, and in an initial sense for digital
signatures <xref target="HYBRIDSIG"/>. Compared to key encapsulation, hybridization of
digital signatures, where the verification tag may be expected to attest
to both standard and post-quantum components, is subtler to design and
implement due to the potential separability of the hybrid/dual
signatures and the risk of downgrade/stripping attacks.  There are also
a range of requirements and properties that may be required from dual
signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of
different hybrid signature scheme designs and different security goals
for them. It is intended as a resource for designers and implementers of
hybrid signature schemes to help them decide what properties they do and
do not require from their scheme.  It intentionally does not propose
concrete hybrid signature combiners or instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a
final version of this document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>01: Significant fleshing out after feedback from IETF 118.</t>
          </li>
          <li>
            <t>00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperatbility of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
migration, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future migration to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, next generation algorithms have been heavily vetted. Thus, if
and when further information on caveats and implementation issues come
to light, it is less likely that a "break" will be
catastrophic. Instead, such vulnerabilities and issues may represent a
weakening of security - which may in turn be offset if a hybrid approach
has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity
to a protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term committment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptograpthic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompassess more specific concepts of hybrid signature
security, such as 'hybrid unforgability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication is not simply provided by the sender
to the receiver through correct verification of the digital
signature(s), but potentially through further investigation on the
receiver side that may extend well beyond traditional signature
verification behavior. For instance, this can intuitively be seen in
cases of a message containing a context note on hybrid authentication,
that is then signed by all component algorithms/the hybrid signature
scheme. If an adversary removes one component signature but not the
other, then artifacts in the message itself point to the possible
existence of hybrid signature such as a label stating “this message must
be hybrid signed”. This might be a counter measure against stripping
attacks if the verifier expects a hybrid signature scheme to have this
property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional
signature security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input
a hybrid signature (and message) and output a valid component signature
(and potentially different message) that will verify correctly. In other
words, separation of the hybrid signature into component signatures
implies that the component signature will fail verification (of the
component signature scheme) entirely. Therefore, authentication is
provided by the sender to the receiver through correct verification of
the digital signature(s), as in traditional signature security
experiments. It is not dependent on other components, such as message
content checking, or protocol level aspects, such as public key
provenance. As an illustrative example distinguishing WNS from SNS,
consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and
<tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m'
= (hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with
the hybrid artifact embedded in the message instead of the signature,
could be correctly verified. The separation would be identifiable
through further investigation but the signature verification itself
would not fail. Thus, this case shows WNS (assuming the verification
algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on
the public key certificate chains to explicitly define hybrid use of the
public key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without
<tt>Sigma_2.pk</tt>. This implies pushing the hybrid artifacts into the
protocol and system level and a dependency on the security of other
verification algorithms (namely those in the certificate chain). This
further requires that security analysis of a hybrid digital signature
requires analysis of the key provenance, i.e., not simply that a valid
public key is used but how its hybridization and hybrid artifacts have
been managed throughout the entire chain. External dependencies such as
this may imply hybrid artifacts lie outside the scope of the signature
algorithm itself. SNS may potentially be achieveable based on
dependencies at the system level.</t>
          <!--
However, since those artifacts are outside the security definition
scope for a digital signature, namely definitions such EUF-CMA, we do
not include them in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component
signatures needed to achieve a successful verification present in the
hybrid signature, but also that verification of both component
algorithms occurs simultaneously. Namely, "missing" information needs to
be computed by the verifier so they cannot “quit” the verification
process before both component signatures are verified. SV mimics
traditional digital signatures guarantees, essentially ensuring that the
hybrid digital signature behaves as a single algorithm vs. two separate
component stages. Alternatively phrased, under an SV guarantee it is not
possible for an unerring verifier to initiate termination of the hybrid
verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
          <!--

What the sender is assured of is that one of two cases occurred: either
1) the receiver ignored the digital signatures or 2) the receiver
initiated verification of the digital signatures (resulting in either
successful or failed verification). WNS complicates this situation,
resulting in six cases instead of two: 1) the receiver ignored the
digital signatures, 2) the receiver verified the full hybrid combination
(with success or failure); 3) the receiver initiated verification of the
hybrid digital signatures, but terminated once the standard component
succeeded or failed; 4) the receiver initiated verification of the
hybrid digital signatures, but terminated once the post-quantum
component succeeded or failed; 5) the receiver initiated verification of
the standard signature only (with success or failure), and 6) the
receiver initiated verification of the post-quantum signature only (with
success or failure). It may initially appear that (3) and (5) (resp. (4)
and (6)) are similar, however (3) and (4) are precisely the cases
eliminated by SNS, i.e. that the verifier does not take as input the
hybrid digital signatures, instead only attempting verification on one
component. SNS thus improves the situation to only four options. Still,
the verifier can still terminate upon correctly checking only one
component signature without actually verifying both parts. One could
argue that a receiver who has checked the accuracy of their
implementation should be assured that both components are verifying.
This misconstrues the original intent though, which is to correctly
mirror traditional digital signatures properties in hybrid digital
signatures; ideally, the sender should be assured that there are only
two options: 1) ignore the digital signatures or 2) verify the digital
signatures (resulting in either failure or full
verification). Simultaneous Verification addresses this property.

-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined,
based on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be
made that is generalizable to all such signatures. Such generality can
also result in simplified constructions whereas more tailored hybrid
variants might be more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other
cryptographic components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature
constructions are expected to be as performant as possible. For most
hybrid signatures this means that the computation time should only
minimally exceed the sum of the component signature computation time. It
is noted that performance of any variety may come at the cost of other
properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>,
hybrid signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts
are used), public keys, and the hybrid signature.  For the hybrid
signature, size should no more than minimally exceed the signature size
of the two component signatures. In some cases, it may be possible for a
hybrid signature to be smaller than the concatenationation of the two
component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>, duplicated information should
be avoided when possible. This might concern repeated information in
hybrid certificates or in the communication of component certificates in
additional to hybrid certificates (for example to achieve
backwards/forwards-compatibility), or sending multiple public keys or
signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to
detect the change during verification. An example of this includes
simple concatenation of signatures without any artifacts used. Nested
signatures (where a message is signed by one component algorithm and
then the message-signature combination is signed by the second component
algorithm) may also fall into this category, dependent on whether the
inner or outer signature is stripped off without any artifacts
remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message, signature,
or at the protocol level, etc.). This may enable the verifier to detect
if a component signature is stripped away from a hybrid signature, but
that detectability depends highly on the type of artifact and
permissions.  For instance, if a message contains a label artifact "This
message must be signed with a hybrid signature" then the system must be
allowed to analyze the message contents for possible artifacts. Whether
a hybrid signature offers (Weak/Strong) Non-Separability might also
depend on the implementation and policy of the protocol or application
the hybrid signature is used in on the verifier side. Such policies may
be further ambiguous to the sender, meaning that the type of
authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting
a new message as the message/inner signature combination and verify only
the outer signature.  In this case, the inner signature-tag is an
artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the
actual message, the certificate, or in other non-signature components,
this notion more closely ties to traditional algorithm security notions
(such as EUF-CMA) where security is dependent on the internal construct
of the signature algorithm and its verification. In this type, the
verifier can detect artifacts on an algorithmic level during
verification. For example, the signature itself may encode the
information that a hybrid signature scheme is used. Examples of this
type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but also only
when the verifier has verified both signatures. Moreover, no information
is leaked to the receiver during the verification process on the
possibile validity/invalidity of the component signatures until both
verify (or fail to verify). This construct most closely mirrors
traditional digital signatures where, assuming that the verifier does
verify a signature at all, the result is either a positive verification
of a the full signature or a failure if the signature is not valid. For
hybrid signatures, a <tt>full signature</tt> implies the hybridization of both
component algorithms, and therefore the strongest non-separability
notion enforces an all-or-nothing approach to verification. Examples of
algorithms providing this type of security can be found in
<xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--

Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.

-->

</section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping
attacks. This, however, depends strongly on where such evidence resides
(e.g., in the message, the signature, or somewhere on the protocol level
instead of at the algorithmic level). Even commonly discussed hybrid
approaches, such as concatenation, are not inherently tied to one type
of security (e.g., WNS or SNS). This can lead to ambiguities when
comparing different approaches and assumptions about security or lack
thereof. Thus in this section we cover artifact locations and also walk
through a high-level comparison of a few hybrid categories to show how
artifact location can differ within a given approach.  Artifact location
is tied to non-separability notions above; thus the selection of a given
security guarantee and general hybrid approach must also include finer
grained selection of artifact placement.</t>
      <!--

In this section we exemplify the difference in non-separability guarantees
depending on the artifact location for three types of hybridization, namely
concatenation, nesting, and 'fused' hybrid explained next.

-->

<!--

While the above discussion about the non-separability spectrum covers a spectrum
of security guarantees and existence of artifacts are linked to achieving those,
this (sub-)section covers some specific examples of artifact placement.

-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within
the message to the signature algorithm to the protocol level and even
into policy, as shown in <xref target="tab-artifact-location"/>.  For example, one
artifact location could be in the message to be signed, e.g., containing
a label artifact.  Depending on the hybrid type, it might be possible to
strip this away. For example, a quantum attacker could strip away the
quantum-secure signature of a concatenated dual signature, and (being
able to forge, e.g., ECDSA signatures) remove the label artifact from
the message as well. So, for many applications and threat models, adding
an artificat in the message might not prevent stripping attacks.
Another artifact location could be in the public key certificates as
described in <xref target="I-D.ounsworth-pq-composite-sigs"/>. In yet another case,
artifacts may be present through the fused hybrid method, thus making
them part of the signature at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent
on system policy, then cryptographic analysis must necessarily be
reliant on specific policies and it may not be possible to describe a
scheme's security in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in
different locations even within a single, common approach. We look at
the following categories of approaches: concatenation, nesting, and
fusion.  This is to illustrate that a given approach does not inherently
imply a specific non-separability notion and that there are subtleties
to the selection decision, since hybrid artifacts are related to
non-separability guarantees.  Additionally, this comparison highlights
how artifacts placement can be identical in two different hybrid
approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation,
nesting, and fusion) for clarity in description, before showing how each
one may have artifacts in different locations in
<xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component
algorithms <tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is
calculated as a concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID,
m)</tt>.</t>
          </li>
        </ul>
        <!--

WNS may be a goal of a concatenation approach.  NB: I took it out
because I don't see a reason why there shouldn't been a policy or
protocol artificat making concatenation SNS.

-->

<ul spacing="normal">
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in
a layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
        </ul>
        <!--

WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted
in a stripping attack) may be goals of a nesting approach.

-->

<ul spacing="normal">
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly
separated to form one or more valid component constructs. For example,
if both signature schemes are signatures schemes constructed through the
Fiat-Shamir transform, the component signatures would include responses
r_1 and r_2 and challenges c_1 and c_2, where c_1 and c_2 are hashes
computed over the respective commitments comm_1 and comm_2 (and the
message).  A fused hybrid signature could consist of the component
responses, r_1 and r_2 and and a challenge c that is computed as a hash
over both commitments, i.e., c = Hash(comm_1,comm_2,message).  As such,
c does not belong to either of the component signatures but rather both,
meaning that the signatures are 'entangled'.</t>
          </li>
        </ul>
        <!--

SNS and potentially SV are goals of a true hybrid approach.

-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type
of combiner, there are in fact several possible artifact locations
depending on implementation choices. Artifacts help to support detection
in the case of stripping attacks, which means that different artifact
locations imply different overall system implementation considerations
to be able to achieve such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as
there are no prescribed artifacts and therefore non-separability is not
achieved.  However, as can be seen, this does not imply that every
implementation using concatenation fails to achieve
non-separability. Thus, it is advisable for implementors to be
transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable
as the authenticity of the message relies on the validity of the
signature, and the artifact location means that the signature in turn
relies on the authentic content of the message (the artifact
label). This creates a risk of circular dependency. Alternative
approaches such as cases 3 and 4 solve this circular dependency by
provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may
be similar among some approaches. For instance, case 3 and case 6 both
contain artifacts in the certificate. Naturally these examples are
high-level and further specification on concrete schemes in the
categories are needed before prescribing non-separability guarantees to
each, but this does indicate how there could be a strong similarity
between such guarantees.  Such comparisons allow for a systematic
decision process, where security is compared and identified and, if
schemes are similar in the desired security goal, then decisions between
schemes can be based on performance and implementation ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire
chain must then also use a similar combiner if a straightforward
security argument is to be made. Other cases, such as 8, 9, 10, and 11
put artifacts within the signature itself, meaning that these bear the
closest resemblance to traditional schemes where message authenticity is
dependent on signature validity.</t>
        <!--

The artifact placements in nesting combiners may be surprisingly similar
to those in concatenation option cases 2, 3, and 4. Namely, if `sig_2 =
Sigma_2.Sign(hybridAlgID, (m, sig_1))`, then the "message" `(m, sig_1)`
input into `Sigma_2.Sign` actually contains the artifact and acts as a
label.  Unless an additional label is provided within $m$ itself,
$sig_1$ does not therefore contain an artifact. Where the artifact is
located is necessarily dependent upon the threat model; guessing which
algorithm is more at risk from a stripping attack and choosing the order
of nesting accordingly may change the location of an artifact.

Under a fused combiner, artifacts of hybridization are present within
the signature. This can be coupled with artifacts in the message, such
as through use of a label, and/or artifacts in the certificate if keys
are also provisioned in a combined certificate.

-->

</section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the
case of FIPS approval considerations as well as NIST, which has provided
basic guidance on hybrid signature use. NIST provides the following
guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to
approved (or even existing) signature schemes. Such a new, singular
algorithm relies on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security
of the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm
implementation in a black-box way. It may potentially change the
specifics of the other component algorithm implementations. As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
blackbox way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA,
the adversary 'wins' the security experiment if it can produce a new
message such that a message-signature pair <tt>(m, sig)</tt> with it correctly
verifies. This traditional security notion is challenged under a hybrid
construct.</t>
      <t>The most straightforward comparison would be for the adversary to
attempt to produce a new message <tt>m'</tt> that a message-hybrid signature
pair <tt>(m', sig_h)</tt> correctly verifies.  However, such a guarantee
depends on the signature being strongly non-separable. Otherwise, in
practical terms a security experiment must capture the case that an
existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of traditional
security analysis and represent considerations that would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used
in security protocols. It is an informational document and does not
directly affect any other Internet draft. The security considerations
for any specific implementation or incorporation of a hybrid scheme
should be discussed in the relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS.</name>
        <t>There is an inherent mutual exclusion between backwards compatibility
and SNS.  While WNS allows for a valid separation under leftover
artifacts, SNS will ensure verification failure if a receiver attempts
separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability.</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process
hybrid signatures, all differences between the legacy signature format
and the hybrid signature format must be allowed to be ignored, including
skipping verification of signatures additional to the classical
signature. As such, if a system does skip an component signature,
security does not rely on the security of all component signatures. Note
that this mutual exclusion occurs at the verification stage, as a hybrid
signature that is verified by a system that can process both component
schemes can provide hybrid unforgeability even if another (legacy)
system, processing the same hybrid signature, loses that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval.</name>
        <t>It seems that the more simultaneous verification is enforced by the
hybrid design, the higher is the need-for-approval as simultaneous
verification algorithms fuse (or 'entangle') the verification of the
component algorithms such that verification operations from the
different component schemes depend on each other in some way. For
example, concatenation of signatures in a black-box way without any
artefacts is, e.g., FIPS-approved, but the component signatures are
usually verified separately and no 'simultaneous verification' is
enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="September" year="2023"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="2" month="February" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite Signatures For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>CableLabs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="11" month="February" year="2024"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-12"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
