<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-jose-pqc-kem-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="PQ KEM for JOSE and COSE">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-jose-pqc-kem-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Munich</city>
          <country>Germany</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="November" day="03"/>
    <area>Security</area>
    <workgroup>JOSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <abstract>
      <?line 89?>

<t>This document describes the conventions for using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) within JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-jose-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        jose Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Quantum computing is no longer perceived as a consequence of computational sciences and theoretical physics.  Considerable research efforts and enormous corporate and government funding for the development of practical quantum computing systems are being invested currently. As such, as quantum technology advances, there is the potential for future quantum computers to have a significant impact on current cryptographic systems.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>As the National Institute of Standards and Technology (NIST) is still in the process of selecting the new post-quantum cryptographic algorithms that are secure against both quantum and classical computers, the purpose of this document is to propose a PQ-KEMs to protect the confidentiality of content encrypted using JOSE and COSE against the quantum threat.</t>
      <t>Although this mechanism could thus be used with any PQ-KEM, this document focuses on Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient
using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203-ipd"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>Section 4.6 of the JSON Web Algorithms (JWA) specification, see <xref target="RFC7518"/>, defines two ways of using a key agreement:</t>
      <ul spacing="normal">
        <li>
          <t>When Direct Key Agreement is employed, the shared secret established through the Traditional Algorithm will be the content encryption key (CEK).</t>
        </li>
        <li>
          <t>When Key Agreement with Key Wrapping is employed, the shared secret established through the Traditional Algorithm will wrap the CEK.</t>
        </li>
      </ul>
      <t>For efficient use with multiple recipient the key wrap approach is used since the content can be encrypted once with the CEK but each CEK is encrypted per recipient. Similarly, Section 8.5.4 and Section 8.5.5 of COSE <xref target="RFC9052"/> define the Direct Key Agreement and Key Agreement with Key Wrap, respectively. This document proposes the use of PQ-KEMs for these two modes.</t>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure. As a consequence, one can re-use PQC KEM public keys but there is an upper bound that must be adhered to.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully 
trusted. HPKE <xref target="RFC9180"/> is a KEM that can be extended to support hybrid post-quantum KEMs and the specification for the use of PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE is described in <xref target="I-D.reddy-cose-jose-pqc-hybrid-hpke"/>.</t>
    </section>
    <section anchor="kem-pqc-algorithms">
      <name>KEM PQC Algorithms</name>
      <t>The National Institute of Standards and Technology (NIST) started a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms, as seen <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">here</eref>. Said process has reached its <eref target="https://csrc.nist.gov/publications/detail/nistir/8413/final">first announcement</eref> in July 5, 2022, which stated which candidates to be standardized for KEM:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encapsulation Mechanisms (KEMs): ML-KEM <xref target="FIPS204"/>, previously known as Kyber, is a module learning with errors (MLWE)-based KEM. Three security levels have been defined in the NIST PQC Project, namely Level 1, 3, and 5. These levels correspond to the hardness of breaking AES-128, AES-192 and AES-256, respectively.</t>
        </li>
      </ul>
      <t>NIST announced as well that they will be <eref target="https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/guidelines-for-submitting-tweaks-fourth-round.pdf">opening a fourth round</eref> to standardize an alternative KEM, and a <eref target="https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf">call</eref> for new candidates for a post-quantum signature algorithm.</t>
      <section anchor="ml-kem">
        <name>ML-KEM</name>
        <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. ML-KEM key generation, encapsulation and decaspulation functions are defined in <xref target="FIPS204"/>. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
      <section anchor="encrypt">
        <name>PQ-KEM Encapsulation</name>
        <t>The encapsulation process is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Generate an inital shared secret SS' and the associated ciphertext CT
using the KEM encapsulation function and the recipient's public
key recipPubKey.</t>
          </li>
        </ol>
        <artwork><![CDATA[
          (SS', CT) = kemEncaps(recipPubKey)
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Derive a final shared secret SS of length SSLen bytes from
the initial shared secret SS' using the underlying key derivation
function:</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS = KDF(SS', SSLen)
]]></artwork>
        <t>TBD: ML-KEM can be used directly without HPKE. However, HPKE with ML-KEM is specifically discussed in the document draft-connolly-cfrg-hpke-mlkem. Specifications like TLS (draft-connolly-tls-mlkem-key-agreement) and IKEv2 (draft-kampanakis-ml-kem-ikev2) utilize ML-KEM directly, without employing HPKE with ML-KEM.</t>
        <t>In Direct Key Agreement mode, the output of the KDF <bcp14>MUST</bcp14> be a key of the same length as that used by encryption algorithm. In Key Agreement with Key Wrapping mode, the output of the KDF <bcp14>MUST</bcp14> be a key of the length needed for the specified key wrap algorithm.</t>
        <t>When Direct Key Agreement is employed, SS is the CEK. When Key Agreement with Key Wrapping is employed, SS is used to wrap the CEK.</t>
      </section>
      <section anchor="decrypt">
        <name>PQ-KEM Decapsulation</name>
        <t>The decapsulation process is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Decapsulate the ciphertext CT using the KEM decapsulation
function and the recipient's private key to retrieve the initial shared
secret SS':</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS' = kemDecaps(recipPrivKey, CT)
]]></artwork>
        <artwork><![CDATA[
If the decapsulation operation outputs an error, output "decryption error", and stop.
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Derive the final shared secret SS of length SSLen bytes from
the inital secret SS' using the underlying key derivation
function:</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS = KDF(SS', SSLen)
]]></artwork>
      </section>
    </section>
    <section anchor="kdf">
      <name>KDF</name>
      <section anchor="key-derivation-for-jose">
        <name>Key Derivation for JOSE</name>
        <t>The key derivation for JOSE is performed using the KMAC defined in NIST SP 800-108r1-upd1 <xref target="SP-800-108r1"/>. The KMAC(K, X, L, S) parameters are instantiated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>K: the input key-derivation key. In this document this is the initial shared secret (SS') outputted from the 
kemEncaps() or kemDecaps() functions.</t>
          </li>
          <li>
            <t>X: JOSE context-specific data defined in Section 4.6.2 of <xref target="RFC7518"/>, i.e., concat(AlgorithmID, PartyUInfo, PartyVInfo, 
SuppPubInfo, SuppPrivInfo).</t>
          </li>
          <li>
            <t>L: length of the output key in bits and it would be set to match the length of the key required for the AEAD operation.</t>
          </li>
          <li>
            <t>S: the optional customization label. In this document this parameter is unused, that is it is the zero-length string "".</t>
          </li>
        </ul>
        <t>For all security levels of ML-KEM, KMAC256 is used.</t>
      </section>
      <section anchor="key-derivation-for-cose">
        <name>Key Derivation for COSE</name>
        <t>The key derivation for COSE is performed using the KMAC defined in NIST SP 800-108r1-upd1 <xref target="SP-800-108r1"/>. The KMAC(K, X, L, S) parameters are instantiated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>K: the input key-derivation key. In this document this is the initial shared secret (SS') outputted from the 
kemEncaps() or kemDecaps() functions.</t>
          </li>
          <li>
            <t>X: The context structure defined in Section 5.2 of <xref target="RFC9053"/>. To ensure consistent serialization and interoperability, the encoding of the context structure in COSE must follow CBOR deterministic encoding, as defined in <xref target="RFC8949"/>.</t>
          </li>
          <li>
            <t>L: length of the output key in bits and it would be set to match the length of the key required for the AEAD operation.</t>
          </li>
          <li>
            <t>S: the optional customization label. In this document this parameter is unused, that is it is the zero-length string "".</t>
          </li>
        </ul>
        <t>For all security levels of ML-KEM, KMAC256 is used.</t>
      </section>
    </section>
    <section anchor="post-quantum-kem-in-jose">
      <name>Post-quantum KEM in JOSE</name>
      <t>As explained in <xref target="rational"/> JWA defines two ways to use public key cryptography with JWE:</t>
      <ul spacing="normal">
        <li>
          <t>Direct Key Agreement</t>
        </li>
        <li>
          <t>Key Agreement with Key Wrapping</t>
        </li>
      </ul>
      <t>This specification describes these two modes of use for PQ-KEM in JWE. Unless otherwise stated, no changes to the procedures described in <xref target="RFC7516"/> have been made.</t>
      <section anchor="direct-key-agreement">
        <name>Direct Key Agreement</name>
        <ul spacing="normal">
          <li>
            <t>The "alg" header parameter <bcp14>MUST</bcp14> be a PQ-KEM algorithm chosen from the JSON Web Signature and Encryption Algorithms registry defined in <xref target="JOSE-IANA"/>.</t>
          </li>
          <li>
            <t>The CEK will be generated using the process explained in <xref target="encrypt"/>. The output of the <xref target="encrypt"/> <bcp14>MUST</bcp14> be a secret key of the same length as that used by the "enc" algorithm.</t>
          </li>
          <li>
            <t>The usage for the "alg" and "enc" header parameters remain the same as in JWE <xref target="RFC7516"/>. Subsequently, the plaintext will be encrypted using the CEK, as detailed in Step 15 of Section 5.1 of <xref target="RFC7516"/>.</t>
          </li>
          <li>
            <t>The parameter "ek" <bcp14>MUST</bcp14> include the output ('ct') from the PQ-KEM algorithm, encoded using base64url.</t>
          </li>
          <li>
            <t>The recipient <bcp14>MUST</bcp14> base64url decode the ciphertext from the JWE Encrypted Key and then use it to derive the CEK using the process defined in <xref target="decrypt"/>.</t>
          </li>
          <li>
            <t>The JWE Encrypted Key <bcp14>MUST</bcp14> be absent.</t>
          </li>
        </ul>
      </section>
      <section anchor="key-agreement-with-key-wrapping">
        <name>Key Agreement with Key Wrapping</name>
        <ul spacing="normal">
          <li>
            <t>The derived key is generated using the process explained in <xref target="encrypt"/> and used to encrypt the CEK.</t>
          </li>
          <li>
            <t>The parameter "ek" <bcp14>MUST</bcp14> include the output ('ct') from the PQ-KEM algorithm, encoded using base64url.</t>
          </li>
          <li>
            <t>The JWE Encrypted Key <bcp14>MUST</bcp14> include the base64url-encoded encrypted CEK.</t>
          </li>
          <li>
            <t>The 'enc' (Encryption Algorithm) header parameter <bcp14>MUST</bcp14> specify a content encryption algorithm from the JSON Web Signature and Encryption Algorithms registry, as defined in <xref target="JOSE-IANA"/>.</t>
          </li>
          <li>
            <t>The recipient <bcp14>MUST</bcp14> base64url decode the ciphertext from "ek". Subsequently, it is used to derive the key, through the process defined in <xref target="decrypt"/>. The derived key will then be used to decrypt the CEK.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="post-quantum-kem-in-cose">
      <name>Post-Quantum KEM in COSE</name>
      <t>This specification supports two uses of PQ-KEM in COSE, namely</t>
      <ul spacing="normal">
        <li>
          <t>PQ-KEM in a Direct Key Agreement mode.</t>
        </li>
        <li>
          <t>PQ-KEM in a Key Agreement with Key Wrap mode.</t>
        </li>
      </ul>
      <t>In both modes, the COSE header parameter 'ek' defined in Section 7.2 of <xref target="I-D.ietf-cose-hpke"/>, 
is used to convey the output ('ct') from the PQ KEM Encaps algorithm.</t>
      <section anchor="direct-key-agreement-1">
        <name>Direct Key Agreement</name>
        <t>The CEK will be generated using the process explained in <xref target="encrypt"/>. 
Subsequently, the plaintext will be encrypted using the CEK. The resulting 
ciphertext is either included in the COSE_Encrypt or is detached. If a payload is
transported separately then it is called "detached content". A nil CBOR
object is placed in the location of the ciphertext. See Section 5
of <xref target="RFC9052"/> for a description of detached payloads.</t>
        <t>The COSE_Recipient structure for the recipient is organized as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The sender <bcp14>MUST</bcp14> set the 'alg' parameter to indicate the use of the PQ-KEM algorithm.</t>
          </li>
          <li>
            <t>This documents RECOMMENDS the use of the 'kid' parameter
(or other parameters) to explicitly identify the recipient public key
used by the sender. If the COSE_Encrypt contains the 'kid' then the recipient may
use it to select the appropriate private key.</t>
          </li>
        </ul>
      </section>
      <section anchor="key-agreement-with-key-wrap">
        <name>Key Agreement with Key Wrap</name>
        <t>With the two layer structure the PQ-KEM information is conveyed in the COSE_recipient 
structure, i.e. one COSE_recipient structure per recipient.</t>
        <t>In this approach the following layers are involved:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 0 (corresponding to the COSE_Encrypt structure) contains the content (plaintext)
encrypted with the CEK. This ciphertext may be detached, and if not detached, then
it is included in the COSE_Encrypt structure.</t>
          </li>
          <li>
            <t>Layer 1 (corresponding to a recipient structure) contains parameters needed for 
PQ-KEM to generate a shared secret used to encrypt the CEK. This layer conveys<br/>
the encrypted CEK in the "ciphertext" field (Section 5.1 of <xref target="RFC9052"/>). 
The unprotected header <bcp14>MAY</bcp14> contain the kid parameter to identify the static recipient 
public key the sender has been using with PQ-KEM.</t>
          </li>
        </ul>
        <t>This two-layer structure is used to encrypt content that can also be shared with
multiple parties at the expense of a single additional encryption operation.
As stated above, the specification uses a CEK to encrypt the content at layer 0.</t>
      </section>
    </section>
    <section anchor="JOSE-PQ-KEM">
      <name>JOSE Ciphersuite Registration</name>
      <t>This specification registers a number of PQ-KEM algorithms for use with JOSE.</t>
      <t>All security levels of ML-KEM internally utilize SHA3-256, SHA3-512, SHAKE128, and SHAKE256. This internal usage influences the selection of the KDF as described in this document.</t>
      <t>ML-KEM-512 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 128 bits of security and with a key wrapping algorithm with a key length of at least 128 bits.</t>
      <t>ML-KEM-768 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 192 bits of security and with a key wrapping algorithm with a key length of at least 192 bits.</t>
      <t>ML-KEM-1024 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 256 bits of security and with a key wrapping algorithm with a key length of at least 256 bits.</t>
      <ul spacing="normal">
        <li>
          <t>In Direct key agreement, the parameter "alg" <bcp14>MUST</bcp14> be specified, and its value <bcp14>MUST</bcp14> be one of the values specified in <xref target="direct-table"/>. (Note that future specifications <bcp14>MAY</bcp14> extend the list of algorithms.)</t>
        </li>
      </ul>
      <figure anchor="direct-table">
        <name>Direct Key Agreement: Algorithms.</name>
        <artwork><![CDATA[
 +===============================+===================================+
 | alg                           | Description                       |
 +===============================+===================================+
 | MLKEM512                      | ML-KEM-512                        |
 +===============================+===================================+
 | MLKEM768                      | ML-KEM-768                        |
 +===============================+===================================+
 | MLKEM1024                     | ML-KEM-1024                       |
 +===============================+===================================+
]]></artwork>
      </figure>
      <ul spacing="normal">
        <li>
          <t>In Key Agreement with Key Wrapping, the parameter "alg" <bcp14>MUST</bcp14> be specified, and its value <bcp14>MUST</bcp14> be one of the values specified in the table <xref target="keywrap-table"/>.</t>
        </li>
      </ul>
      <figure anchor="keywrap-table">
        <name>Key Agreement with Key Wrapping: Algorithms.</name>
        <artwork><![CDATA[
 +=================================+===================================+
 | alg                             | Description                       |
 +=================================+===================================+
 | MLKEM512-AES128KW               | ML-KEM-512 + AES128KW             |
 +=================================+===================================+
 | MLKEM768-AES192KW               | ML-KEM-768 + AES192KW             |
 +=================================+===================================+
 | MLKEM1024-AES256KW              | ML-KEM-1024 + AES256KW            |
 +=================================+===================================+
]]></artwork>
      </figure>
    </section>
    <section anchor="COSE-PQ-KEM">
      <name>COSE Ciphersuite Registration</name>
      <t><xref target="mapping-table"/> maps the JOSE algorithm names to the COSE algorithm values (for the PQ-KEM ciphersuites defined by this document).</t>
      <figure anchor="mapping-table">
        <name>Mapping between JOSE and COSE PQ-KEM Ciphersuites.</name>
        <artwork><![CDATA[
+===============================+=========+===================================+=============+
| JOSE                          | COSE ID | Description                       | Recommended |
+===============================+=========+===================================+=============+
| MLKEM512                      | TBD1    | ML-KEM-512                        | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| MLKEM768                      | TBD2    | ML-KEM-768                        | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| MLKEM1024                     | TBD3    | ML-KEM-1024                       | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| MLKEM512+AES128KW             | TBD4    | ML-KEM-512  + AES128KW            | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| MLKEM768+AES192KW             | TBD5    | ML-KEM-768  + AES192KW            | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| MLKEM1024+AES256KW            | TBD6    | ML-KEM-1024  + AES256KW           | No          |
+-------------------------------+---------+-----------------------------------+-------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security. ML-KEM has such security properties.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>The following entries are added to the "JSON Web Signature and Encryption Algorithms" registry:</t>
        <ul spacing="normal">
          <li>
            <t>Algorithm Name: MLKEM512</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-512 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: MLKEM768</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-768 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: MLKEM1024</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-1024 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: MLKEM512+A128KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-512 PQ-KEM and CEK wrapped with "A128KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: MLKEM768+A192KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-768 and CEK wrapped with "A192KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: MLKEM1024+A256KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-1024 and CEK wrapped with "A256KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
        </ul>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>The following has to be added to the "COSE Algorithms" registry:</t>
        <ul spacing="normal">
          <li>
            <t>Name: MLKEM512</t>
          </li>
          <li>
            <t>Value: TBD1</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-512 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: MLKEM768</t>
          </li>
          <li>
            <t>Value: TBD2</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-768 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: MLKEM1024</t>
          </li>
          <li>
            <t>Value: TBD3</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-1024 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: MLKEM512+A128KW</t>
          </li>
          <li>
            <t>Value: TBD4</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-512 PQ-KEM and CEK wrapped with "A128KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: MLKEM768+192KW</t>
          </li>
          <li>
            <t>Value: TBD5</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-768 and CEK wrapped with "A192KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: MLKEM1024+A256KW</t>
          </li>
          <li>
            <t>Value: TBD6</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-1024 and CEK wrapped with "A256KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara, Neil Madden and AJITOMI Daisuke for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="JOSE-IANA" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Web Signature and Encryption Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>FIPS 203 (Initial Public Draft): Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203-ipd" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SP-800-108r1" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1-upd1.pdf">
          <front>
            <title>Recommendation for Key Derivation Using Pseudorandom Functions</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="October" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.reddy-cose-jose-pqc-hybrid-hpke">
          <front>
            <title>PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <date day="3" month="October" year="2024"/>
            <abstract>
              <t>   This document outlines the construction of a PQ/T Hybrid Key
   Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE)
   for integration with JOSE and COSE.  It specifies the utilization of
   both traditional and Post-Quantum Cryptography (PQC) algorithms,
   referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-02"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The advent of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both classical and quantum attacks.  This document
   explains why engineers need to be aware of and understand post-
   quantum cryptography, detailing the impact of CRQCs on existing
   systems and the challenges involved in transitioning.  Unlike
   previous cryptographic updates, this shift may require significant
   protocol redesign due to the unique properties of post-quantum
   algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-06"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="12" month="July" year="2024"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by one
   of the authenticated variants of HPKE.

   This document defines the use of the HPKE with COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
