<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-cfrg-det-sigs-with-noise-03" category="info" consensus="true" submissionType="IRTF" updates="6979, 8032" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title>Hedged ECDSA and EdDSA Signatures</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-det-sigs-with-noise-03"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="E." surname="Thormarker" fullname="Erik Thormarker">
      <organization>Ericsson</organization>
      <address>
        <email>erik.thormarker@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Ruohomaa" fullname="Sini Ruohomaa">
      <organization>Ericsson</organization>
      <address>
        <email>sini.ruohomaa@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="16"/>
    <area>IRTF</area>
    <workgroup>Crypto Forum</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 425?>

<t>Deterministic elliptic-curve signatures such as deterministic ECDSA and EdDSA have gained popularity over randomized ECDSA as their security does not depend on a source of high-quality randomness. Recent research, however, has found that implementations of these signature algorithms may be vulnerable to certain side-channel and fault injection attacks due to their deterministic nature. One countermeasure to such attacks is hedged signatures where the calculation of the per-message secret number includes both fresh randomness and the message. This document updates RFC 6979 and RFC 8032 to recommend hedged constructions in deployments where side-channel attacks and fault injection attacks are a concern. The updates are invisible to the validator of the signature and compatible with existing ECDSA and EdDSA validators.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cfrg.github.io/draft-irtf-cfrg-det-sigs-with-noise/draft-irtf-cfrg-det-sigs-with-noise.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-irtf-cfrg-det-sigs-with-noise/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/search/?email_list=cfrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cfrg/draft-irtf-cfrg-det-sigs-with-noise"/>.</t>
    </note>
  </front>
  <middle>
    <?line 429?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In Elliptic-Curve Cryptography (ECC) signature algorithms, the per-message secret number has traditionally been generated from a random number generator (RNG). The security of such algorithms depends on the cryptographic quality of the random number generation and biases in the randomness may have catastrophic effects such as compromising private keys (see e.g., <xref target="Bernstein19"/>). Repeated per-message secret numbers have caused several severe security accidents in practice. As stated in <xref target="RFC6979"/>, the need for a cryptographically secure source of randomness is also a hindrance to deployment of randomized ECDSA <xref target="FIPS-186-5"/> in architectures where secure random number generation is challenging, in particular, embedded IoT systems and smartcards. <xref target="ABFJLM17"/> does however state that smartcards typically have a high-quality RNG on board, which makes it significantly easier and faster to use the RNG instead of doing a hash computation.</t>
      <t>In deterministic ECC signatures schemes such as Deterministic Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6979"/><xref target="FIPS-186-5"/> and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8032"/>, the per-message secret number is instead generated in a fully deterministic way as a function of the message and the private key. Except for key generation, the security of such deterministic signatures does not rely on a source of high-quality randomness. This makes verification of implementations easier. As they are presumed to be safer, deterministic signatures have gained popularity and are referenced and recommended by a large number of recent RFCs <xref target="RFC8037"/> <xref target="RFC8080"/> <xref target="RFC8225"/> <xref target="RFC8387"/> <xref target="RFC8410"/> <xref target="RFC8411"/> <xref target="RFC8419"/> <xref target="RFC8420"/> <xref target="RFC8422"/> <xref target="RFC8446"/> <xref target="RFC8463"/> <xref target="RFC8550"/> <xref target="RFC8591"/> <xref target="RFC8608"/> <xref target="RFC8624"/> <xref target="RFC9053"/>.</t>
      <t>Side-channel attacks are potential attack vectors for implementations of cryptographic algorithms. Side-Channel attacks can in general be classified along three orthogonal axes: passive vs. active, physical vs. logical, and local vs. remote <xref target="SideChannel"/>. It has been demonstrated how side-channel attacks such as power analysis <xref target="BCPST14"/> and timing attacks <xref target="Minerva19"/> <xref target="TPM-Fail19"/> allow for practical recovery of the private key in some existing implementations of randomized ECDSA. <xref target="BSI"/> summarizes minimum requirements for evaluating side-channel attacks of elliptic curve implementations and writes that deterministic ECDSA and EdDSA requires extra care. The deterministic ECDSA specification <xref target="RFC6979"/> notes that the deterministic generation of per-message secret numbers may be useful to an attacker in some forms of side-channel attacks and as stated in <xref target="Minerva19"/>, deterministic signatures like <xref target="RFC6979"/> and <xref target="RFC8032"/> might help an attacker to reduce the noise in the side-channel when the same message it signed multiple times. Recent research <xref target="SH16"/> <xref target="BP16"/> <xref target="RP17"/> <xref target="ABFJLM17"/> <xref target="SBBDS17"/> <xref target="PSSLR17"/> <xref target="SB18"/> <xref target="WPB19"/> <xref target="AOTZ19"/> <xref target="FG19"/> have theoretically and experimentally analyzed the resistance of deterministic ECC signature algorithms against side-channel and fault injection attacks. The conclusions are that deterministic signature algorithms have theoretical weaknesses against certain instances of these types of attacks and that the attacks are practically feasibly in some environments. These types of attacks may be of particular concern for hardware implementations such as embedded IoT devices and smartcards where the adversary can be assumed to have access to the device to induce faults and measure its side-channels such as timing information, power consumption, electromagnetic leaks, or sound with low signal-to-noise ratio. A good summary of fault attacks in given by <xref target="Cao20"/>. See also the discussions and references in <xref target="Comments-186-5"/>.</t>
      <t>Fault attacks may also be possible without physical access to the device. RowHammer <xref target="RowHammer14"/> showed how an attacker to induce DRAM bit-flips in memory areas the attacker should not have access to. Plundervolt <xref target="Plundervolt19"/> showed how an attacker with root access can use frequency and voltage scaling interfaces to induce faults that bypass even secure execution technologies. RowHammer can e.g., be used in operating systems with several processes or cloud scenarios with virtualized servers. Protocols like TLS, SSH, and IKEv2 that add a random number to the message to be signed mitigate some types of attacks <xref target="PSSLR17"/>.</t>
      <t>Government agencies are clearly concerned about these attacks. In <xref target="Notice-186-5"/> and <xref target="FIPS-186-5"/>, NIST warns about side-channel and fault injection attacks, but states that deterministic ECDSA may be desirable for devices that lack good randomness. The quantum-resistant ML-DSA <xref target="Draft-204"/> under standardization by NIST uses hedged signing by default. BSI has published <xref target="BSI"/> and researchers from BSI have co-authored two research papers <xref target="ABFJLM17"/> <xref target="PSSLR17"/> on attacks on deterministic signatures. For many industries it is important to be compliant with both RFCs and government publications, alignment between IETF, NIST, and BSI recommendations would be preferable.</t>
      <t>Note that deriving per-message secret number deterministically, is also insecure in a multi-party signature setting <xref target="I-D.irtf-cfrg-frost"/>.</t>
      <t>One countermeasure to entropy failures, side-channel attacks, and fault injection attacks recommended by <xref target="Langley13"/> <xref target="RP17"/> <xref target="ABFJLM17"/> <xref target="SBBDS17"/> <xref target="PSSLR17"/> <xref target="SB18"/> <xref target="AOTZ19"/> <xref target="FG19"/> and implemented in <xref target="OpenSSL13a"/> <xref target="OpenSSL13b"/> <xref target="XEdDSA"/> <xref target="libSodium"/> <xref target="libHydrogen"/> is to generate the per-message secret number from a random string, a secret key, and the message. This combines the security benefits of fully randomized per-message secret numbers with the security benefits of fully deterministic secret numbers.  Such a hedged construction protects against key compromise due to weak random number generation, but still effectively prevents many side-channel and fault injection attacks that exploit determinism. Hedged constructions require minor changes to the implementation and does not increase the number of elliptic curve point multiplications and is therefore suitable for constrained IoT. Adding randomness to EdDSA is not compliant with <xref target="RFC8032"/>. <xref target="Kampanakis16"/> describes an alternative <xref target="FIPS-186-5"/> compliant approach where message specific pseudo-random information is used as an additional input to the random number generation to create per-message secret number. <xref target="Bernstein14"/> states that generation of the per-message secret number from a subset of a random string, a secret key, the message, and a message counter is common in DSA/ECDSA implementations.</t>
      <t>This document updates <xref target="RFC6979"/> and <xref target="RFC8032"/> to recommend hedged constructions in deployments where side-channel and fault injection attacks are a concern. The updates are invisible to the validator of the signature. Produced signatures remain fully compatible with unmodified ECDSA and EdDSA verifiers and existing key pairs can continue to be used. As the precise use of the noise is specified, test vectors can still be produced, see <xref target="test"/>, and implementations can be tested against them.</t>
    </section>
    <section anchor="conventions-used-in-this-document">
      <name>Conventions Used in This Document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="SecEdDSA">
      <name>Hedged EdDSA</name>
      <t>This document updates RFC 8032 (EdDSA) to recommend hedged variants of EdDSA for deployments where side-channel attacks and fault injection attacks are a concern, the variants are called hedged EdDSA. The updates are invisible to the validator of the signature and compatible with existing EdDSA validators.</t>
      <t>Update to RFC 8032:</t>
      <t>For Ed25519ph, Ed25519ctx, and Ed25519: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.1.6 of <xref target="RFC8032"/>:</t>
      <artwork><![CDATA[
2.  Compute SHA-512(0x00 || Z || dom2(F, C) || 000... || prefix ||
    000... || PH(M)), where M is the message to be signed, Z is 32
    octets of random data, the number of zeroes 000... is chosen so
    that the lengths of (0x00 || Z || dom2(F, C) || 000...) and
    (prefix || 000...) are multiples of 128 octets.  Interpret the
    64-octet digest as a little-endian integer r.
]]></artwork>
      <t>For Ed448ph and Ed448: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.2.6 of <xref target="RFC8032"/>:</t>
      <artwork><![CDATA[
2.  Compute SHAKE256(0x00 || Z || dom4(F, C) || 000... || prefix ||
    000... || PH(M), 114), where M is the message to be signed, and Z
    is 57 octets of random data, the number of zeroes 000... is
    chosen so that the length of (0x00 || Z || dom4(F, C) || 000...)
    and (prefix || 000...) are multiples of 136 octets.  F is 1 for
    Ed448ph, 0 for Ed448, and C is the context to use.  Interpret the
    114-octet digest as a little-endian integer r.
]]></artwork>
    </section>
    <section anchor="hedged-ecdsa">
      <name>Hedged ECDSA</name>
      <t>This document updates RFC 6979 (deterministic ECDSA) to recommend a hedged variant of ECDSA for deployments where side-channel attacks and fault injection attacks are a concern, the variant is called hedged ECDSA. The updates are invisible to the validator of the signature and compatible with existing ECDSA validators.</t>
      <t>Update to RFC 6979: In ECDSA deployments where side-channel and fault injection attacks are a concern, the following steps are RECOMMENDED instead of steps (d) and (f) in Section 3.2 of <xref target="RFC6979"/>:</t>
      <artwork><![CDATA[
d.  Set:

       K = HMAC_K(V || 0x00 || Z || 000... || int2octets(x) || 000...
       || bits2octets(h1))

    where '||' denotes concatenation.  In other words, we compute
    HMAC with key K, over the concatenation of the following, in
    order: the current value of V, a sequence of eight bits of value
    0, random data Z (of the same length as int2octets(x)), a
    sequence of zero bits 000..., the encoding of the (EC)DSA private
    key x, a sequence of zero bits 000..., and the hashed message
    (possibly truncated and extended as specified by the bits2octets
    transform).  The number of zeroes 000... is chosen so that the
    length of (V || 0x00 || Z || 000...) and (int2octets(x) ||
    000...) are multiples of the block size of the hash function.
    The HMAC result is the new value of K.  Note that the private key
    x is in the [1, q-1] range, hence a proper input for int2octets,
    yielding rlen bits of output, i.e., an integral number of octets
    (rlen is a multiple of 8).
]]></artwork>
      <artwork><![CDATA[
f.  Set:

       K = HMAC_K(V || 0x01 || Z || 000... || int2octets(x) || 000...
       || bits2octets(h1))

    Note that the "internal octet" is 0x01 this time. The string
    (Z || 000... || int2octets(x) || 000.. || bits2octets(h1)),
    called provided_data in HMAC_DRBG, is the same as in step (d).
]]></artwork>
      <t>When ECDSA is used with SHAKE <xref target="SHA3"/> the HMAC construction above MAY be used but it is RECOMMENDED to use the more efficient KMAC construction <xref target="KMAC"/>. SHAKE is a variable-length hash function defined as SHAKE(M, d) where the output is a d-bits-long digest of message M. When ECDSA is used with SHAKE128(M, d), it is RECOMMENDED to replace HMAC(K, M) with KMAC128(K, M, d2, ""), where d2 = max(d, qlen) and qlen is the binary length of the order of the base point of the elliptic curve <xref target="RFC6979"/>. When ECDSA is used with SHAKE256(M, d), it is RECOMMENDED to replace HMAC(K, M) with KMAC256(K, M, d2, ""), where d2 = max(d, qlen). <xref target="RFC8692"/> and <xref target="FIPS-186-5"/> define the use of SHAKE128 with an output length of 256 bits and SHAKE256 with an output length or 512 bits.</t>
      <t>In new deployments, where side-channel and fault injection attacks are a concern, EdDSA with additional randomness as specified in <xref target="SecEdDSA"/> is RECOMMENDED.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The constructions in this document follow the high-level approach in <xref target="XEdDSA"/> to calculate the per-message secret number from the hash of the private key and the message, but add additional randomness into the calculation for greater resilience. This does not re-introduce the strong security requirement of randomness needed by randomized ECDSA <xref target="FIPS-186-5"/>. The randomness of Z need not be perfect but SHALL be generated by a cryptographically secure pseudo random number generator (CSPRNG) and SHALL be secret. Even if the same random number Z is used to sign two different messages, the security will be the same as deterministic ECDSA and EdDSA and an attacker will not be able to compromise the private key with algebraic means as in fully randomized ECDSA <xref target="FIPS-186-5"/>. With the construction specified in this document, two signatures over two equal messages are different which prevents information leakage in use cases where signatures but not messages are public. The construction in this document place the additional randomness before the message to align with randomized hashing methods.</t>
      <t><xref target="SBBDS17"/> states that <xref target="XEdDSA"/> would not prevent their attack due to insufficient mixing of the hashed private key with the additional randomness. The construction in this document aims to mitigate fault injection attacks that leverage determinism in deterministic ECDSA and EdDSA signatures (see e.g., <xref target="ABFJLM17"/>), by randomizing nonce generation. Fault injection attacks that achieve instruction skipping as in e.g., Section 3.4 of <xref target="ABFJLM17"/> are not necessarily stopped. It seems to be possible to, at the same time, also mitigate attacks that use first order differential power analysis (DPA) against the hash computation of deterministic nonces in EdDSA and ECDSA (see e.g., <xref target="ABFJLM17"/><xref target="SBBDS17"/>). The mitigation in this document agrees with one mentioned in <xref target="ABFJLM17"/> and appears to be as effective against the referenced first order DPA attacks as the one in <xref target="SBBDS17"/>. The random bytes Z are re-used in step d and f of Hedged ECDSA to align with HMAC_DRBG (see Section 3.3 of <xref target="RFC6979"/>). This may make certain DPA attacks easier than if randomness had been sampled fresh for each respective step. Note however that V is updated between the steps and that the secret key x is processed in a new input block of the hash function after processing V and Z in each respective step.</t>
      <t>Another countermeasure to fault attacks is to force the signer to verify the signature in the last step of the signature generation or to calculate the signature twice and compare the results. These countermeasure would catch a single fault but would not protect against attackers that are able to precisely inject faults several times <xref target="RP17"/> <xref target="PSSLR17"/> <xref target="SB18"/>. Adding an additional sign or verification operation would also significantly affect performance, especially verification which is a heavier operation than signing in ECDSA and EdDSA.</t>
      <t><xref target="ABFJLM17"/> suggests using both additional randomness and a counter, which makes the signature generation stateful. While most used signatures have traditionally been stateless, stateful signatures like XMSS <xref target="RFC8391"/> and LMS <xref target="RFC8554"/> have now been standardized and deployed. <xref target="RFC8937"/> specifies a PRNG construction with a random seed, a secret key, a context string, and a nonce, which makes the random number generation stateful. The generation of the per-message secret number in this document is not stateful, but it can be used with a stateful PRNG. The exact construction in <xref target="RFC8937"/> is however not recommended in deployments where side-channel and fault injection attacks are a concern as it relies on deterministic signatures.</t>
      <t>With the construction in this document, the repetition of the same per-message secret number for two different messages is highly unlikely even with an imperfect random number generator, but not impossible. As an extreme countermeasure, previously used secret numbers can be tracked to ensure their uniqueness for a given key, and a different random number can be used if a collision is detected. This document neither mandates nor prohibits implementations from taking such precautions.</t>
      <t>Implementations need to follow best practices on how to protect against all side-channel attacks, not just attacks that exploit determinism, see for example <xref target="BSI"/>.</t>
      <t>The leading 0x00 octet in Hedged EdDSA provides domain separation with RFC 8032 since the first octets of dom2 and dom4 are distinct from 0x00. In the case of Ed25519, for which dom2 is the empty string, note that Ed25519 in RFC 8032 would have to contain the prefix also in PH(M) to collide with any of the inputs to the hash computations in the hedged variants in this document.</t>
    </section>
    <section anchor="test">
      <name>Test Vectors</name>
      <t>TODO</t>
      <section anchor="hedged-ed25519">
        <name>Hedged Ed25519</name>
        <artwork><![CDATA[
    MESSAGE = { }
 SECRET KEY = { }
RANDOM DATA = { }
  SIGNATURE = { }
]]></artwork>
      </section>
      <section anchor="hedged-ecdsa-with-p-256-and-sha-256">
        <name>Hedged ECDSA with P-256 and SHA-256</name>
        <artwork><![CDATA[
    MESSAGE = { }
 SECRET KEY = { }
RANDOM DATA = { }
  SIGNATURE = { }
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8692">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithm Identifiers for RSASSA-PSS and ECDSA Using SHAKEs</title>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="Q. Dang" initials="Q." surname="Dang"/>
            <date month="December" year="2019"/>
            <abstract>
              <t>Digital signatures are used to sign messages, X.509 certificates, and Certificate Revocation Lists (CRLs). This document updates the "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" (RFC 3279) and describes the conventions for using the SHAKE function family in Internet X.509 certificates and revocation lists as one-way hash functions with the RSA Probabilistic signature and Elliptic Curve Digital Signature Algorithm (ECDSA) signature algorithms. The conventions for the associated subject public keys are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8692"/>
          <seriesInfo name="DOI" value="10.17487/RFC8692"/>
        </reference>
        <reference anchor="FIPS-186-5" target="https://doi.org/10.6028/NIST.FIPS.186-5">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author initials="N. S." surname="Department of Commerce">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 186-5" value=""/>
        </reference>
        <reference anchor="SHA3" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">
          <front>
            <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 202" value=""/>
        </reference>
        <reference anchor="KMAC" target="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf">
          <front>
            <title>SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
          <seriesInfo name="NIST SP 800-185" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8937">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author fullname="C. Cremers" initials="C." surname="Cremers"/>
            <author fullname="L. Garratt" initials="L." surname="Garratt"/>
            <author fullname="S. Smyshlyaev" initials="S." surname="Smyshlyaev"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-frost">
          <front>
            <title>Two-Round Threshold Schnorr Signatures with FROST</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Zcash Foundation</organization>
            </author>
            <author fullname="Chelsea Komlo" initials="C." surname="Komlo">
              <organization>University of Waterloo, Zcash Foundation</organization>
            </author>
            <author fullname="Ian Goldberg" initials="I." surname="Goldberg">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="18" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Flexible Round-Optimized Schnorr
   Threshold (FROST) signing protocol.  FROST signatures can be issued
   after a threshold number of entities cooperate to compute a
   signature, allowing for improved distribution of trust and redundancy
   with respect to a secret key.  FROST depends only on a prime-order
   group and cryptographic hash function.  This document specifies a
   number of ciphersuites to instantiate FROST using different prime-
   order groups and hash functions.  One such ciphersuite can be used to
   produce signatures that can be verified with an Edwards-Curve Digital
   Signature Algorithm (EdDSA, as defined in RFC8032) compliant
   verifier.  However, unlike EdDSA, the signatures produced by FROST
   are not deterministic.  This document is a product of the Crypto
   Forum Research Group (CFRG) in the IRTF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-frost-15"/>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf?__blob=publicationFile">
          <front>
            <title>Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="Minerva19" target="https://minerva.crocs.fi.muni.cz/">
          <front>
            <title>Minerva</title>
            <author initials="" surname="Centre for Research on Cryptography and Security (CRoCS)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RowHammer14" target="https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf">
          <front>
            <title>Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors</title>
            <author initials="Y." surname="Kim">
              <organization/>
            </author>
            <author initials="R." surname="Daly">
              <organization/>
            </author>
            <author initials="J." surname="Kim">
              <organization/>
            </author>
            <author initials="C." surname="Fallin">
              <organization/>
            </author>
            <author initials="J." surname="Lee">
              <organization/>
            </author>
            <author initials="D." surname="Lee">
              <organization/>
            </author>
            <author initials="C." surname="Wilkerson">
              <organization/>
            </author>
            <author initials="K." surname="Mutlu">
              <organization/>
            </author>
            <date year="2014" month="June"/>
          </front>
        </reference>
        <reference anchor="Plundervolt19" target="https://plundervolt.com/">
          <front>
            <title>How a little bit of undervolting can cause a lot of problems</title>
            <author initials="K." surname="Murdock">
              <organization/>
            </author>
            <author initials="D." surname="Oswald">
              <organization/>
            </author>
            <author initials="F." surname="Garcia">
              <organization/>
            </author>
            <author initials="J." surname="Van Bulck">
              <organization/>
            </author>
            <author initials="D." surname="Gruss">
              <organization/>
            </author>
            <author initials="F." surname="Piessens">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="TPM-Fail19" target="https://tpm.fail/">
          <front>
            <title>TPM-FAIL: TPM meets Timing and Lattice Attacks</title>
            <author initials="D." surname="Moghimi">
              <organization/>
            </author>
            <author initials="B." surname="Sunar">
              <organization/>
            </author>
            <author initials="T." surname="Eisenbarth">
              <organization/>
            </author>
            <author initials="N." surname="Heninge">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="XEdDSA" target="https://signal.org/docs/specifications/xeddsa/">
          <front>
            <title>The XEdDSA and VXEdDSA Signature Schemes</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="October"/>
          </front>
        </reference>
        <reference anchor="libHydrogen" target="https://github.com/jedisct1/libhydrogen">
          <front>
            <title>The Hydrogen library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="libSodium" target="https://github.com/jedisct1/libsodium">
          <front>
            <title>The Sodium library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Notice-186-5" target="https://www.federalregister.gov/documents/2019/10/31/2019-23742/request-for-comments-on-fips-186-5-and-sp-800-186">
          <front>
            <title>Request for Comments on FIPS 186-5 and SP 800-186</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="Draft-204" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>FIPS PUB 204 (Draft)</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
        </reference>
        <reference anchor="SideChannel" target="https://arxiv.org/pdf/1611.03748.pdf">
          <front>
            <title>Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices</title>
            <author initials="R." surname="Spreitzer">
              <organization/>
            </author>
            <author initials="V." surname="Moonsamy">
              <organization/>
            </author>
            <author initials="T." surname="Korak">
              <organization/>
            </author>
            <author initials="S." surname="Mangard">
              <organization/>
            </author>
            <date year="2017" month="December"/>
          </front>
        </reference>
        <reference anchor="BCPST14" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.854.7836&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Online Template Attacks</title>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="L." surname="Chmielewski">
              <organization/>
            </author>
            <author initials="L." surname="Papachristodoulou">
              <organization/>
            </author>
            <author initials="P." surname="Schwabe">
              <organization/>
            </author>
            <author initials="M." surname="Tunstall">
              <organization/>
            </author>
            <date year="2014" month="December"/>
          </front>
        </reference>
        <reference anchor="SH16" target="http://www.cs2.deib.polimi.it/slides_16/01_Seuschek_Deterministic_Signatures.pdf">
          <front>
            <title>A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes</title>
            <author initials="H." surname="Seuschek">
              <organization/>
            </author>
            <author initials="J." surname="Heyszl">
              <organization/>
            </author>
            <author initials="F." surname="De Santis">
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="BP16" target="https://link.springer.com/chapter/10.1007/978-3-319-44524-3_11">
          <front>
            <title>A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)</title>
            <author initials="A." surname="Barenghi">
              <organization/>
            </author>
            <author initials="G." surname="Pelosi">
              <organization/>
            </author>
            <date year="2016" month="September"/>
          </front>
        </reference>
        <reference anchor="RP17" target="https://romailler.ch/ddl/10.1109_FDTC.2017.12_eddsa.pdf">
          <front>
            <title>Practical fault attack against the Ed25519 and EdDSA signature schemes</title>
            <author initials="Y." surname="Romailler">
              <organization/>
            </author>
            <author initials="S." surname="Pelissier">
              <organization/>
            </author>
            <date year="2017" month="September"/>
          </front>
        </reference>
        <reference anchor="ABFJLM17" target="https://eprint.iacr.org/2017/975">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose">
              <organization/>
            </author>
            <author initials="J." surname="Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SBBDS17" target="https://eprint.iacr.org/2017/985.pdf">
          <front>
            <title>Breaking Ed25519 in WolfSSL</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="G." surname="Bertoni">
              <organization/>
            </author>
            <author initials="J." surname="Daemen">
              <organization/>
            </author>
            <author initials="R." surname="Susella">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="PSSLR17" target="https://eprint.iacr.org/2017/1014">
          <front>
            <title>Attacking Deterministic Signature Schemes using Fault Attacks</title>
            <author initials="D." surname="Poddebniak">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="P." surname="Rösler">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SB18" target="https://nielssamwel.nl/papers/africacrypt2018_fault.pdf">
          <front>
            <title>Practical Fault Injection on Deterministic Signatures: The Case of EdDSA</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="WPB19" target="https://eprint.iacr.org/2019/358.pdf">
          <front>
            <title>One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA</title>
            <author initials="L." surname="Weissbart">
              <organization/>
            </author>
            <author initials="S." surname="Picek">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2019" month="July"/>
          </front>
        </reference>
        <reference anchor="AOTZ19" target="https://eprint.iacr.org/2019/956">
          <front>
            <title>Security of Hedged Fiat-Shamir Signatures under Fault Attacks</title>
            <author initials="D." surname="Aranha">
              <organization/>
            </author>
            <author initials="C." surname="Orlandi">
              <organization/>
            </author>
            <author initials="A." surname="Takahashi">
              <organization/>
            </author>
            <author initials="G." surname="Zaverucha">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FG19" target="https://eprint.iacr.org/2019/1053">
          <front>
            <title>Modeling Memory Faults in Signature and Encryption Schemes</title>
            <author initials="M." surname="Fischlin">
              <organization/>
            </author>
            <author initials="F." surname="Günther">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="Kampanakis16" target="https://blogs.cisco.com/security/fips-and-deterministic-ecdsa-achieving-robust-security-and-conformance">
          <front>
            <title>FIPS and Deterministic ECDSA: Achieving robust security and conformance</title>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
        </reference>
        <reference anchor="Langley13" target="https://www.imperialviolet.org/2013/06/15/suddendeathentropy.html">
          <front>
            <title>Sudden Death Entropy Failures</title>
            <author initials="A." surname="Langley">
              <organization/>
            </author>
            <date year="2013" month="June"/>
          </front>
        </reference>
        <reference anchor="OpenSSL13a" target="https://github.com/openssl/openssl/commit/8a99cb29d1f0013243a532bccc1dc70ed678eebe">
          <front>
            <title>Add secure DSA nonce flag</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenSSL13b" target="https://github.com/openssl/openssl/commit/190c615d4398cc6c8b61eb7881d7409314529a75">
          <front>
            <title>Make `safe' (EC)DSA nonces the default</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Comments-186-5" target="https://csrc.nist.gov/CSRC/media/Publications/fips/186/5/draft/documents/fips-186-5-draft-comments-received.pdf">
          <front>
            <title>Public Comments Received on Draft FIPS 186-5: Digital Signature Standards (DSS)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
        <reference anchor="Bernstein19" target="https://blog.cr.yp.to/20191024-eddsa.html">
          <front>
            <title>Why EdDSA held up better than ECDSA against Minerva</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="Bernstein14" target="https://blog.cr.yp.to/20140323-ecdsa.html">
          <front>
            <title>How to design an elliptic-curve signature system</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2014" month="March"/>
          </front>
        </reference>
        <reference anchor="Cao20" target="https://eprint.iacr.org/2020/803">
          <front>
            <title>Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA</title>
            <author initials="" surname="Weiqiong Cao">
              <organization/>
            </author>
            <author initials="" surname="Hongsong Shi">
              <organization/>
            </author>
            <author initials="" surname="Hua Chen">
              <organization/>
            </author>
            <author initials="" surname="Jiazhe Chen">
              <organization/>
            </author>
            <author initials="" surname="Limin Fan">
              <organization/>
            </author>
            <author initials="" surname="Wenling Wu">
              <organization/>
            </author>
            <date year="2020" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC8080">
          <front>
            <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
            <author fullname="O. Sury" initials="O." surname="Sury"/>
            <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8080"/>
          <seriesInfo name="DOI" value="10.17487/RFC8080"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="RFC8387">
          <front>
            <title>Practical Considerations and Implementation Experiences in Securing Smart Object Networks</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="H. Back" initials="H." surname="Back"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This memo describes challenges associated with securing resource- constrained smart object devices. The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices. Lastly, the memo discusses trade-offs involving different types of security approaches.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8387"/>
          <seriesInfo name="DOI" value="10.17487/RFC8387"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC8419">
          <front>
            <title>Use of Edwards-Curve Digital Signature Algorithm (EdDSA) Signatures in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies the conventions for using the Edwards-curve Digital Signature Algorithm (EdDSA) for curve25519 and curve448 in the Cryptographic Message Syntax (CMS). For each curve, EdDSA defines the PureEdDSA and HashEdDSA modes. However, the HashEdDSA mode is not used with the CMS. In addition, no context string is used with the CMS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8419"/>
          <seriesInfo name="DOI" value="10.17487/RFC8419"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8463">
          <front>
            <title>A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document adds a new signing algorithm, Ed25519-SHA256, to "DomainKeys Identified Mail (DKIM) Signatures" (RFC 6376). DKIM verifiers are required to implement this algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8463"/>
          <seriesInfo name="DOI" value="10.17487/RFC8463"/>
        </reference>
        <reference anchor="RFC8550">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Certificate Handling</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document specifies conventions for X.509 certificate usage by Secure/Multipurpose Internet Mail Extensions (S/MIME) v4.0 agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 5280 ("Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"). S/MIME agents must meet the certificate-processing requirements in this document as well as those in RFC 5280. This document obsoletes RFC 5750.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8550"/>
          <seriesInfo name="DOI" value="10.17487/RFC8550"/>
        </reference>
        <reference anchor="RFC8591">
          <front>
            <title>SIP-Based Messaging with S/MIME</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>Mobile messaging applications used with the Session Initiation Protocol (SIP) commonly use some combination of the SIP MESSAGE method and the Message Session Relay Protocol (MSRP). While these provide mechanisms for hop-by-hop security, neither natively provides end-to-end protection. This document offers guidance on how to provide end-to-end authentication, integrity protection, and confidentiality using the Secure/Multipurpose Internet Mail Extensions (S/MIME). It updates and provides clarifications for RFCs 3261, 3428, and 4975.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8591"/>
          <seriesInfo name="DOI" value="10.17487/RFC8591"/>
        </reference>
        <reference anchor="RFC8608">
          <front>
            <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="O. Borchert" initials="O." surname="Borchert"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure") and obsoletes RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Documentation and Experimentation Algorithm IDs, correcting the range of unassigned algorithms IDs to fill the complete range, and restructuring the document for better reading.</t>
              <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8608"/>
          <seriesInfo name="DOI" value="10.17487/RFC8608"/>
        </reference>
        <reference anchor="RFC8624">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="O. Sury" initials="O." surname="Sury"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document defines the current algorithm implementation requirements and usage guidance for DNSSEC. This document obsoletes RFC 6944.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8624"/>
          <seriesInfo name="DOI" value="10.17487/RFC8624"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
      </references>
    </references>
    <?line 562?>

<section removeInRFC="true" numbered="false" anchor="change-log">
      <name>Change log</name>
      <t>Changes from -02 to -03:</t>
      <ul spacing="normal">
        <li>
          <t>Same randomness Z in step d and f to align with HMAC_DRBG.</t>
        </li>
        <li>
          <t>Changed Hedged EdDSA order to 0x00 || Z || dom2(F, C) instead of dom2(F, C) || Z. This avoids collisions with RFC 8032 and aligns with Bernstein's recommendation to put Z before the context.</t>
        </li>
        <li>
          <t>Changed KMAC output length recommendations to avoid multiple invocations.</t>
        </li>
        <li>
          <t>Updates some text to align with the hedged signatures/signing terminology.</t>
        </li>
        <li>
          <t>Added more description about the construction.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -01 to -02:</t>
      <ul spacing="normal">
        <li>
          <t>Different names Zd and Zf for the randomness in ECDSA.</t>
        </li>
        <li>
          <t>Added empty test vector section as TODO.</t>
        </li>
      </ul>
      <t>Changes from -00 to -01:</t>
      <ul spacing="normal">
        <li>
          <t>Changed terminology to hedged signatures/signing.</t>
        </li>
        <li>
          <t>Added reference to the FIPS 204 (ML-DSA) where hedged signatures are the default.</t>
        </li>
        <li>
          <t>Added a second 000... padding that separates the context from the prefix, aligning with BSI recommendations.</t>
        </li>
        <li>
          <t>Added note that Z in step f is not reused from step d.</t>
        </li>
        <li>
          <t>Added note on "internal octet" is 0x01 from RFC 6979.</t>
        </li>
        <li>
          <t>Removed incorrect statement that context fit in first block.</t>
        </li>
        <li>
          <t>Added more description about the construction.</t>
        </li>
        <li>
          <t>Moved "For discussion" section to GitHub issue.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
<contact fullname="Tony Arcieri"/>,
<contact fullname="Uri Blumenthal"/>,
<contact fullname="Carsten Bormann"/>,
<contact fullname="Taylor R Campbell"/>,
<contact fullname="Quynh Dang"/>,
<contact fullname="Håkan Englund"/>,
<contact fullname="Janos Follath"/>,
<contact fullname="Phillip Hallam-Baker"/>,
<contact fullname="Chelsea Komlo"/>,
<contact fullname="Niklas Lindskog"/>,
<contact fullname="Ilari Liusvaara"/>,
<contact fullname="Danny Niu"/>,
<contact fullname="Jim Schaad"/>,
and
<contact fullname="Ruggero Susella"/>
for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
