<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-cfrg-det-sigs-with-noise-05" category="info" consensus="true" submissionType="IRTF" updates="6979, 8032" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title>Hedged ECDSA and EdDSA Signatures</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-det-sigs-with-noise-05"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="E." surname="Thormarker" fullname="Erik Thormarker">
      <organization>Ericsson</organization>
      <address>
        <email>erik.thormarker@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Ruohomaa" fullname="Sini Ruohomaa">
      <organization>Ericsson</organization>
      <address>
        <email>sini.ruohomaa@ericsson.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>IRTF</area>
    <workgroup>Crypto Forum</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 432?>

<t>Deterministic elliptic-curve signatures such as deterministic ECDSA and EdDSA have gained popularity over randomized ECDSA as their security does not depend on a source of high-quality randomness. Recent research, however, has found that implementations of these signature algorithms may be vulnerable to certain side-channel and fault injection attacks due to their deterministic nature. One countermeasure to such attacks is hedged signatures where the calculation of the per-message secret number includes both fresh randomness and the message. This document updates RFC 6979 and RFC 8032 to recommend hedged constructions in deployments where side-channel attacks and fault injection attacks are a concern. The updates are invisible to the validator of the signature and compatible with existing ECDSA and EdDSA validators.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cfrg.github.io/draft-irtf-cfrg-det-sigs-with-noise/draft-irtf-cfrg-det-sigs-with-noise.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-irtf-cfrg-det-sigs-with-noise/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/search/?email_list=cfrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cfrg/draft-irtf-cfrg-det-sigs-with-noise"/>.</t>
    </note>
  </front>
  <middle>
    <?line 436?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In Elliptic-Curve Cryptography (ECC) signature algorithms, the per-message secret number has traditionally been generated from a random number generator (RNG). The security of such algorithms depends on the cryptographic quality of the random number generation and biases in the randomness may have catastrophic effects such as compromising private keys (see e.g., <xref target="Bernstein19"/>). Repeated per-message secret numbers have caused several severe security accidents in practice. As stated in <xref target="RFC6979"/>, the need for a cryptographically secure source of randomness is also a hindrance to deployment of randomized ECDSA <xref target="FIPS-186-5"/> in architectures where secure random number generation is challenging, in particular, embedded IoT systems and smartcards. <xref target="ABFJLM17"/> does however state that smartcards typically have a high-quality RNG on board, which makes it significantly easier and faster to use the RNG instead of doing a hash computation.</t>
      <t>In deterministic ECC signatures schemes such as Deterministic Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6979"/><xref target="FIPS-186-5"/> and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8032"/>, the per-message secret number is instead generated in a fully deterministic way as a function of the message and the private key. Except for key generation, the security of such deterministic signatures does not rely on a source of high-quality randomness. This makes verification of implementations easier. As they are presumed to be safer, deterministic signatures have gained popularity and are referenced and recommended by a large number of recent RFCs <xref target="RFC8037"/> <xref target="RFC8080"/> <xref target="RFC8225"/> <xref target="RFC8387"/> <xref target="RFC8410"/> <xref target="RFC8411"/> <xref target="RFC8419"/> <xref target="RFC8420"/> <xref target="RFC8422"/> <xref target="RFC8446"/> <xref target="RFC8463"/> <xref target="RFC8550"/> <xref target="RFC8591"/> <xref target="RFC8608"/> <xref target="RFC8624"/> <xref target="RFC9053"/>.</t>
      <t>Side-channel attacks are potential attack vectors for implementations of cryptographic algorithms. Side-Channel attacks can in general be classified along three orthogonal axes: passive vs. active, physical vs. logical, and local vs. remote <xref target="SideChannel"/>. It has been demonstrated how side-channel attacks such as power analysis <xref target="BCPST14"/> and timing attacks <xref target="Minerva19"/> <xref target="TPM-Fail19"/> allow for practical recovery of the private key in some existing implementations of randomized ECDSA. <xref target="BSI"/> summarizes minimum requirements for evaluating side-channel attacks of elliptic curve implementations and writes that deterministic ECDSA and EdDSA requires extra care. The deterministic ECDSA specification <xref target="RFC6979"/> notes that the deterministic generation of per-message secret numbers may be useful to an attacker in some forms of side-channel attacks and as stated in <xref target="Minerva19"/>, deterministic signatures like <xref target="RFC6979"/> and <xref target="RFC8032"/> might help an attacker to reduce the noise in the side-channel when the same message it signed multiple times. Recent research <xref target="SH16"/> <xref target="BP16"/> <xref target="RP17"/> <xref target="ABFJLM17"/> <xref target="SBBDS17"/> <xref target="PSSLR17"/> <xref target="SB18"/> <xref target="WPB19"/> <xref target="AOTZ19"/> <xref target="FG19"/> have theoretically and experimentally analyzed the resistance of deterministic ECC signature algorithms against side-channel and fault injection attacks. The conclusions are that deterministic signature algorithms have theoretical weaknesses against certain instances of these types of attacks and that the attacks are practically feasibly in some environments. These types of attacks may be of particular concern for hardware implementations such as embedded IoT devices and smartcards where the adversary can be assumed to have access to the device to induce faults and measure its side-channels such as timing information, power consumption, electromagnetic leaks, or sound with low signal-to-noise ratio. A good summary of fault attacks in given by <xref target="Cao20"/>. See also the discussions and references in <xref target="Comments-186-5"/>.</t>
      <t>Fault attacks may also be possible without physical access to the device. RowHammer <xref target="RowHammer14"/> showed how an attacker to induce DRAM bit-flips in memory areas the attacker should not have access to. Plundervolt <xref target="Plundervolt19"/> showed how an attacker with root access can use frequency and voltage scaling interfaces to induce faults that bypass even secure execution technologies. RowHammer can e.g., be used in operating systems with several processes or cloud scenarios with virtualized servers. Protocols like TLS, SSH, and IKEv2 that add a random number to the message to be signed mitigate some types of attacks <xref target="PSSLR17"/>.</t>
      <t>Government agencies are clearly concerned about these attacks. In <xref target="Notice-186-5"/> and <xref target="FIPS-186-5"/>, NIST warns about side-channel and fault injection attacks, but states that deterministic ECDSA may be desirable for devices that lack good randomness. The quantum-resistant ML-DSA <xref target="FIPS-204"/> standardized by NIST uses hedged signing by default. BSI has published <xref target="BSI"/> and researchers from BSI have co-authored two research papers <xref target="ABFJLM17"/> <xref target="PSSLR17"/> on attacks on deterministic signatures. For many industries it is important to be compliant with both RFCs and government publications, alignment between IETF, NIST, and BSI recommendations would be preferable.</t>
      <t>Note that deriving per-message secret number deterministically, is also insecure in a multi-party signature setting <xref target="RFC9591"/>.</t>
      <t>One countermeasure to entropy failures, side-channel attacks, and fault injection attacks recommended by <xref target="Langley13"/> <xref target="RP17"/> <xref target="ABFJLM17"/> <xref target="SBBDS17"/> <xref target="PSSLR17"/> <xref target="SB18"/> <xref target="AOTZ19"/> <xref target="FG19"/> and implemented in <xref target="OpenSSL13a"/> <xref target="OpenSSL13b"/> <xref target="XEdDSA"/> <xref target="libSodium"/> <xref target="libHydrogen"/> is to generate the per-message secret number from a random string, a secret key, and the message. This combines the security benefits of fully randomized per-message secret numbers with the security benefits of fully deterministic secret numbers. Such a hedged construction protects against key compromise due to weak random number generation, but still effectively prevents many side-channel and fault injection attacks that exploit determinism. Hedged constructions require minor changes to the implementation and does not increase the number of elliptic curve point multiplications and is therefore suitable for constrained IoT. Section 3.6 of <xref target="RFC6979"/> describes a variant of deterministic ECDSA that adds non-repeating additional data k' to the per-message secret number generation. Adding randomness to EdDSA is not compliant with <xref target="RFC8032"/>. <xref target="Kampanakis16"/> describes an alternative <xref target="FIPS-186-5"/> compliant approach where message specific pseudo-random information is used as an additional input to the random number generation to create per-message secret number. <xref target="Bernstein14"/> states that generation of the per-message secret number from a subset of a random string, a secret key, the message, and a message counter is common in DSA/ECDSA implementations.</t>
      <t>This document updates <xref target="RFC6979"/> and <xref target="RFC8032"/> to recommend hedged constructions in deployments where side-channel and fault injection attacks are a concern. The updates are invisible to the validator of the signature. Produced signatures remain fully compatible with unmodified ECDSA and EdDSA verifiers and existing key pairs can continue to be used. As the precise use of random bytes is specified, test vectors can still be produced, see <xref target="test"/>, and implementations can be tested against them.</t>
    </section>
    <section anchor="conventions-used-in-this-document">
      <name>Conventions Used in This Document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="HedgedEdDSA">
      <name>Hedged EdDSA</name>
      <t>This document updates RFC 8032 (EdDSA) to recommend hedged variants of EdDSA for deployments where side-channel attacks and fault injection attacks are a concern, the variants are called hedged EdDSA. The updates are invisible to the validator of the signature and compatible with existing EdDSA validators.</t>
      <t>Update to RFC 8032:</t>
      <t>For Ed25519ph, Ed25519ctx, and Ed25519: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.1.6 of <xref target="RFC8032"/>:</t>
      <artwork><![CDATA[
2.  Compute the digest SHA-512(prefix || Z), where Z is 32 octets of
    random data. Let prefix’ denote the leftmost half of the digest.
    Compute SHA-512(dom2(F, C) || prefix’ || PH(M)), where M is the
    message to be signed.  Interpret the 64-octet digest as a
    little-endian integer r.
]]></artwork>
      <t>For Ed448ph and Ed448: In deployments where side-channel and fault injection attacks are a concern, the following step is RECOMMENDED instead of step (2) in Section 5.2.6 of <xref target="RFC8032"/>:</t>
      <artwork><![CDATA[
2.  Compute the digest SHAKE256(prefix || Z, 114), where Z is 57
    octets of random data. Let prefix’ denote the leftmost half of
    the digest. Compute SHAKE256(dom4(F, C) || prefix’ || PH(M), 114),
    where M is the message to be signed,  F is 1 for Ed448ph, 0 for
    Ed448, and C is the context to use. Interpret the 114-octet digest
    as a little-endian integer r.
]]></artwork>
    </section>
    <section anchor="HedgedECDSA">
      <name>Hedged ECDSA</name>
      <t>This document updates RFC 6979 (deterministic ECDSA) to recommend a hedged variant of ECDSA for deployments where side-channel attacks and fault injection attacks are a concern, the variant is called hedged ECDSA. The updates are invisible to the validator of the signature and compatible with existing ECDSA validators.</t>
      <t>Update to RFC 6979: In ECDSA deployments where side-channel and fault injection attacks are a concern, the following steps are RECOMMENDED instead of steps (d) and (f) in Section 3.2 of <xref target="RFC6979"/>:</t>
      <artwork><![CDATA[
d.  Set:

       K = HMAC_K(V || 0x00 || Z || 000... || int2octets(x) || 000...
       || bits2octets(h1))

    where '||' denotes concatenation.  In other words, we compute
    HMAC with key K, over the concatenation of the following, in
    order: the current value of V, a sequence of eight bits of value
    0, random data Z (of the same length as int2octets(x)), a
    sequence of zero bits 000..., the encoding of the (EC)DSA private
    key x, a sequence of zero bits 000..., and the hashed message
    (possibly truncated and extended as specified by the bits2octets
    transform).  The non-negative number of zeroes 000... is chosen
    so that the length of (V || 0x00 || Z || 000...) and
    (int2octets(x) || 000...) are the smallest possible multiples
    of the block size of the hash function. The HMAC result is the
    new value of K.  Note that the private key x is in the [1, q-1]
    range, hence a proper input for int2octets, yielding rlen bits of
    output, i.e., an integral number of octets (rlen is a multiple of 8).
]]></artwork>
      <artwork><![CDATA[
f.  Set:

       K = HMAC_K(V || 0x01 || Z || 000... || int2octets(x) || 000...
       || bits2octets(h1))

    Note that the "internal octet" is 0x01 this time. The string
    (Z || 000... || int2octets(x) || 000.. || bits2octets(h1)),
    called provided_data in HMAC_DRBG, is the same as in step (d).
]]></artwork>
      <t>The construction in <xref target="RFC6979"/> can be seen as using HMAC_DRBG <xref target="SP800-90Ar1"/> with rejection sampling to generate the ECDSA per-message secret number (see Section 3.3 of <xref target="RFC6979"/>). With the updates in this document, Z can be seen as the combination of entropy_input and nonce (see the text on "extra strong" entropy input in Section 8.6.7 of <xref target="SP800-90Ar1"/>). The concatenation  000... || int2octets(x) || 000... || bits2octets(h1) can be seen as the personalization_string. See Section 3.3 of <xref target="RFC6979"/> for the other parameters.</t>
      <t>When ECDSA is used with SHAKE <xref target="SHA3"/> the HMAC construction in Section 3.2 of <xref target="RFC6979"/> MAY be used but it is RECOMMENDED to use the more efficient KMAC construction <xref target="KMAC"/> with output length hlen = 8 · ceil(qlen / 8), where qlen is the binary length of the order of the base point of the elliptic curve <xref target="RFC6979"/> and ceil(x) is the ceiling function mapping x to the least integer greater than or equal to x. When ECDSA is used with SHAKE128, it is RECOMMENDED to replace HMAC(K, M) in Section 3.2 of <xref target="RFC6979"/> with KMAC128(K, M, hlen, ""). When ECDSA is used with SHAKE256, it is RECOMMENDED to replace HMAC(K, M) in Section 3.2 of <xref target="RFC6979"/> with KMAC256(K, M, hlen, ""). <xref target="RFC8692"/> and <xref target="FIPS-186-5"/> define the use of SHAKE128 with an output length of 256 bits and SHAKE256 with an output length or 512 bits.</t>
      <t>In new deployments, where side-channel and fault injection attacks are a concern, Hedged EdDSA as specified in <xref target="HedgedEdDSA"/> is RECOMMENDED.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The constructions in this document follow the high-level approach in <xref target="XEdDSA"/> to calculate the per-message secret number from the hash of the private key and the message, but add additional randomness into the calculation for greater resilience. This does not re-introduce the strong security requirement of randomness needed by randomized ECDSA <xref target="FIPS-186-5"/>. The randomness of Z need not be perfect but SHALL be generated by a cryptographically secure method and SHALL be secret. Even if the same random number Z is used to sign two different messages, the security will be the same as deterministic ECDSA and EdDSA and an attacker will not be able to compromise the private key with algebraic means as in fully randomized ECDSA <xref target="FIPS-186-5"/>. With the construction specified in this document, two signatures over two equal messages are different which prevents information leakage in use cases where signatures but not messages are public.</t>
      <t>The construction in this document aims to mitigate fault injection attacks that leverage determinism in deterministic ECDSA and EdDSA signatures (see e.g., <xref target="ABFJLM17"/>), by randomizing nonce generation. Fault injection attacks that achieve instruction skipping as in e.g., Section 3.4 of <xref target="ABFJLM17"/> are not necessarily stopped. It seems to be possible to, at the same time, also mitigate attacks that use first order differential power analysis (DPA) against the hash computation of deterministic nonces in EdDSA and ECDSA (see e.g., <xref target="ABFJLM17"/><xref target="SBBDS17"/>). The Hedged EdDSA construction mitigates the referenced first order DPA attacks by mixing prefix with Z before mixing it with any public variable data (message or context). Similarly, the Hedged ECDSA construction mixes x with a state randomized by Z before mixing it with public variable data (h1). The random bytes Z are re-used in step (d) and (f) of Hedged ECDSA to align with HMAC_DRBG. This may make certain DPA attacks easier than if randomness had been sampled fresh for each respective step. Note however that V is updated between the steps and that the secret key x is processed in a new input block of the hash function after processing V and Z in each respective step.</t>
      <t>A key pair MAY be reused between implementations of the hedged constructions in this document and the non-hedged original constructions in <xref target="RFC8032"/> and Section 3.2 of <xref target="RFC6979"/>. The Hedged EdDSA construction in this document randomizes prefix in an intermediate step and preserves the domain separation between the different variants of EdDSA (see Section 8.6 of <xref target="RFC8032"/>). The Hedged ECDSA construction has a different HMAC input length in step (d) (and (f)) of Section 4 than the original construction in Section 3.2 of <xref target="RFC6979"/>. It is therefore impossible for an attacker to manipulate the parameters to the nonce generation process (between the different constructions) such that the HMAC input in step (d) and (f) becomes identical for two distinct messages.</t>
      <t>Implementations need to follow best practices on how to protect against all side-channel attacks, not just attacks that exploit determinism, see for example <xref target="BSI"/>.</t>
    </section>
    <section anchor="test">
      <name>Test Vectors</name>
      <t>TODO</t>
      <section anchor="hedged-ed25519">
        <name>Hedged Ed25519</name>
        <artwork><![CDATA[
    MESSAGE = { }
 SECRET KEY = { }
RANDOM DATA = { }
  SIGNATURE = { }
]]></artwork>
      </section>
      <section anchor="hedged-ecdsa-with-p-256-and-sha-256">
        <name>Hedged ECDSA with P-256 and SHA-256</name>
        <artwork><![CDATA[
    MESSAGE = { }
 SECRET KEY = { }
RANDOM DATA = { }
  SIGNATURE = { }
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8692">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithm Identifiers for RSASSA-PSS and ECDSA Using SHAKEs</title>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="Q. Dang" initials="Q." surname="Dang"/>
            <date month="December" year="2019"/>
            <abstract>
              <t>Digital signatures are used to sign messages, X.509 certificates, and Certificate Revocation Lists (CRLs). This document updates the "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" (RFC 3279) and describes the conventions for using the SHAKE function family in Internet X.509 certificates and revocation lists as one-way hash functions with the RSA Probabilistic signature and Elliptic Curve Digital Signature Algorithm (ECDSA) signature algorithms. The conventions for the associated subject public keys are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8692"/>
          <seriesInfo name="DOI" value="10.17487/RFC8692"/>
        </reference>
        <reference anchor="FIPS-186-5" target="https://doi.org/10.6028/NIST.FIPS.186-5">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 186-5" value=""/>
        </reference>
        <reference anchor="SP800-90Ar1" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf">
          <front>
            <title>Recommendation for Random Number Generation Using Deterministic Random Bit Generators</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2015" month="June"/>
          </front>
          <seriesInfo name="NIST SP 800-90A Revision 1" value=""/>
        </reference>
        <reference anchor="SHA3" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">
          <front>
            <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="NIST FIPS PUB 202" value=""/>
        </reference>
        <reference anchor="KMAC" target="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf">
          <front>
            <title>SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
          <seriesInfo name="NIST SP 800-185" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8937">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author fullname="C. Cremers" initials="C." surname="Cremers"/>
            <author fullname="L. Garratt" initials="L." surname="Garratt"/>
            <author fullname="S. Smyshlyaev" initials="S." surname="Smyshlyaev"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="RFC9591">
          <front>
            <title>The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two-Round Schnorr Signatures</title>
            <author fullname="D. Connolly" initials="D." surname="Connolly"/>
            <author fullname="C. Komlo" initials="C." surname="Komlo"/>
            <author fullname="I. Goldberg" initials="I." surname="Goldberg"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies the Flexible Round-Optimized Schnorr Threshold (FROST) signing protocol. FROST signatures can be issued after a threshold number of entities cooperate to compute a signature, allowing for improved distribution of trust and redundancy with respect to a secret key. FROST depends only on a prime-order group and cryptographic hash function. This document specifies a number of ciphersuites to instantiate FROST using different prime-order groups and hash functions. This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9591"/>
          <seriesInfo name="DOI" value="10.17487/RFC9591"/>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf?__blob=publicationFile">
          <front>
            <title>Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations</title>
            <author initials="" surname="Bundesamt für Sicherheit in der Informationstechnik">
              <organization/>
            </author>
            <date year="2016" month="November"/>
          </front>
        </reference>
        <reference anchor="Minerva19" target="https://minerva.crocs.fi.muni.cz/">
          <front>
            <title>Minerva</title>
            <author initials="" surname="Centre for Research on Cryptography and Security (CRoCS)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="RowHammer14" target="https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf">
          <front>
            <title>Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors</title>
            <author initials="Y." surname="Kim">
              <organization/>
            </author>
            <author initials="R." surname="Daly">
              <organization/>
            </author>
            <author initials="J." surname="Kim">
              <organization/>
            </author>
            <author initials="C." surname="Fallin">
              <organization/>
            </author>
            <author initials="J." surname="Lee">
              <organization/>
            </author>
            <author initials="D." surname="Lee">
              <organization/>
            </author>
            <author initials="C." surname="Wilkerson">
              <organization/>
            </author>
            <author initials="K." surname="Mutlu">
              <organization/>
            </author>
            <date year="2014" month="June"/>
          </front>
        </reference>
        <reference anchor="Plundervolt19" target="https://plundervolt.com/">
          <front>
            <title>How a little bit of undervolting can cause a lot of problems</title>
            <author initials="K." surname="Murdock">
              <organization/>
            </author>
            <author initials="D." surname="Oswald">
              <organization/>
            </author>
            <author initials="F." surname="Garcia">
              <organization/>
            </author>
            <author initials="J." surname="Van Bulck">
              <organization/>
            </author>
            <author initials="D." surname="Gruss">
              <organization/>
            </author>
            <author initials="F." surname="Piessens">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="TPM-Fail19" target="https://tpm.fail/">
          <front>
            <title>TPM-FAIL: TPM meets Timing and Lattice Attacks</title>
            <author initials="D." surname="Moghimi">
              <organization/>
            </author>
            <author initials="B." surname="Sunar">
              <organization/>
            </author>
            <author initials="T." surname="Eisenbarth">
              <organization/>
            </author>
            <author initials="N." surname="Heninge">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="XEdDSA" target="https://signal.org/docs/specifications/xeddsa/">
          <front>
            <title>The XEdDSA and VXEdDSA Signature Schemes</title>
            <author initials="" surname="Signal">
              <organization/>
            </author>
            <date year="2016" month="October"/>
          </front>
        </reference>
        <reference anchor="libHydrogen" target="https://github.com/jedisct1/libhydrogen">
          <front>
            <title>The Hydrogen library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="libSodium" target="https://github.com/jedisct1/libsodium">
          <front>
            <title>The Sodium library</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Notice-186-5" target="https://www.federalregister.gov/documents/2019/10/31/2019-23742/request-for-comments-on-fips-186-5-and-sp-800-186">
          <front>
            <title>Request for Comments on FIPS 186-5 and SP 800-186</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="FIPS-204" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author initials="" surname="National Institute of Standards and Technology (NIST)">
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="FIPS 204" value=""/>
        </reference>
        <reference anchor="SideChannel" target="https://arxiv.org/pdf/1611.03748.pdf">
          <front>
            <title>Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices</title>
            <author initials="R." surname="Spreitzer">
              <organization/>
            </author>
            <author initials="V." surname="Moonsamy">
              <organization/>
            </author>
            <author initials="T." surname="Korak">
              <organization/>
            </author>
            <author initials="S." surname="Mangard">
              <organization/>
            </author>
            <date year="2017" month="December"/>
          </front>
        </reference>
        <reference anchor="BCPST14" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.854.7836&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Online Template Attacks</title>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="L." surname="Chmielewski">
              <organization/>
            </author>
            <author initials="L." surname="Papachristodoulou">
              <organization/>
            </author>
            <author initials="P." surname="Schwabe">
              <organization/>
            </author>
            <author initials="M." surname="Tunstall">
              <organization/>
            </author>
            <date year="2014" month="December"/>
          </front>
        </reference>
        <reference anchor="SH16" target="http://www.cs2.deib.polimi.it/slides_16/01_Seuschek_Deterministic_Signatures.pdf">
          <front>
            <title>A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes</title>
            <author initials="H." surname="Seuschek">
              <organization/>
            </author>
            <author initials="J." surname="Heyszl">
              <organization/>
            </author>
            <author initials="F." surname="De Santis">
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="BP16" target="https://link.springer.com/chapter/10.1007/978-3-319-44524-3_11">
          <front>
            <title>A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)</title>
            <author initials="A." surname="Barenghi">
              <organization/>
            </author>
            <author initials="G." surname="Pelosi">
              <organization/>
            </author>
            <date year="2016" month="September"/>
          </front>
        </reference>
        <reference anchor="RP17" target="https://romailler.ch/ddl/10.1109_FDTC.2017.12_eddsa.pdf">
          <front>
            <title>Practical fault attack against the Ed25519 and EdDSA signature schemes</title>
            <author initials="Y." surname="Romailler">
              <organization/>
            </author>
            <author initials="S." surname="Pelissier">
              <organization/>
            </author>
            <date year="2017" month="September"/>
          </front>
        </reference>
        <reference anchor="ABFJLM17" target="https://eprint.iacr.org/2017/975">
          <front>
            <title>Differential Attacks on Deterministic Signatures</title>
            <author initials="C." surname="Ambrose">
              <organization/>
            </author>
            <author initials="J." surname="Bos">
              <organization/>
            </author>
            <author initials="B." surname="Fay">
              <organization/>
            </author>
            <author initials="M." surname="Joye">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="B." surname="Murray">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SBBDS17" target="https://eprint.iacr.org/2017/985.pdf">
          <front>
            <title>Breaking Ed25519 in WolfSSL</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <author initials="G." surname="Bertoni">
              <organization/>
            </author>
            <author initials="J." surname="Daemen">
              <organization/>
            </author>
            <author initials="R." surname="Susella">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="PSSLR17" target="https://eprint.iacr.org/2017/1014">
          <front>
            <title>Attacking Deterministic Signature Schemes using Fault Attacks</title>
            <author initials="D." surname="Poddebniak">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="M." surname="Lochter">
              <organization/>
            </author>
            <author initials="P." surname="Rösler">
              <organization/>
            </author>
            <date year="2017" month="October"/>
          </front>
        </reference>
        <reference anchor="SB18" target="https://nielssamwel.nl/papers/africacrypt2018_fault.pdf">
          <front>
            <title>Practical Fault Injection on Deterministic Signatures: The Case of EdDSA</title>
            <author initials="N." surname="Samwel">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="WPB19" target="https://eprint.iacr.org/2019/358.pdf">
          <front>
            <title>One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA</title>
            <author initials="L." surname="Weissbart">
              <organization/>
            </author>
            <author initials="S." surname="Picek">
              <organization/>
            </author>
            <author initials="L." surname="Batina">
              <organization/>
            </author>
            <date year="2019" month="July"/>
          </front>
        </reference>
        <reference anchor="AOTZ19" target="https://eprint.iacr.org/2019/956">
          <front>
            <title>Security of Hedged Fiat-Shamir Signatures under Fault Attacks</title>
            <author initials="D." surname="Aranha">
              <organization/>
            </author>
            <author initials="C." surname="Orlandi">
              <organization/>
            </author>
            <author initials="A." surname="Takahashi">
              <organization/>
            </author>
            <author initials="G." surname="Zaverucha">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FG19" target="https://eprint.iacr.org/2019/1053">
          <front>
            <title>Modeling Memory Faults in Signature and Encryption Schemes</title>
            <author initials="M." surname="Fischlin">
              <organization/>
            </author>
            <author initials="F." surname="Günther">
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="Kampanakis16" target="https://blogs.cisco.com/security/fips-and-deterministic-ecdsa-achieving-robust-security-and-conformance">
          <front>
            <title>FIPS and Deterministic ECDSA: Achieving robust security and conformance</title>
            <author initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <date year="2016" month="December"/>
          </front>
        </reference>
        <reference anchor="Langley13" target="https://www.imperialviolet.org/2013/06/15/suddendeathentropy.html">
          <front>
            <title>Sudden Death Entropy Failures</title>
            <author initials="A." surname="Langley">
              <organization/>
            </author>
            <date year="2013" month="June"/>
          </front>
        </reference>
        <reference anchor="OpenSSL13a" target="https://github.com/openssl/openssl/commit/8a99cb29d1f0013243a532bccc1dc70ed678eebe">
          <front>
            <title>Add secure DSA nonce flag</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenSSL13b" target="https://github.com/openssl/openssl/commit/190c615d4398cc6c8b61eb7881d7409314529a75">
          <front>
            <title>Make `safe' (EC)DSA nonces the default</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Comments-186-5" target="https://csrc.nist.gov/CSRC/media/Publications/fips/186/5/draft/documents/fips-186-5-draft-comments-received.pdf">
          <front>
            <title>Public Comments Received on Draft FIPS 186-5: Digital Signature Standards (DSS)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
        <reference anchor="Bernstein19" target="https://blog.cr.yp.to/20191024-eddsa.html">
          <front>
            <title>Why EdDSA held up better than ECDSA against Minerva</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="Bernstein14" target="https://blog.cr.yp.to/20140323-ecdsa.html">
          <front>
            <title>How to design an elliptic-curve signature system</title>
            <author initials="D." surname="Bernstein">
              <organization/>
            </author>
            <date year="2014" month="March"/>
          </front>
        </reference>
        <reference anchor="Cao20" target="https://eprint.iacr.org/2020/803">
          <front>
            <title>Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA</title>
            <author initials="" surname="Weiqiong Cao">
              <organization/>
            </author>
            <author initials="" surname="Hongsong Shi">
              <organization/>
            </author>
            <author initials="" surname="Hua Chen">
              <organization/>
            </author>
            <author initials="" surname="Jiazhe Chen">
              <organization/>
            </author>
            <author initials="" surname="Limin Fan">
              <organization/>
            </author>
            <author initials="" surname="Wenling Wu">
              <organization/>
            </author>
            <date year="2020" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC8080">
          <front>
            <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
            <author fullname="O. Sury" initials="O." surname="Sury"/>
            <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8080"/>
          <seriesInfo name="DOI" value="10.17487/RFC8080"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="RFC8387">
          <front>
            <title>Practical Considerations and Implementation Experiences in Securing Smart Object Networks</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="H. Back" initials="H." surname="Back"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This memo describes challenges associated with securing resource- constrained smart object devices. The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices. Lastly, the memo discusses trade-offs involving different types of security approaches.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8387"/>
          <seriesInfo name="DOI" value="10.17487/RFC8387"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC8419">
          <front>
            <title>Use of Edwards-Curve Digital Signature Algorithm (EdDSA) Signatures in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies the conventions for using the Edwards-curve Digital Signature Algorithm (EdDSA) for curve25519 and curve448 in the Cryptographic Message Syntax (CMS). For each curve, EdDSA defines the PureEdDSA and HashEdDSA modes. However, the HashEdDSA mode is not used with the CMS. In addition, no context string is used with the CMS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8419"/>
          <seriesInfo name="DOI" value="10.17487/RFC8419"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8463">
          <front>
            <title>A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document adds a new signing algorithm, Ed25519-SHA256, to "DomainKeys Identified Mail (DKIM) Signatures" (RFC 6376). DKIM verifiers are required to implement this algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8463"/>
          <seriesInfo name="DOI" value="10.17487/RFC8463"/>
        </reference>
        <reference anchor="RFC8550">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Certificate Handling</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document specifies conventions for X.509 certificate usage by Secure/Multipurpose Internet Mail Extensions (S/MIME) v4.0 agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 5280 ("Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"). S/MIME agents must meet the certificate-processing requirements in this document as well as those in RFC 5280. This document obsoletes RFC 5750.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8550"/>
          <seriesInfo name="DOI" value="10.17487/RFC8550"/>
        </reference>
        <reference anchor="RFC8591">
          <front>
            <title>SIP-Based Messaging with S/MIME</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>Mobile messaging applications used with the Session Initiation Protocol (SIP) commonly use some combination of the SIP MESSAGE method and the Message Session Relay Protocol (MSRP). While these provide mechanisms for hop-by-hop security, neither natively provides end-to-end protection. This document offers guidance on how to provide end-to-end authentication, integrity protection, and confidentiality using the Secure/Multipurpose Internet Mail Extensions (S/MIME). It updates and provides clarifications for RFCs 3261, 3428, and 4975.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8591"/>
          <seriesInfo name="DOI" value="10.17487/RFC8591"/>
        </reference>
        <reference anchor="RFC8608">
          <front>
            <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="O. Borchert" initials="O." surname="Borchert"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure") and obsoletes RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Documentation and Experimentation Algorithm IDs, correcting the range of unassigned algorithms IDs to fill the complete range, and restructuring the document for better reading.</t>
              <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8608"/>
          <seriesInfo name="DOI" value="10.17487/RFC8608"/>
        </reference>
        <reference anchor="RFC8624">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="O. Sury" initials="O." surname="Sury"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document defines the current algorithm implementation requirements and usage guidance for DNSSEC. This document obsoletes RFC 6944.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8624"/>
          <seriesInfo name="DOI" value="10.17487/RFC8624"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
      </references>
    </references>
    <?line 563?>

<section removeInRFC="true" numbered="false" anchor="change-log">
      <name>Change log</name>
      <t>Changes from -03 to -04:</t>
      <ul spacing="normal">
        <li>
          <t>Resubmission</t>
        </li>
      </ul>
      <t>Changes from -02 to -03:</t>
      <ul spacing="normal">
        <li>
          <t>Same randomness Z in step d and f to align with HMAC_DRBG.</t>
        </li>
        <li>
          <t>Changed Hedged EdDSA order to 0x00 || Z || dom2(F, C) instead of dom2(F, C) || Z. This avoids collisions with RFC 8032 and aligns with Bernstein's recommendation to put Z before the context.</t>
        </li>
        <li>
          <t>Changed KMAC output length recommendations to avoid multiple invocations.</t>
        </li>
        <li>
          <t>Updates some text to align with the hedged signatures/signing terminology.</t>
        </li>
        <li>
          <t>Added more description about the construction.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -01 to -02:</t>
      <ul spacing="normal">
        <li>
          <t>Different names Zd and Zf for the randomness in ECDSA.</t>
        </li>
        <li>
          <t>Added empty test vector section as TODO.</t>
        </li>
      </ul>
      <t>Changes from -00 to -01:</t>
      <ul spacing="normal">
        <li>
          <t>Changed terminology to hedged signatures/signing.</t>
        </li>
        <li>
          <t>Added reference to the FIPS 204 (ML-DSA) where hedged signatures are the default.</t>
        </li>
        <li>
          <t>Added a second 000... padding that separates the context from the prefix, aligning with BSI recommendations.</t>
        </li>
        <li>
          <t>Added note that Z in step f is not reused from step d.</t>
        </li>
        <li>
          <t>Added note on "internal octet" is 0x01 from RFC 6979.</t>
        </li>
        <li>
          <t>Removed incorrect statement that context fit in first block.</t>
        </li>
        <li>
          <t>Added more description about the construction.</t>
        </li>
        <li>
          <t>Moved "For discussion" section to GitHub issue.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
<contact fullname="Tony Arcieri"/>,
<contact fullname="Uri Blumenthal"/>,
<contact fullname="Carsten Bormann"/>,
<contact fullname="Taylor R Campbell"/>,
<contact fullname="Quynh Dang"/>,
<contact fullname="Håkan Englund"/>,
<contact fullname="Janos Follath"/>,
<contact fullname="Phillip Hallam-Baker"/>,
<contact fullname="Chelsea Komlo"/>,
<contact fullname="Niklas Lindskog"/>,
<contact fullname="Ilari Liusvaara"/>,
<contact fullname="Danny Niu"/>,
<contact fullname="Jim Schaad"/>,
<contact fullname="Ruggero Susella"/>,
<contact fullname="Daniel J. Bernstein"/>,
<contact fullname="Filippo Valsorda"/>,
and
<contact fullname="Sönke Jendral"/>
for their valuable comments and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
