<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="PQ/T Hybrid KEM: HPKE with JOSE/COSE">PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="March" day="17"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <abstract>
      <?line 63?>

<t>This document outlines the construction of a PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE. It specifies the utilization of both traditional and Post-Quantum Cryptography (PQC) algorithms, referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve, will fall to quantum cryptalanysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <t>HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. The specifications for the use of HPKE with JOSE and COSE are described in <xref target="I-D.rha-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support PQ/T Hybrid KEM as defined in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This specification defines PQ/T Hybrid KEM in HPKE for use with JOSE and COSE.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203-ipd"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. <xref target="I-D.connolly-cfrg-xwing-kem"/> uses a multi-algorithm scheme,
where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. The Combiner function defined in Section 5.3 of <xref target="I-D.connolly-cfrg-xwing-kem"/> combines the output of a post-quantum KEM and a traditional KEM to generate a single shared secret.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a number of PQ/T Hybrid KEMs for use with HPKE. A ciphersuite is thereby a combination of several algorithm configurations:</t>
      <ul spacing="normal">
        <li>
          <t>HPKE Mode</t>
        </li>
        <li>
          <t>KEM algorithm (Traditional Algorithm + PQ KEM, for example, X25519Kyber768)</t>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The "KEM", "KDF", and "AEAD" values are conceptually taken from the HPKE IANA registry <xref target="HPKE-IANA"/>. Hence, JOSE and COSE cannot use an algorithm combination that is not already available with HPKE.</t>
      <t>The HPKE PQ/T hybrid ciphersuites for JOSE and COSE are defined in <xref target="IANA"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The shared secrets computed in the hybrid key exchange should be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security. ML-KEM has such security properties.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
      </section>
      <section anchor="jose-algorithms-registry">
        <name>JOSE Algorithms Registry</name>
        <ul spacing="normal">
          <li>
            <t>Algorithm Name: HPKE-Base-X25519Kyber768-SHA256-AES256GCM</t>
          </li>
          <li>
            <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the X25519Kyber768Draft00 Hybrid 
KEM, the HKDF-SHA256 KDF, and the AES-256-GCM AEAD.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg, enc"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: HPKE-Base-X25519Kyber768-SHA256-ChaCha20Poly1305</t>
          </li>
          <li>
            <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the X25519Kyber768Draft00 Hybrid<br/>
KEM, the HKDF-SHA256 KDF, and the ChaCha20Poly1305 AEAD.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg, enc"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IANA</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
        </ul>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: HPKE-Base-X25519Kyber768-SHA256-AES256GCM</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the X25519Kyber768Draft00 Hybrid KEM, the<br/>
HKDF-SHA256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: HPKE-Base-X25519Kyber768-SHA256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the X25519Kyber768Draft00 Hybrid    <br/>
KEM, the HKDF-SHA256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203-ipd" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.rha-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with Javascript Object Signing and Encryption (JOSE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>independent</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This specification defines Hybrid public-key encryption (HPKE) for
   use with Javascript Object Signing and Encryption (JOSE).  HPKE
   offers a variant of public-key encryption of arbitrary-sized
   plaintexts for a recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in JOSE is provided by JOSE-native security mechanisms or by one
   of the authenticated variants of HPKE.

   This document defines the use of the HPKE with JOSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rha-jose-hpke-encrypt-06"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
         </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by one
   of the authenticated variants of HPKE.

   This document defines the use of the HPKE with COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-07"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="23" month="January" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-01"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="2" month="February" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91a63LbxhX+j6fY0j8ipQJ1sZXYnDQJTdKRYt0syk0zHk9n
CSzJjXDz7kIU49G79Fn6ZP3OWYAEJDp2nDY/mvGIwN7O/TvnLBKGYeC0S1RP
dC5e7V6Jo+XE6Fi8HJ32xNHFy5FYaDcXP56PR7sD/OkEcjIx6uaTl0fSqVlu
lj1hXRwEcR5lMgW12MipC42K42UY5VaFv9Cf4l0UzvnIcF5cq8CWk1Rbq/PM
LQvsOh5dvQiyMp0o0wtiHN0LojyzKrOl7QlnShWAtceBNEqCxbGKSqPdshMs
cnM9M3lZYNQzdq2WGIx7gQjFxasB/dAE/f5Y/Xrh+AmiBcGNykpQFKI+iRjv
4N0z1/kJRHQ2Ez/QNI2nUifVsu+1ctNubmY0Lk00x/jcucL2dndpGQ3pG9Wt
l+3SwO7E5AurdumAXdoYBNbJLP6nTPIMFJfKBoXuiTcuj3aEzY0zamrxtEyr
B2d05HZElKepyhxGYIBUFgXYfBsEsnTz3JAKcLYQ0zJJvHWutClTmSi7kEZc
kpF4AfiSmf5VOhikJ87yay15PIKOe+K5zGZgzCgeM2rGq15Kk0knr6uVeZk5
8objLK42q0pL13kWO22+n9F7Fxx3HvJ1JLNMWXFlo3k+VZmePWRrzVCb4A/K
pDJbtkjO+biuWx0H4rfdTLlOEIggy7HDwSi9INDZdP0mcMiL44vxwd7jUBex
JyTqMDrN4zJR4Yl0TkcqnEirECBqGY6ySBa2TJhPcaoikNc2FWMyqTRxpzpH
mplyPVF7R3aTFOXEdrHWdWf5zS490Mgu8bB7djy+6tJTF+x0wU63iKf+JA4Q
MZWJJZOQD4fH/bN+xe/K+NV/0CLMgvmWOFWAX5STREckhoAYZlmwDFt05jZv
gpfMwJdZbhZisVh0tcykd21E9Cxjh9ylMOc/3du5S5OHjPuRIAxDIScgICMX
BFdzbcmVSzpE5KVLNPmFmytBeAAgiJjBfCqkaAGVF2CjHbaAYttCZ22Zw80y
wx2wFNhm/DEr3BMwJiNJVxw7YQsV6amueCudTio/JdYmOfZAoljTiEx460Vu
XfiqlJkrUzEgqjloFPOl2AJMbQuZAE5BLEUwI8iVAYYKlwtpxT1E3mGmIE+l
FqduHZFtcxmwalMdxwmU/QiB6Qw8mPVHilaYq4UEmY+xB7uUmX5XKlERhqUc
8J8Ip3msTCZiPdMO0kbN3bxaOpEp8KwMb22pZiW2QFzydEGsvKtYacwD/Bky
lpQQrPPqKUzuVOTItSQbj04w6l2pSX88muipcjoFIIirD1IHppbRnLR9Oe6z
FlWSaLhGJJBrbhQpPUnIdxMiW7PHssoEAGQ1zljMdaJ+U4ipjOAvWaSMk/Cz
JZwfbu69KIMakyVlGiDSXBEsRZZBvkgQZNiInFkqDJXZdZYvMnFTJpkycgL3
c5om5sCbBSmKJLD51PGLxgGKQorNbb1F5vJGQef0gKXldKojTVEHskiuYIJ0
RrIawB7FoogSivCoNjHCPlmSgoCIMrq2TLNNSkzKmYUrDqsTvfozy/oXU5On
LXOQPTfrbYf2kiSgImJlYV0AG54rUzNekPnJH/IoTyohS6t8OK6O4qQOV6ji
CeWCULcEFTPl484SG6VlM5SJ05CnvaphTatpicxUXlr4JSkA1prorJbWKACS
8yhC77McYiJkwOaNjmmVrWoZoVCGCA1gg4dNoG1UArTSB3la4BUiNmhDFSgj
rlXGgIS3NEcakxQXk2VTzfe12ozPLkoPru/yKYsuxY008DUGlMIDJQu/BkrC
XjPRIGCWodW/gl6RkC8DhizbgKwS6YK9yZ9BCvTRVwFnVHliHbFkJxzcLjVX
YMahD6tHRk9ADpjy/v13x+Gwa+bSF5iUacKKybs73lgtocLLV6K05u6O0JWY
oJSfgCkmGUm4qoKJnUIQMrDYsihQeN0HX0KIWE2Rlpp8AIWzHMgURlMzC28X
MCzUlt7dkdAwTUvqav8DXOcURdyQUkghm3IPQfkgz+ArXoE0M6Tz2NbWIztZ
jIpgi6rl9fiqs+N/xdk5P1+OXr0+vhwN6Xl81D85WT0E1Yrx0fnrk+H6ab1z
cH56Ojob+s0YFa2hoHPa/xkzxFXn/OLq+Pysf9LxSaCZ2cme0PFEca41hVHk
ttIGLSM/H1z8+1/7T6Dkv1y+GBzs7z+Daf3L0/2vn+BlMVeZp5ZniD//Cn9a
BqiFlaRUzvGEwoBSE2AE5rNzgk6CEyDTl29IM2974ptJVOw/+bYaIIFbg7XO
WoOss4cjDzZ7JW4Y2kBmpc3W+D1Nt/nt/9x6r/XeGPzmOyqkRLj/9Ltvg/tl
Viqv4YxVBDJEo6Te5OUcSgXwtsBfVzd0tFrD+/PZkvz9RZ3FSwPUwcF8aIPe
jtAMV3OVFEjnlR/IScIuEWvgompiFCWYBuplWOQWuU9GyqKG71w1Uki/Xtrp
CdGH9dEzpYrapQ+dKXwlj7jkug81CnI0ShttOVp3BAcXSg+tElQUGg4KbxWQ
V9a5qV0qbF4DtRiVMDyvszsYRiaA6Cky0vHGig6n30pKql6TDVE/lJR0FiUl
dDiquRowV0ONFK/CIzCLhkmMCvCA2iGhPoVWwcgIrK/2nu1xlNHL073HX5NN
H3I2+GOc1bTDivbWaLwthkccyX5oNTP2M56hZ3uHB8QQjN4qWD/D6lweUA5V
iUbqjSs/5HQMpmfIaNatShtfD6wyKPJx6ThfWrGAQum3UR3V010xamgIdfRH
NXN6EiITdO/L1/TwLUob23XeGEekShbblyvhWkTLc4SKJJETiZLW1xUbCgpf
Wm0uv9gurQN48cZKmnn/tM5sM9eUCVMJXZQF+xViHbGT5qbJNmfitfo2iPjf
E4cT7qr3DAJvI78Hm8MCdhdb1A2pECeHSN+ouuPte66XrhpSrpFQSBk0TJl0
BJh55XhIYhYlCPlJ1QcolGMMks2qyrujLzCrsS9s5Tz3Si6jgMXSSIQDOaxV
VZHmF/uuqu5muXJ8/75xB1JFP2oJ4CKsAT810FqrcIVqVDZDqbJFeo3VakWh
DN+uoHPZ5rRsG6wwJ3ShV3ESHu4f7NTPX3/11Kf16n1/7+BJ96PFFuUwMsrm
ONgJvJd8tv+jV6IO9iP+wlXugJsASiVo9Ro1H2fTsfJDh93HpNKPSuU7iuqq
AX1YUTp/AdJiliOC2GzxRaPwnZmiNhEZSQqyDFKtRacIdixZy3kn10BlY0vK
ddWlj6wvCx6UsIYX+I7B39t6hGsVtLZdyVJt20XARw1C2vrGDn4nK0FX1ygW
sGyauqUENNWz0vNFqd/f4IrTPFZ4boGC2NpYFoi/gkt/i0LMVRlsR/zj4PBw
/9nLJSSB823TacMX69Pw3h/1h40BLrQ7OIgKYaytq15a1kEXlZTKBxeYjlTh
Ssk3F6i16sYX+5l7vmYz1TUb3GF1oUfBd4SmBuy12yG0K9S4k2Zl1tLPWoF1
fqOFMkFIxlDxDd1IU6W1NogXhBlh8/mqrmkkb8ZNDVmjQKz4JUeqb+cZNlHM
VebyhFp+Z+tUGa9ulTZ05ajXS1ReE9VaLcVCLr2UMppTCvcB0vFHdKiwAgDR
Bfa6Ea9wC6RJNXWutyjUMIHfVlJ40Hx/MHnT3Vjdi1OWZ98v7VqslC6kTbuF
bXdE3HSo2wLIrR0cZcINr55l9yuT6kS6LXBefF9t15hP3BhFxNdXWl5BJPzx
2TAcDPoHK/Tu1lljTp0RrV/heqVArSybld20bVLx/hHbHdOP/NeVe60F3c4o
CzvzZkpicSwytajjg2p5stmP4/Mz8ZOaiDEkpvsnf4HVuJ5dBbDtrGKlu6Lb
mF5dWAuCh3Xcn/kPDRRbz1Hwh+2AD9G4HRx+FfZHY/z8MDht7R2y3Qr/ecTj
pPD4VUdGyAFEPSvOZjxa3T95t2yTG9JXsr29GisD4RGJIQFYUnFDEORRhSbA
WkgsgjnGom6LxddWwilPco/PW3a7Jzpw0R26uekE/tuXOG5fzl2u785sT5wX
HiuxeOBdHMZ2BjlJmeoDQijGrSwwrOzM5N68uXo+7Pn7DpTqb9+2+OvTZaHF
VL3H8qar8+H559gJHOLfwd5Fniz3H+8d/qnm+jR73Wfx/81oCL3B54f8F4N2
2H7Rjmp/9gfC+kvxu6MZW/5O9MH88+G+oPff9pLBH/aSlYeQu/yesAZvA1ms
LvVhpGu3fMvDHzAxpi7p6ppqhU02/XSNPYirluIO/gy9+e+C4g+E2P9AgY9E
P6JPLomKZxwIwfteVfiq+G8d/qTZuaNYkNk1O/lxIo0WJ7q0NxI9z+qmmy6H
Sv5fH+rPBXxeN/gPvM6Wi7MhAAA=

-->

</rfc>
