<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="PQ/T Hybrid KEM: HPKE with JOSE/COSE">PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-08"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <abstract>
      <?line 63?>

<t>This document outlines the construction of a PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE. It specifies the utilization of both traditional and Post-Quantum Cryptography (PQC) algorithms, referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve, will fall to quantum cryptalanysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During the transition from traditional to post-quantum algorithms, there is a desire or a requirement for protocols that use both algorithm types. Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography.</t>
      <t>HPKE offers a variant of public-key encryption of arbitrary-sized plaintexts for a recipient public key. The specifications for the use of HPKE with JOSE and COSE are described in <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support PQ/T Hybrid KEM as defined in <xref target="I-D.ietf-hpke-pq"/>. This specification defines PQ/T Hybrid KEM in HPKE for use with JOSE and COSE.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. PQ/T algorithms for HPKE <xref target="I-D.ietf-hpke-pq"/> uses a multi-algorithm scheme, where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. The QSF combiner functions defined in Sections 6.1, 6.2 and 6.3 of <xref target="I-D.irtf-cfrg-hybrid-kems"/> combines the output of a post-quantum KEM and a traditional KEM to generate a single shared secret.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a number of PQ/T Hybrid KEMs for use with HPKE. A ciphersuite is thereby a combination of several algorithm configurations:</t>
      <ul spacing="normal">
        <li>
          <t>KEM algorithm (PQ KEM + Traditional Algorithm,  for example, MLKEM768 + X25519 defined as "X25519-MLKEM768-SHAKE256-SHA3256" in <xref target="I-D.ietf-hpke-pq"/>)</t>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The "KEM", "KDF", and "AEAD" values are conceptually taken from the HPKE IANA registry <xref target="HPKE-IANA"/>. Hence, JOSE and COSE cannot use an algorithm combination that is not already available with HPKE.</t>
      <t>The HPKE PQ/T hybrid ciphersuites for JOSE and COSE are defined in <xref target="IANA"/>. Note that the PQ/T Hybrid KEM in HPKE is not an authenticated KEM. The HPKE Base mode can only be supported with the PQ/T Hybrid KEM.</t>
    </section>
    <section anchor="akp-key-for-pqt-hybrid-algorithms-in-hpke">
      <name>AKP Key for PQ/T Hybrid Algorithms in HPKE</name>
      <t>This section describes the required parameters for an "AKP" key type, as defined in <xref target="I-D.ietf-cose-dilithium"/>, and its use with the PQ/T Hybrid Algorithms for HPKE, as defined in {#XWING}. An example JWK is also provided for illustration.</t>
      <section anchor="required-parameters">
        <name>Required Parameters</name>
        <t>A JSON Web Key (JWK) or COSE_Key with a key type ("kty") for use with the PQ/T Hybrid Algorithm for HPKE includes the following parameters:</t>
        <ul spacing="normal">
          <li>
            <t>kty (Key Type)<br/>
The key type parameter <bcp14>MUST</bcp14> be present and set to "AKP".</t>
          </li>
          <li>
            <t>alg (Algorithm)<br/>
The algorithm parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> represent the PQ/T algorithm for HPKE, as defined in {#XWING}. PQ/T algorithms for HPKE are those registered in the "JSON Web Signature and Encryption Algorithms" and "COSE Algorithms" registries, derived from the KEM identifier in the HPKE IANA registry.</t>
          </li>
          <li>
            <t>pub (Public Key)<br/>
The public key parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the public encapsulation key (pk) as defined in Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
          <li>
            <t>priv (Private Key)<br/>
When representing an private key, the private key parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the private decapsulation key (sk) as defined in Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
        </ul>
        <section anchor="example">
          <name>Example</name>
          <t>The following is an example JWK representation of an "AKP" key for the "QSF-X25519-MLKEM768-SHAKE256-SHA3256" algorithm:</t>
          <artwork><![CDATA[
{
    "kty"  : "AKP", 
    "alg"  : "HPKE-7", 
    "pub"  : "4iNrNajCSz...tmrrIzQSQQO9lNA", 
    "priv" : "f5wrpOiP...rPpm7yY" 
}
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="I-D.ietf-hpke-pq"/>, <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/> are to be taken into account.</t>
      <t>The shared secrets computed in the hybrid key exchange should be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security.  ML-KEM has such security properties.</t>
      <section anchor="post-quantum-security-for-multiple-recipients">
        <name>Post-Quantum Security for Multiple Recipients</name>
        <t>In HPKE JWE Key Encryption, when encrypting the Content Encryption Key (CEK) for multiple recipients, it is crucial to consider the security requirements of the message to safeguard against "Harvest Now, Decrypt Later" attack. For messages requiring post-quantum security, all recipients <bcp14>MUST</bcp14> use algorithms supporting post-quantum cryptographic methods, such as PQC KEMs or Hybrid PQ/T KEMs. Using traditional algorithms (e.g., ECDH-ES) for any recipient in these scenarios compromises the overall security of the message.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
        <section anchor="XWING">
          <name>JOSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-7</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-8</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12</t>
            </li>
            <li>
              <t>Algorithm Description: Cipher suite for JOSE-HPKE in Base Mode that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: QSF-P256-MLKEM768-SHAKE256-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: QSF-P256-MLKEM768-SHAKE256-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the P-256 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: QSF-X25519-MLKEM768-SHAKE256-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD3</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: QSF-X25519-MLKEM768-SHAKE256-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD4</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the X25519 + ML-KEM-768 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: QSF-P384-MLKEM1024-SHAKE256-SHA3256-AES-256-GCM</t>
            </li>
            <li>
              <t>Value: TBD5</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Name: QSF-P384-MLKEM1024-SHAKE256-SHA3256-ChaCha20Poly1305</t>
            </li>
            <li>
              <t>Value: TBD6</t>
            </li>
            <li>
              <t>Description: Cipher suite for COSE-HPKE in Base Mode that uses the P-384 + ML-KEM-1024 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara and Orie Steele for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Rafael Misoczki" initials="R." surname="Misoczki">
              <organization>Google</organization>
            </author>
            <author fullname="Michael Osborne" initials="M." surname="Osborne">
              <organization>IBM</organization>
            </author>
            <author fullname="Christine Cloostermans" initials="C." surname="Cloostermans">
              <organization>NXP</organization>
            </author>
            <date day="12" month="June" year="2025"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in FIPS 204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-07"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This specification defines Hybrid Public Key Encryption (HPKE) for
   use with JSON Object Signing and Encryption (JOSE).  HPKE offers a
   variant of public key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an authenticated encryption with additional data (AEAD) algorithm.

   This document defines the use of HPKE with JOSE.  The specification
   chooses a specific subset of the HPKE features to use with JOSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-hpke-encrypt-10"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="4" month="June" year="2025"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE works for any combination of an asymmetric key encapsulation
   mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) function.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.

   This document defines the use of the HPKE with COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-13"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-01"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="25" month="February" year="2025"/>
            <abstract>
              <t>   This document defines generic techniques to achive hybrid post-
   quantum/traditional (PQ/T) key encapsulation mechanisms (KEMs) from
   post-quantum and traditional component algorithms that meet specified
   security properties.  It then uses those generic techniques to
   construct several concrete instances of hybrid KEMs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
