<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-pquip-hybrid-signature-spectrums-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="hale-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-pquip-hybrid-signature-spectrums-01"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2023" month="November" day="06"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the ingredient signatures given a hybrid
signature, backwards/forwards compatiblity, hybrid generality, and simultaneous
verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP mailing list
pqc@ietf.org or on the GitHub repository which contains the draft:
https://github.com/dconnolly/draft-hale-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<!--

# Todos

- add discussion
- extend with discussion points from private emails between Britta, Nina and IETF
- extend with discussion points fromn IETF mailing lists - for both be very careful to provide
acknowledgements!!
- double-check and extend/refer to Flo's draft

-->

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in protocols
has largely been on confidentiality, given the potential risk of store and
decrypt attacks, where data encrypted today using traditional algorithms could
be decrypted in the future by an attacker with a Cryptographically-Relevant
Quantum Computer (CRQC). While traditional authentication is only at risk once a
CRQC exists, it is important to consider the transition to post-quantum
authentication before this point.  This is particularly relevant for systems
where algorithm turn-over is complex or takes a long time (e.g., long-lived
systems with hardware roots of trust), or where future checks on past
authenticity play a role (e.g., digital signatures on legal documents).</t>
      <t>One approach to design quantum-resistant protocols, particularly during the
transition period from traditional to post-quantum algorithms, is incorporating
hybrid/composite signatures schemes, which combine both traditional and
post-quantum (or more generally next-generation) algorithms in one cryptographic
scheme. Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and
in an initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification tag
may be expected to attest to both standard and post-quantum components, is
subtler to design and implement due to the potential separability of the
composite signatures and the risk of downgrade/stripping attacks.  There are
also a range of requirements and properties that may be required from dual
signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of different
hybrid signature scheme designs and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their scheme.  It intentionally does not propose concrete hybrid signature
combiners or instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a
final version of this document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation mechanisms
(KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a consistent
language. We will make clear when this is not possible. In particular, we follow
the definition of 'post-quantum algorithm', 'traditional algorithms', and
'combiner'. Moreover, we use the definition of 'certificate' to mean 'public-key
certificate' as defined in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm, which
generates a public verifying key <tt>pk</tt> and a secret signing key <tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which takes as
input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as input a
public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message <tt>m</tt>, and outputs
a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject (b=0)</tt> of the signature
for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we
define a hybrid signature scheme to be "a multi-algorithm digital signature
scheme made up of two or more component digital signature algorithms ...". We
require that the security of the component schemes is based on the hardness of
different cryptographic assumptions. In contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general term
'hybrid signature scheme' instead of requiring one post-quantum and one
traditional algorithm (i.e., PQ/T hybrid signature schemes) to allow also the
combination of several post-quantum algorithms. The term 'composite' scheme is
often used as a synonym for 'hybrid scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used at the protocol
level.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid signature
scheme's signature generation. As synonyms we might use 'composite signature'
or 'dual signature'.  For example, NIST define a dual signature as "two or
more signatures on a common message" <xref target="NIST_PQC_FAQ"/>.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature scheme. This has
a similar purpose as in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  In this
draft, we will use 'ingredient signature scheme' as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Similarly to the case of hybrid KEMs
<xref target="I-D.ietf-tls-hybrid-design"/>, hybrid signatures are mostly motiviated as
preparation for the post-quantum migration. Following
<xref target="I-D.ietf-tls-hybrid-design"/>, we opt to use the more generic term
"next-generation" and "traditional" algorithm instead of "post-quantum" and
"classical" algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize a
signature that remains even if a component algorithm tag is removed. Artifacts
can be e.g., at the algorithmic level (e.g., within the digital signature), or
at the protocol level (e.g., within the certificate), or on the system policy
level (e.g., within the message). Artifacts should be easily identifiable by
the receiver in the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is worth
taking a look at why hybrid digital signatures are desirable for some
applications. As many of the arguments hold in general for hybrid algorithms, we
again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that summarizes these well.  In
addition, we explicate the motivation for hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are often
more complex than traditional algorithms and as such carry a higher risk of
implementation mistakes and revision of parameters compared to traditional
algorithms, such as RSA. RSA is a relatively simple algorithm to understand and
explain, yet during its existence and use there have been multiple attacks and
refinements, such as adding requirements to how padding and keys are chosen, and
implementation issues such as cross-protocol attacks. Thus, even in a relatively
simple algorithm subtleties and caveats on implementation and use can arise over
time. Given the complexity of next generation algorithms, the chance of such
discoveries and caveats needs to be taken into account.</t>
          <t>Of note, next generation algorithms have been heavily vetted. Thus, if and when
further information on caveats and implementation issues come to light, it is
less likely that a "break" will be catastrophic. Instead, such vulnerabilities
and issues may represent a weakening of security - which may in turn be offset
if a hybrid approach has been used. The complexity of next-generation algorithms
needs to be balanced against the fact that hybridization itself adds more
complexity to a protocol and introduces the risk of implementation mistakes in
the hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme ML-DSA
(a.k.a. CRYSTALS-Dilithium) that has been selected for standardization by
NIST. While the scheme follows the well-known Fiat-Shamir transform to construct the
signature scheme, it also relies on rejection sampling that is known to give
cache side channel information (although this does not lead to a known attack).
Furthermore, recent attacks again the next-generation multivariate schemes Rainbow
and GeMSS might call into question the asymptotic and concrete security for
conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to quantum-resistant algorithms now while simultaneously
being aware of potential, hidden subtleties in their resistance to standard
attacks drives transition designs towards hybridization.  Mosca’s equation
<xref target="MOSCA"/> very simply illustrates the risk of post-quantum transition delay: <tt>l +
d &gt; q</tt>, where l is the information life-span, d is the time for system
transition to post-quantum algorithms, and q is the time before a quantum
computer is ready to execute cryptanalysis. As opposed to key exchange and KEMs,
it may not be obvious why there is urgency for an adoption of next-generation
signatures; namely, while encryption is subject to store-now-decrypt-later
attacks, there may not seem to be a parallel notion for authenticity, i.e.,
'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems, large
healthcare support systems, and critical infrastructure, where acquisition and
procurement time can be measured in years and algorithm replacement may be
difficult or even practically impossible, this equation can have drastic
implications.  In such systems, algorithm turn-over can be complex and difficult
and can take considerable time (such as in long-lived systems with hardware
deployment), meaning that an algorithm may be committed to long-term, with no
option for replacement. Long-term committment creates further urgency for
immediate next-generation algorithm selection.  Additionally, for some sectors
future checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later' analogy would
present challenges in such sectors, where future analysis of past authentication
may be more critical than in e.g., internet connection use cases. As such there
is an eagerness to use next-generation signatures algorithms for some
applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through hybridization. The
following provides a summary of these goals, while also noting where security
goals are in conflict, i.e., that achievement of one goal precludes another,
such as backwards compatibility.</t>
        <section anchor="unforgeability">
          <name><strong>Unforgeability</strong></name>
          <t>One goal is security of hybrid signature schemes, in particular that EUF-CMA
security is maintained as long as at least one of the ingredient schemes is
EUF-CMA secure.  There might be, however, other goals in competition with this
one, such as backward-compatibility, where the EUF-CMA security of the hybrid
signature relies solely on the security of one of the ingredient schemes instead
of relying on both.</t>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the ingredient algorithms are combined in such a way
that it is possible to prove a security reduction from the security properties
of hybrid signature scheme to the properties of the respective ingredient
signature schemes and, potentially, other building blocks such as hash
functions, KDF, etc.  Otherwise an entirely new proof of security is required,
and there is a lack of assurance that the combination builds on the
standardization processes and analysis performed to date on ingredient
algorithms. The resulting hybrid signature would be, in effect, an entirely new
algorithm of its own. The more the ingredient signature schemes are entangled,
the more likely it is that an entirely new proof is required, thus not meeting
proof composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital signatures
to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that an adversary
cannot simply “remove” one of the ingredient signatures without evidence left
behind. For example there are artifacts that a carefully designed verifier may
be able to identify, or that are identifiable in later audits. This was later
termed Weak Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid ingredient digital
signature from a hybrid one (a signature stripping attack), but rather implies
that such a digital signature will contain artifacts of the separation. Thus
authentication is not simply provided by the sender to the receiver through
correct verification of the digital signature(s), but potentially through
further investigation on the receiver side that may extend well beyond
traditional signature verification behavior. For instance, this can intuitively
be seen in cases of a message containing a context note on hybrid
authentication, that is then signed by all ingredient algorithms/the hybrid
signature scheme. If an adversary removes one ingredient signature but not the
other, then artifacts in the message itself point to the possible existence of
hybrid signature such as a label stating “this message must be hybrid
signed”. This might be a counter measure against stripping attacks if the
verifier expects a hybrid signature scheme to have this property. However, it
places the responsibility of signature validity not only on the correct format
of the message, as in a traditional signature security guarantee, but the
precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid ingredient signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature scheme)
entirely. Therefore, authentication is provided by the sender to the receiver
through correct verification of the digital signature(s), as in traditional
signature security experiments. It is not dependent on other components, such as
message content checking, or protocol level aspects, such as public key
provenance. As an illustrative example distinguishing WNS from SNS, consider the
case of ingredient algorithms <tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt> where the
hybrid signature is computed as a concatenation <tt>(sig_1, sig_2)</tt>, where <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.  In
this case, a new message <tt>m' = (hybridAlgID, m)</tt>
along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the hybrid artifact embedded
in the message instead of the signature, could be correctly verified. The
separation would be identifiable through further investigation but the signature
verification itself would not fail. Thus, this case shows WNS (assuming the
verification algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on the public
key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in the
certificate chain). This further requires that security analysis of a hybrid
digital signature requires analysis of the key provenance, i.e., not simply that
a valid public key is used but how its hybridization and hybrid artifacts have
been managed throughout the entire chain. External dependencies such as this may
imply hybrid artifacts lie outside the scope of the signature algorithm
itself. SNS may potentially be achieveable based on dependencies at the system
level.</t>
          <!--
However, since those
artifacts are outside the security definition scope for a digital
signature, namely definitions such EUF-CMA, we do not include them
in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature may be
verified by only verifying one component signature, allowing the scheme to be
used by legacy receivers. In general this means verifying the traditional
component signature scheme, potentially ignoring the next-generation signature
entirely. This provides an option to transition sender systems to
next-generation algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided a
hybrid digital signature, but the verifier is allowed, due to internal policy
and/or implementation, to only verify one component signature. Backwards
compatibility may be further decomposed to subcategories where ingredient key
provenance is either separate or hybrid so as to support implementations that
cannot recognize (and/or process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
next-generation) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus the key
distinction between backwards and forwards compatibility is that backwards
compatibility may be needed for legacy systems that cannot use and/or process
hybrid or next-generation signatures, whereas in forwards compatibility the
system has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all ingredient signatures
needed to achieve a successful verification present in the hybrid signature, but
also that verification of both component algorithms occurs
simultaneously. Namely, "missing" information needs to be computed by the
verifier so they cannot “quit” the verification process before both component
signatures are verified. SV mimics traditional digital signatures guarantees,
essentially ensuring that the hybrid digital signature behaves as a single
algorithm vs. two separate component stages. Alternatively phrased, under an SV
guarantee it is not possible for an unerring verifier to initiate termination of
the hybrid verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
          <!--

What the sender is assured of is that one of two cases occurred: either 1) the
receiver ignored the digital signatures or 2) the receiver initiated
verification of the digital signatures (resulting in either successful or failed
verification). WNS complicates this situation, resulting in six cases instead of
two: 1) the receiver ignored the digital signatures, 2) the receiver verified
the full hybrid combination (with success or failure); 3) the receiver initiated
verification of the hybrid digital signatures, but terminated once the standard
component succeeded or failed; 4) the receiver initiated verification of the
hybrid digital signatures, but terminated once the post-quantum component
succeeded or failed; 5) the receiver initiated verification of the standard
signature only (with success or failure), and 6) the receiver initiated
verification of the post-quantum signature only (with success or failure). It
may initially appear that (3) and (5) (resp. (4) and (6)) are similar, however
(3) and (4) are precisely the cases eliminated by SNS, i.e. that the verifier
does not take as input the hybrid digital signatures, instead only attempting
verification on one component. SNS thus improves the situation to only four
options. Still, the verifier can still terminate upon correctly checking only
one component signature without actually verifying both parts. One could argue
that a receiver who has checked the accuracy of their implementation should be
assured that both components are verifying.  This misconstrues the original
intent though, which is to correctly mirror traditional digital signatures
properties in hybrid digital signatures; ideally, the sender should be assured
that there are only two options: 1) ignore the digital signatures or 2) verify
the digital signatures (resulting in either failure or full
verification). Simultaneous Verification addresses this property.

-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based on
inherent and common structures of component digital signatures "categories." For
instance, since multiple signature schemes use a Fiat-Shamir Transform, a hybrid
scheme based on the transform can be made that is generalizable to all such
signatures. Such generality can also result in simplified constructions whereas
more tailored hybrid variants might be more efficient in terms of sizes and
performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this means
that the computation time should only minimally exceed the sum of the component
signature computation time. It is noted that performance of any variety may come
at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as possible. This
includes messages (as they might increase if artifacts are used), public keys,
and the hybrid signature.  For the hybrid signature, size should no more than
minimally exceed the signature size of the two component signatures. In some
cases, it may be possible for a hybrid signature to be smaller than the
concatenationation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>, duplicated information should be
avoided when possible. This might concern repeated information in hybrid
certificates or in the communication of component certificates in additional to
hybrid certificates (for example to achieve backwards/forwards-compatibility), or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the ingredient signatures
can be stripped away with the verifier not being able to detect the change
during verification. An example of this includes simple concatenation of
signatures without any artifacts used. Nested signatures (where a message is
signed by one component algorithm and then the message-signature combination is
signed by the second component algorithm) may also fall into this category,
dependent on whether the inner or outer signature is stripped off without any
artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the composite signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents for
possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature-tag is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which separability
detection is dependent on artifacts in the signature itself. Unlike in Weak
Non-Separability, where artifacts may be in the actual message, the certificate,
or in other non-signature components, this notion more closely ties to
traditional algorithm security notions (such as EUF-CMA) where security is
dependent on the internal construct of the signature algorithm and its
verification. In this type, the verifier can detect artifacts on an
algorithmic level during verification. For example, the signature itself may encode
the information that a hybrid signature scheme is used. Examples of this type
may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not only
when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to the
receiver during the verification process on the possibile validity/invalidity of
the component signatures until both verify. This construct most closely mirrors
traditional digital signatures where, assuming that the verifier does verify a
signature at all, the result is either a positive verification of a the full
signature or a failure if the signature is not valid. For hybrid signatures, a
<tt>full signature</tt> implies the hybridization of both component algorithms, and
therefore the strongest non-separability notion enforces an all-or-nothing
approach to verification. Examples of algorithms providing this type of security
can be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--

Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.

-->

</section>
    <section anchor="artspectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the message,
the signature, or somewhere on the protocol level instead of at the algorithmic
level). Even commonly discussed hybrid approaches, such as concatenation, are
not inherently tied to one type of security (e.g., WNS or SNS). This can lead to
ambiguities when comparing different approaches and assumptions about
security or lack thereof. Thus in this section we cover artifact locations and
also walk through a high-level comparison of a few hybrid categories to
show how artifact location can differ within a given approach.  Artifact
location is tied to non-separability notions above; thus the selection of a
given security guarantee and general hybrid approach must also include finer
grained selection of artifact placement.</t>
      <!--

In this section we exemplify the difference in non-separability guarantees
depending on the artifact location for three types of hybridization, namely
concatenation, nesting, and 'fused' hybrid explained next.

-->

<!--

While the above discussion about the non-separability spectrum covers a spectrum
of security guarantees and existence of artifacts are linked to achieving those,
this (sub-)section covers some specific examples of artifact placement.

-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into policy,
as shown in <xref target="tab-artifact-location"/>.  For example, one artifact location could
be in the message to be signed, e.g., containing a label artifact.  Depending on
the hybrid type, it might be possible to strip this away. For example, a quantum
attacker could strip away the quantum-secure signature of a concatenated dual
signature, and (being able to forge, e.g., ECDSA signatures) remove the label
artifact from the message as well. So, for many applications and threat models,
adding an artificat in the message might not prevent stripping attacks.  Another
artifact location could be in the public key certificates as described in
<xref target="I-D.ounsworth-pq-composite-sigs"/>. In yet another case, artifacts may be
present through the fused hybrid method, thus making them part of the signature
at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on system
policy, then cryptographic analysis must necessarily be reliant on specific
policies and it may not be possible to describe a scheme's security in a
standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="artspectrumexample">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection decision,
since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting, and
fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt>
and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
        </ul>
        <!--

WNS may be a goal of a concatenation approach.  NB: I took it out because I
don't see a reason why there shouldn't been a policy or protocol artificat
making concatenation SNS.

-->

<ul spacing="normal">
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and
<tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m, sig_1))</tt>.</t>
          </li>
        </ul>
        <!--

WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted
in a stripping attack) may be goals of a nesting approach.

-->

<ul spacing="normal">
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated with
entanglement to produce a single hybrid signature <tt>sig_h</tt> without clear
component constructs.</t>
          </li>
        </ul>
        <!--

SNS and potentially SV are goals of a true hybrid approach.

-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply different
overall system implementation considerations to be able to achieve such
detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there
are no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every
implementation using concatenation fails to achieve non-separability. Thus, it
is advisable for implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the
message. This is notable as the authenticity of the message relies on the
validity of the signature, and the artifact location means that the signature in
turn relies on the authentic content of the message (the artifact label). This
creates a risk of circular dependency. Alternative approaches such as
cases 3 and 4 solve this circular dependency by provisioning keys in a combined
certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain must
then also use a similar combiner if a straightforward security argument is to be
made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
        <!--

The artifact placements in nesting combiners may be surprisingly similar to
those in concatenation option cases 2, 3, and 4. Namely, if `sig_2 =
Sigma_2.Sign(hybridAlgID, (m, sig_1))`, then the "message" `(m, sig_1)` input
into `Sigma_2.Sign` actually contains the artifact and acts as a label.  Unless
an additional label is provided within $m$ itself, $sig_1$ does not therefore
contain an artifact. Where the artifact is located is necessarily dependent upon
the threat model; guessing which algorithm is more at risk from a stripping
attack and choosing the order of nesting accordingly may change the location of
an artifact.

Under a fused combiner, artifacts of hybridization are present within the
signature. This can be coupled with artifacts in the message, such as through
use of a label, and/or artifacts in the certificate if keys are also provisioned
in a combined certificate.

-->

</section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards specifications
where applicable. This is particularly relevant in the case of FIPS approval
considerations as well as NIST, which has provided basic guidance on hybrid
signature use. NIST provides the following guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is
generated with a NIST-approved signature scheme as specified
in FIPS 186, while another signature(s) can be generated using
different schemes</em>, e.g., ones that are not currently specified
in NIST standards...<em><tt>hybrid signatures</tt> can be accommodated by
current standards in <tt>FIPS mode,</tt> as defined in FIPS 140,
provided at least one of the component methods is a properly
implemented, NIST-approved signature algorithm</em>. For the purposes
of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as
assuring the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for one of the
component algorithms must be approved and 2) that said algorithm must be properly
implemented. This leaves some ambiguity as to whether only the algorithm must be
approved and well implemented, or if that implementation must go through an
approval process as well.  As such, there is a <tt>scale of approval</tt> that
developers may consider as to whether they are using at least one approved
component algorithm (<tt>1-out-of-n approved software module</tt>), or whether the
implementation of that component algorithm has gone through an approvals review
(thus making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for FIPS-140
approvals based on the NIST guidelines; however, it is not inconceivable that
using a <tt>all approved software module</tt> could automate much of the
certification review and therefore be attractive to developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval process
or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved (or
even existing) signature schemes. Such a new, singular algorithm relies on both
traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved signature
schemes such that its security can be reduced to the security of the approved
algorithms. The combiner may, however, alter the implementations.  As such it is
uncertain whether new approval would be needed as it might depend on the
combiner and changes. Such a case may potentially imply a distinction between a
need for fresh approval of the algorithm(s) and approval of the
implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation in a
black-box way. It may potentially change the specifics of the other component
algorithm implementations. As long as at least one component is approved, no new
approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
blackbox way. A concatenation combiner is a simple example (where a signature is
valid if all component signatures are valid).  As long as at least one component
is approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>); thus as all
algorithm implementations are approved the requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA, the
adversary 'wins' the security experiment if it can produce a new message such
that a message-signature pair <tt>(m, sig)</tt> with it correctly verifies. This
traditional security notion is challenged under a hybrid construct.</t>
      <t>The most straightforward comparison would be for the adversary to attempt to
produce a new message <tt>m'</tt> that a message-hybrid signature pair <tt>(m', sig_h)</tt>
correctly verifies.  However, such a guarantee depends on the signature being
strongly non-separable. Otherwise, in practical terms a security experiment must
capture the case that an existing or new message <tt>m</tt> could be verified with a
component signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies
under <tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of traditional
security analysis and represent considerations that would need to be accounted
for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly affect
any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>There is an inherent mutual exclusion between backwards compatibility and SNS.
While WNS allows for a valid separation under leftover artifacts, SNS will
ensure verification failure if a receiver attempts separation.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order who have
contributed to pushing this draft forward, offered insights and perspectives,
and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike Ounsworth,
Douglas Stebila</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="September" year="2023"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="20" month="October" year="2023"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-01"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite Signatures For Use In Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>CableLabs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="23" month="October" year="2023"/>
          <abstract>
            <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key
   or signature such that they can be treated as a single atomic object
   at the protocol level.

   This document defines the structures CompositeSignaturePublicKey,
   CompositeSignaturePrivateKey and CompositeSignatureValue, which are
   sequences of the respective structure for each component algorithm.
   Composite signature algorithm identifiers are specified in this
   document which represent the explicit combinations of the underlying
   component algorithms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-10"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
