<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vaira-pquip-pqc-use-cases-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="PQC use cases">Post-quantum cryptography migration use cases</title>
    <seriesInfo name="Internet-Draft" value="draft-vaira-pquip-pqc-use-cases-02"/>
    <author initials="A." surname="Vaira" fullname="Antonio Vaira">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>antonio.vaira@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="A." surname="Railean" fullname="Alexander Railean">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>alexander.railean@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust</organization>
      <address>
        <postal>
          <street>1187 Park Place</street>
          <city>Minneapolis</city>
          <region>MN</region>
          <code>55379</code>
          <country>United States of America</country>
        </postal>
        <email>john.gray@entrust.com</email>
        <uri>https://www.entrust.com</uri>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust</organization>
      <address>
        <postal>
          <street>1187 Park Place</street>
          <city>Minneapolis</city>
          <region>MN</region>
          <code>55379</code>
          <country>United States of America</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
        <uri>https://www.entrust.com</uri>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Security</area>
    <workgroup>Post-Quantum Use In Protocols</workgroup>
    <keyword>post-quantum cryptography</keyword>
    <keyword>PQC use cases</keyword>
    <abstract>
      <?line 213?>

<t>This document is meant to be continuously updated, to incorporate emerging Post-Quantum Cryptography (PQC) migration use cases, with a focus on the migration from traditional signature algorithms (e.g., RSA, DSA, ECDSA) to PQC signature algorithms (e.g., LMS, XMSS, ML-DSA, SLH-DSA). This document aims at categorizing real-world scenarios based on a set of distinctive features. The primary goal is to facilitate discussions on migration strategies by offering a systematic taxonomy and a shared understanding among stakeholders.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://avaira77.github.io/pq-ietf-usecase/draft-vaira-pquip-pq-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vaira-pquip-pqc-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/avaira77/pq-ietf-usecase"/>.</t>
    </note>
  </front>
  <middle>
    <?line 217?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>How to transition to post-quantum cryptography is a question likely to stay with us for a considerable period. Within several working groups at the IETF, a variety of strategies are under discussion, gradually finding their way into RFCs. The existence of multiple choices makes it more difficult to select the most suitable approach for any given use case.</t>
      <t>For example, an Original Equipment Manufacturer (OEM) must issue its products today with manufacturer X.509 certificates that might be used at any time during their lifespan. These certificates will eventually be utilized to enroll in a domain PKI (Public Key Infrastructure), therefore the choice of algorithms is critical.</t>
      <t>In this document, intended to be a dynamic resource, our main objective is to compile a list of digital signature use cases and categorize them based on prominent features. Examples include distinguishing between long-lived and short-lived scenarios, whether they include a negotiated protocol, or if backward compatibility is required.</t>
      <t>We also explore the migration strategies that have appeared so far, proposing the most suitable fit for each of the properties identified in each use case. Some of these migration strategies make use of hybrid cryptography, i.e., use both traditional and post-quantum cryptography. <!-- There are several concepts for hybrid cryptography. -->
      </t>
      <t>The consideration of hybrid cryptography is motivated by: (1) the need of having long-lived assertions, i.e., digital signatures that require long term validation, (2) the uncertainty surrounding the longevity of traditional cryptographic methods, (3) the lack of complete trust in emerging PQC algorithms, and (4) the time pressure to launch a product soon.</t>
      <t>An additional factor to consider is rooted in the requirements from regulatory bodies, which, in several cases will differ in regard to post-quantum algorithms and acceptable migration strategies. For example <xref target="bsi.quantum-safe.crypto"/>, recommends the incorporation of post-quantum cryptographic algorithms within hybrid cryptographic schemes, as a proactive response to the quantum threat. On the contrary, <xref target="CNSA2-0"/> recommends specific post-quantum cryptographic algorithms for each use case.</t>
      <t>The use of hybrids potentially comes at the cost of increased complexity, or that of an implied second migration that must occur when a component algorithm becomes obsolete. These arguments need to be taken into account when considering hybrids. A key advantage of hybrids is that they accommodate a bias for action, enabling an organization to act now (e.g., to avoid piling up of inventory, to meet contractual commitments, gain first-mover advantage, etc.), and apply course corrections later. Note that hybrids defer the problem to a future date, without eliminating the need to address it altogether.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-usecases">
      <name>Reference Use Cases</name>
      <t>This section is the core of this document. For each use case, we present a concise overview and highlight the features that can help to categorize it. This list is not exhaustive, and if you think we have missed some important use case please consider contributing to it.</t>
      <section anchor="industrial-communication-protocols">
        <name>Industrial communication protocols</name>
        <t>Several industrial communication protocols, traditionally do not use IP network infrastructure, are progressively being updated to make use of standard IP network infrastructure hence rely on standard security mechanisms, like for example TLS 1.3 <xref target="RFC8446"/>.</t>
        <t>The protocol 'Building Automation and Control Networks / Secure Connect' (BACnet/SC) <xref target="ANSI_ASHRAE.Standard.135-2016"/> is a good example. BACnet was defined before 1995, when the TCP/IP protocol suite was expensive and not available for smaller devices common in building automation. BACnet/SC proposes a new datalink layer option that makes full use of TLS secured WebSocket connections. This new BACnet/SC datalink layer option uses a virtual hub-and-spoke topology where the spokes are WebSocket connections from the nodes to the hub.</t>
        <t>BACnet/SC's implementation adheres to established industry standards defined in IETF RFCs. Specifically the <xref target="Addendum.bj.to.ANSI_ASHRAE.Standard.135-2016"/> references to text encoding of PKIX, PKCS, and CMS structures in <xref target="RFC7468"/>, when defining the format in which operational certificates and signing CA should be installed onto the target device at configuration time.</t>
        <t>The security of the BACnet/SC protocol, as well as of similar industrial protocols, relies on TLS 1.3 <xref target="RFC8446"/>, therefore implications of post-quantum cryptography have to be considered in both the TLS handshake and in the X.509 certificates used for the authentication.</t>
        <t>Lifetime: Long-lived.</t>
        <t>Protocol: Active Negotiation.</t>
        <t>Backward compatibility: Limited.</t>
      </section>
      <section anchor="software-and-firmware-update">
        <name>Software and Firmware update</name>
        <t>Secure firmware updates are crucial for ensuring long-term security of the device, especially in industrial, and critical infrastructure fields, where devices can stay active for decades. Such updates encompass tasks like introducing new trust anchors and upgrading cryptographic algorithm capabilities. However, upgrading every device's security capabilities isn't always feasible due to resource, accessibility, and cost constraints. Some devices may not support secure firmware updates at all.</t>
        <t>Firmware updates are typically authenticated by the Original Equipment Manufacturer (OEM) by means of a digital signing process. An update is distributed to target devices, which will validate its signature against a Trust Anchor (TA). The TA can be an X.509 certificate, a public key, or a hash of a combination of both, depending on the OEM's security measures.</t>
        <t>These devices are typically deployed in highly regulated environments, in remote or physically constrained locations where performing upgrades is challenging, or in cases where the cost of upgrading is prohibitively high. The immutability of these devices can also be viewed as a security feature, as it restricts potential attack vectors associated with over-the-air updates. These devices are designed with a long operational lifetime in mind, often spanning several decades. Notable examples of such devices encompass:</t>
        <ul spacing="normal">
          <li>
            <t>Vehicles - scale of deployment or vehicle recall difficulties.</t>
          </li>
          <li>
            <t>Satellites - no 'on-site' service reasonably possible.</t>
          </li>
          <li>
            <t>Servers and network devices - air-gapped, locked-down DCs, geographically distributed.</t>
          </li>
          <li>
            <t>Government infrastructure - power grids, nuclear power station equipment, etc.</t>
          </li>
          <li>
            <t>Smart meters - device owned by the utility company, deployed in private homes.</t>
          </li>
          <li>
            <t>Smart cards – used for authenticating to workstations and buildings, or electronic document signing.</t>
          </li>
          <li>
            <t>Security Tokens – such as FIDO2, cheap devices that users will typically not patch.</t>
          </li>
        </ul>
        <t>Lifetime: Long-lived.</t>
        <t>Protocol: Passive Negotiation.</t>
        <t>Backward compatibility: Limited.</t>
      </section>
      <section anchor="trust-anchor-deployment">
        <name>Trust Anchor deployment</name>
        <t>Trust Anchors, such as X.509 Root CA certificates and raw public keys, must be made accessible before they can be used for signature validation. In scenarios like remote software updates, a Trust Anchor X.509 certificate, for instance, must be installed on a target device to enable the validation of certificate chains. While deployment of Trust Anchors may be relatively straightforward for "corporate IT" and "public web" applications, it can still be a time-consuming process to ensure that a new Trust Anchor X.509 certificate is propagated throughout the entire ecosystem. Additionally, when dealing with post-quantum Trust Anchors, an extra layer of complexity arises as the desired underlying cryptography may not yet be supported by the target platform.</t>
        <t>There are two common variations of this use case.</t>
        <ul spacing="normal">
          <li>
            <t>Injection within a factory: in industrial contexts, Trust Anchors are typically injected into target devices during the manufacturing phase. To bootstrap a Trust Anchor, the device is placed in a physically secure environment accessible only to trusted personnel. This injection can occur during manufacturing or when a device is being resold. It is important to note that some devices might not support updating the Trust Anchor in the field, requiring the return of the device to the OEM for post-quantum Trust Anchor injection or, in some cases, it may be even not supported at all, because, for example, the Trust Anchor is burnt onto the device at manufacturing time.</t>
          </li>
          <li>
            <t>Injection via software and firmware updates: for devices where the Trust Anchor is not burned onto the device, for example in less constrained devices and IT equipment, post-quantum Trust Anchors can be injected through software or firmware update mechanisms. The deployment of these Trust Anchors may leverage existing update mechanisms and traditional cryptography to minimize effort. However, this approach necessitates the distribution of the new Trust Anchors well in advance of any suspicion that traditional cryptography may become vulnerable. Given the lead time required to ensure widespread distribution, the time window where this mechanism is suitable is further reduced.</t>
          </li>
        </ul>
        <t>Lifetime: Long-lived.</t>
        <t>Protocol: Passive Negotiation.</t>
        <t>Backward compatibility: Limited.</t>
      </section>
      <section anchor="cms">
        <name>CMS (S/MIME)</name>
        <t>The Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> establishes a standard syntax for creating secure messages, incorporating digital signatures, encryption, and authentication codes.
In practical terms, CMS finds application in scenarios such as secure email communication, document signing, and PKI-based security services. Organizations use CMS for secure file transfers and end-to-end encryption of documents, ensuring confidentiality and integrity.
It is a key component in secure messaging protocols, contributing to the confidentiality, integrity, and authenticity of communication over networks. One of the notable features of CMS is flexibility, allowing the choice of cryptographic algorithms based on specific security requirements.
An important consideration to be made is the non-uniform adoption and potential challenges in implementing CMS, particularly in the context of email clients. Varying levels of maturity and maintenance among email clients will slow down the adoption of post-quantum algorithms, which will not be uniform across different clients.</t>
        <t>It is worth noting that, similarly to CMS, JOSE and (JSON Object Signing and Encryption) and COSE (CBOR Object Signing and Encryption) are data structures used to support signing and encryption of data, respectively, in JSON and CBOR format. Therefore, several considerations that are applicable for CMS will extend to JOSE and COSE as well.</t>
        <t>Lifetime: Short-lived and long-lived.</t>
        <t>Protocol: Passive Negotiation.</t>
        <t>Backward compatibility: Mandatory.</t>
      </section>
      <section anchor="timestamping">
        <name>Timestamping</name>
        <t>A time-stamping service supports assertions of proof that a datum existed before a particular time, as defined in <xref target="RFC3161"/>.
Timestamps, are particularly important in the following scenarios.</t>
        <ul spacing="normal">
          <li>
            <t>Code and Document Signing: In code and document signing use cases, timestamps play a critical role in ensuring the ongoing validity of digital signatures. It is not sufficient to validate the signature at the time of creation; it must be verifiable even after the signature certificate has expired. This is particularly important for long-term archival and verification purposes, where the historical integrity of the signed code or document needs to be maintained over time. The timestamp is stored in a CMS data structure, cf. <xref target="cms"/>.</t>
          </li>
          <li>
            <t>Non-repudiation: timestamps enhance non-repudiation by preventing parties from later denying the authenticity or validity of their digital signatures. Non-repudiation plays a major role in Legal and regulatory compliance, Intellectual property protection and Electronic commerce, where the reliability of timestamps is key for establishing clear timelines with legal and financial implications.</t>
          </li>
        </ul>
        <t>Lifetime: Long-lived.</t>
        <t>Protocol: Passive Negotiation.</t>
        <t>Backward compatibility: Optional.</t>
        <!--
## OAuth
TODO

## SUIT Manifest
TODO
-->

</section>
      <section anchor="additional-use-cases">
        <name>Additional use cases</name>
        <t>Future updates of this document may include use cases which cover additional aspects, such as FAA airworthiness certifications, medical records, etc.</t>
      </section>
    </section>
    <section anchor="post-quantum-migration-strategies-for-signing">
      <name>Post-quantum Migration Strategies for Signing</name>
      <t>People are considering which technological concepts are suitable to solve the problem of a secure migration from classical cryptography to quantum computer safe cryptographic algorithms. A variety of approaches are being discussed. In the following, we would like to briefly introduce the approaches under discussion and refer to the respective relevant documents for further details.
For a general introduction, we also refer to <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <section anchor="multiple-signatures">
        <name>Multiple Signatures</name>
        <t>Several signatures have the approach of defining a second alternative signature in addition to the primary signature in the protocol or format, which can be transported in the protocol or format. In addition to the definition of the alternative signature, the associated signing algorithm and, if applicable, the associated public key or a reference to it must also be transferred. For X.509 public key certificates, this is defined in <xref target="X.509"/>. Work is also underway for other protocols and formats. This approach overlaps with the protocol and format extension approach described in <xref target="protocols"/>.</t>
        <t>An alternative approach is to encode a second signature in a second certificate and bind it to the first one by a reference. For example, an implementation can decide based on its policy whether only the first certificate or the second or both certificates should be used for authentication. Further descriptions of this approach can be found in A Mechanism for Encoding Differences in Paired Certificates <xref target="I-D.bonnell-lamps-chameleon-certs"/> and Related Certificates for Use in Multiple Authentications within a Protocol <xref target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>.</t>
      </section>
      <section anchor="composite-signatures">
        <name>Composite Signatures</name>
        <t>The goal of composite signatures is to define a signature object to be used with any protocol or format. It contains two signatures in a single atomic container that have been generated using two different cryptographic algorithms. The goal of this approach is to define a signature format which requires both contained signatures to be verified.  In this way, the security properties of the classical signature and another signature that is secure when attacked by a quantum computer are used in the protocol or format without having to adapt them.</t>
        <t>In order for this approach to be applicable in arbitrary protocols and formats, a composite key must be defined in addition to the composite signature. According to the definition of composite signatures, a composite public is a single atomic container composed of two public keys. The associated composite private key is a single atomic private key that is composed of the two private keys which correspond to the two public keys contained in the composite public key.</t>
        <t>This concept is described in Composite Signatures For Use In Internet PKI <xref target="I-D.draft-ietf-lamps-pq-composite-sigs"/> in more detail.</t>
      </section>
      <section anchor="employing-stateful-hash-based-signature-schemes">
        <name>Employing Stateful Hash-based Signature Schemes</name>
        <t>Stateful hash-based signature (HBS) schemes, such as XMSS <xref target="RFC8391"/> and LMS <xref target="RFC8554"/>, including their multi-tree variants, have been the first post-quantum algorithms to be standardized by NIST in <xref target="NIST.SP.800-208"/>.
Stateful HBS algorithms offer better key and signature sizes than stateless HBS algorithms, and the underlying cryptographic building blocks are generally considered well-understood. However, a critical consideration is the management of state, which is a fundamental aspect of security. The absence of standardized operating procedures for state management poses challenges to the adoption of stateful HBS. This is especially critical when signing data over extended periods using the same key pair; i.e., the resulting signatures will be validated with the same public key over a long period of time.
Another aspect worth considering is that, without solutions for hardware security module replacements and disaster recovery scenarios, using stateful HBS might lead to a solution with limited resilience.</t>
      </section>
      <section anchor="employing-stateless-hash-based-signature-schemes">
        <name>Employing Stateless Hash-based Signature Schemes</name>
        <t><xref target="NIST.FIPS.205"/> specifies the SLH-DSA (SPHINCS+) algorithm.  It is a stateless hash-based signature algorithm and is considered safe against attacks by quantum computers.  The advantage of this algorithm is that the state problem is resolved as part of the algorithm.  However, the tradeoff is that signature sizes are often an order of magnitude larger than XMSS or LMS.  This may make deploying these algorithms on constrained devices infeasible.</t>
      </section>
      <section anchor="employing-module-lattice-based-digital-signature-schemes">
        <name>Employing Module-Lattice-Based Digital Signature Schemes</name>
        <t><xref target="NIST.FIPS.204"/> specifies the ML-DSA (Dilithium) algorithm, a digital signature algorithm based on the hardness of lattice problems over module lattices. It serves as a general purpose post-quantum signature algorithm, offering smaller key sizes in comparison to SLH-DSA and fast signature generation. For more details, refer to <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
      <section anchor="protocols">
        <name>Cryptographic Agility</name>
        <t>Migration to post-quantum cryptographic algorithms can be regarded as an instance of the general pattern of <em>cryptographic agility</em>, rather than be viewed as a special, one-off event. A system that approaches migration this way can undergo multiple transitions without requiring major architectural changes. Thus, when planning the transition to post-quantum cryptography, consider that when future cryptanalysis will trigger a transition to <em>post-post-quantum</em> cryptography, it is better to be agile than to start from scratch.</t>
        <t>Hohm et al. identified circa 30 interpretations of the term "cryptographic agility" in their literature survey <xref target="CAMM"/>, therefore referring to agility without defining it brings the potential of being misunderstood. In this document, we encourage readers to reason about agility by relying on these guiding questions:</t>
        <ol spacing="normal" type="1"><li>
            <t>Can one <strong>select</strong> algorithms based on a specific context?</t>
          </li>
          <li>
            <t>Can one <strong>add</strong> new cryptographic primitives or parameters?</t>
          </li>
          <li>
            <t>Can obsolete crypto be <strong>retired</strong>?</t>
          </li>
        </ol>
        <t>System and protocol designers can adjust the definition for their particular context, while ensuring that the adjusted definition is clearly stated, to avoid ambiguities.</t>
        <t>Agility in security protocols and message formats, such as IP Security (IPsec) and Internet Key Exchange (IKE) <xref target="RFC6071"/>, Transport Layer Security (TLS)<xref target="RFC8446"/>, Secure/Multipurpose Internet Mail Extensions (S/MIME)<xref target="RFC8551"/>, is understood as the dynamic referencing of the algorithms to be used - the "select" component above. A migration strategy that allows the existing and future cryptographic algorithms to be used simultaneously during a transition period (the "add" part) is not described in the respective standards.</t>
        <t>Revised versions of standards would be needed to integrate agility into protocols and formats. This requires effort for standardization and implementation if a basic functionality, such as multiple signatures, e.g., in Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>, is not already available. But even in the case of S/MIME and CMS, profiling is still necessary to describe how the multiple signatures are to be used specifically for the migration.</t>
      </section>
    </section>
    <section anchor="map-of-migration-strategies-to-reference-use-cases">
      <name>Map of Migration Strategies to Reference Use Cases</name>
      <t>In this section, we establish a mapping between the reference use cases and their primary features, as summarized in the table below, and the digital signature migration strategies identified in the preceding section.</t>
      <table>
        <name>Summary of use cases and main features</name>
        <thead>
          <tr>
            <th align="left">Use Case</th>
            <th align="left">Lifetime</th>
            <th align="left">Protocol</th>
            <th align="left">Backward Compatibility</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Industrial communication protocols</td>
            <td align="left">Long-lived</td>
            <td align="left">Active Negotiation</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Software and Firmware update</td>
            <td align="left">Long-lived</td>
            <td align="left">Passive Negotiation</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Trust Anchor deployment</td>
            <td align="left">Long-lived</td>
            <td align="left">Passive Negotiation</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">CMS (S/MIME)</td>
            <td align="left">Short-lived and Long-lived</td>
            <td align="left">Passive Negotiation</td>
            <td align="left">Mandatory</td>
          </tr>
          <tr>
            <td align="left">Timestamping</td>
            <td align="left">Long-lived</td>
            <td align="left">Passive Negotiation</td>
            <td align="left">Optional</td>
          </tr>
        </tbody>
      </table>
      <t>The map is constructed as a decision tree, which is available at: <eref target="https://github.com/avaira77/pq-ietf-usecase/tree/main/decision-tree">https://github.com/avaira77/pq-ietf-usecase/tree/main/decision-tree</eref>.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document should not affect the security of the Internet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IEEE.802.1AR-2018">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date month="July" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2018.8423794"/>
          <seriesInfo name="ISBN" value="[&quot;9781504450195&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC4998">
          <front>
            <title>Evidence Record Syntax (ERS)</title>
            <author fullname="T. Gondrom" initials="T." surname="Gondrom"/>
            <author fullname="R. Brandner" initials="R." surname="Brandner"/>
            <author fullname="U. Pordesch" initials="U." surname="Pordesch"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>In many scenarios, users must be able prove the existence and integrity of data, including digitally signed data, in a common and reproducible way over a long and possibly undetermined period of time. This document specifies the syntax and processing of an Evidence Record, a structure designed to support long-term non-repudiation of existence of data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4998"/>
          <seriesInfo name="DOI" value="10.17487/RFC4998"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   The presence of a Cryptographically Relevant Quantum Computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, since the assumptions about the
   intractability of the mathematical problems for these algorithms that
   offer confident levels of security today no longer apply in the
   presence of a CRQC.  This means there is a requirement to update
   protocols and infrastructure to use post-quantum algorithms, which
   are public-key algorithms designed to be secure against CRQCs as well
   as classical computers.  These new public-key algorithms behave
   similarly to previous public key algorithms, however the intractable
   mathematical problems have been carefully chosen so they are hard for
   CRQCs as well as classical computers.  This document explains why
   engineers need to be aware of and understand post-quantum
   cryptography.  It emphasizes the potential impact of CRQCs on current
   cryptographic systems and the need to transition to post-quantum
   algorithms to ensure long-term security.  The most important thing to
   understand is that this transition is not like previous transitions
   from DES to AES or from SHA-1 to SHA-2.  While drop-in replacement
   may be possible in some cases, others will require protocol re-design
   to accommodate significant differences in behavior between the new
   post-quantum algorithms and the classical algorithms that they are
   replacing.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-04"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-03"/>
        </reference>
        <reference anchor="NIST.SP.800-208" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author fullname="David A. Cooper" surname="Cooper">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel C. Apon" surname="Apon">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Quynh H. Dang" surname="Dang">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael S. Davidson" surname="Davidson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Morris J. Dworkin" surname="Dworkin">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carl A. Miller" surname="Miller">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="29" month="October" year="2020"/>
            <abstract>
              <t>This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the Leighton-Micali Signature (LMS) system and the eXtended Merkle Signature Scheme (XMSS), along with their multi-tree variants, the Hierarchical Signature System (HSS) and multi-tree XMSS (XMSSMT).</t>
            </abstract>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="800-208"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-208"/>
        </reference>
        <reference anchor="NIST.FIPS.186-5" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author fullname="Dustin Moody" surname="Moody">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="NIST Federal Information Processing Standards Publications" value="186-5"/>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.186-5"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC6071">
          <front>
            <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
            <author fullname="S. Frankel" initials="S." surname="Frankel"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
              <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
              <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6071"/>
          <seriesInfo name="DOI" value="10.17487/RFC6071"/>
        </reference>
        <reference anchor="RFC8551">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8551"/>
          <seriesInfo name="DOI" value="10.17487/RFC8551"/>
        </reference>
        <reference anchor="I-D.draft-ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="6" month="June" year="2024"/>
            <abstract>
              <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-01"/>
        </reference>
        <reference anchor="I-D.bonnell-lamps-chameleon-certs">
          <front>
            <title>A Mechanism for Encoding Differences in Paired Certificates</title>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="D. Hook" initials="D." surname="Hook">
              <organization>KeyFactor</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <date day="2" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a method to efficiently convey the
   differences between two certificates in an X.509 version 3 extension.
   This method allows a relying party to extract information sufficient
   to construct the paired certificate and perform certification path
   validation using the constructed certificate.  In particular, this
   method is especially useful as part of a key or signature algorithm
   migration, where subjects may be issued multiple certificates
   containing different public keys or signed with different CA private
   keys or signature algorithms.  This method does not require any
   changes to the certification path validation algorithm as described
   in RFC 5280.  Additionally, this method does not violate the
   constraints of serial number uniqueness for certificates issued by a
   single certification authority.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonnell-lamps-chameleon-certs-04"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-05"/>
        </reference>
        <reference anchor="ANSI_ASHRAE.Standard.135-2016" target="https://webstore.ansi.org/standards/ashrae/ansiashraestandard1352016">
          <front>
            <title>BACnetTM A Data Communication Protocol For Building Automation And Control Network</title>
            <author>
              <organization>American National Standards Institute (ANSI)</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="ANSI" value="Standard 135-2016"/>
        </reference>
        <reference anchor="Addendum.bj.to.ANSI_ASHRAE.Standard.135-2016" target="https://www.ashrae.org/File%20Library/Technical%20Resources/Standards%20and%20Guidelines/Standards%20Addenda/135_2016_bj_20191118.pdf">
          <front>
            <title>Addendum bj to BACnetTM A Data Communication Protocol For Building Automation And Control Network</title>
            <author>
              <organization>American National Standards Institute (ANSI)</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="ANSI" value="Addendum bj to Standard 135-2016"/>
        </reference>
        <reference anchor="bsi.quantum-safe.crypto" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf?__blob=publicationFile&amp;v=4">
          <front>
            <title>Quantum-safe cryptography – fundamentals, current developments and recommendations</title>
            <author>
              <organization>Bundesamt fuer Sicherheit in der Informationstechnik</organization>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="BSI" value="Recommendations for action by the BSI"/>
        </reference>
        <reference anchor="entrust.composite-pki" target="https://www.entrust.com/newsroom/press-releases/2024/entrust-introduces-first-commercially-available-post-quantum-ready-pki-platform">
          <front>
            <title>Entrust introduces first commerically available post quantum ready pki platform</title>
            <author>
              <organization>Entrust</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="CNSA2-0" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
          <front>
            <title>Announcing the Commercial National Security Algorithm Suite 2.0</title>
            <author>
              <organization>National Security Agency (NSA)</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="Dilithium.des.team" target="https://pq-crystals.org/dilithium/">
          <front>
            <title>CRYSTALS-Dilithium design team web page</title>
            <author>
              <organization>CRYSTALS-Dilithium design team</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="Google.Sec.Blog" target="https://security.googleblog.com/2023/08/toward-quantum-resilient-security-keys.html?m=1">
          <front>
            <title>Toward Quantum Resilient Security Keys</title>
            <author>
              <organization>Google</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="Hybrid.pqc.sig.hsk" target="https://doi.org/10.1007/978-3-031-41181-6_26">
          <front>
            <title>Hybrid Post-quantum Signatures in Hardware Security Keys</title>
            <author initials="D." surname="Ghinea" fullname="Diana Ghinea">
              <organization/>
            </author>
            <author initials="F." surname="Kaczmarczyck" fullname="Fabian Kaczmarczyck">
              <organization/>
            </author>
            <author initials="J." surname="Pullman" fullname="Jennifer Pullman">
              <organization/>
            </author>
            <author initials="J." surname="Cretin" fullname="Julien Cretin">
              <organization/>
            </author>
            <author initials="S." surname="Koebl" fullname="Stefan Koebl">
              <organization/>
            </author>
            <author initials="R." surname="Misoczki" fullname="Rafael Misoczki">
              <organization/>
            </author>
            <author initials="J.-M." surname="Picod" fullname="Jean-Michel Picod">
              <organization/>
            </author>
            <author initials="L." surname="Invernizzi" fullname="Luca Invernizzi">
              <organization/>
            </author>
            <author initials="E." surname="Bursztein" fullname="Elie Bursztein">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="NIST.FIPS.204" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204 (Initial Public Draft)"/>
        </reference>
        <reference anchor="NIST.FIPS.205" target="https://csrc.nist.gov/pubs/fips/205/ipd">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 205 (Initial Public Draft)"/>
        </reference>
        <reference anchor="NIST.SP.800-57.P1R5" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">
          <front>
            <title>Recommendation for Key Management: Part 1 – General</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2020"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-57"/>
        </reference>
        <reference anchor="X.509">
          <front>
            <title>Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2019"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.509"/>
        </reference>
        <reference anchor="CAMM" target="http://arxiv.org/abs/2202.07645">
          <front>
            <title>Towards a maturity model for crypto-agility assessment</title>
            <author initials="J." surname="Hohm" fullname="Julian Hohm">
              <organization/>
            </author>
            <author initials="A." surname="Heinemann" fullname="Andreas Heinemann">
              <organization/>
            </author>
            <author initials="A." surname="Wiesmaier" fullname="Alexander Wiesmaier">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 429?>

<section anchor="post-quantum-migration-properties">
      <name>Post-Quantum Migration Properties</name>
      <t>This section aims to establish a collection of characteristics for categorizing the use cases outlined in <xref target="sec-usecases"/>. The objective is to enhance the document's utility by providing a framework for classifying use cases not explicitly addressed here. For instance, implementors can categorize their own use case and subsequently identify a similar one in this document based on shared properties/classification.</t>
      <section anchor="lifetime">
        <name>Lifetime</name>
        <t>This classification distinguishes between short-lived and long-lived use cases. However, in practical terms, this distinction is challenging due to the nature of each use case's lifespan, which can be on a spectrum.</t>
        <ol spacing="normal" type="1"><li>
            <t>Short-lived: In this context, a short-lived use case is characterized by a duration of less than 5 years. This timeframe aligns with common organizational practices, where hardware, for example servers in a data center, is typically replaced within a 5-year cycle.</t>
          </li>
          <li>
            <t>Long-lived: In the context of this document, a long-lived use case spans more than 10 years. While there isn't a specific rationale for this timeframe, it is noteworthy that cryptographic recommendations, for example <xref target="NIST.SP.800-57.P1R5"/>, often provide guidance for a duration of up to ten years from the time of their publication.</t>
          </li>
        </ol>
      </section>
      <section anchor="protocol">
        <name>Protocol</name>
        <t>Cryptographic protocols can be divided in Active Negotiation (real-time cryptography), Passive Negotiation (asynchronous cryptography), and Non Agile (no graceful migration).</t>
        <ol spacing="normal" type="1"><li>
            <t>Active Negotiation: Protocols with existing mechanisms for real-time cryptographic negotiation such as TLS and IKE already contain mechanisms for upgraded clients to downgrade the cryptography in a given session in order to communicate with a legacy peer. These protocols provide the easiest migration path as these mechanisms should be used to bridge across traditional and post-quantum cryptography.</t>
          </li>
          <li>
            <t>Passive Negotiation: Protocols with existing mechanisms for non-real-time or asynchronous cryptographic negotiation. For example a PKI end entity who publishes multiple encryption certificates for themselves, each containing a public key for a different algorithm, or code signing object carrying multiple signatures on different algorithms.</t>
          </li>
          <li>
            <t>Non-agile: no graceful migration is possible; the community decides that as of a certain date legacy clients will no longer be able to interoperate with upgraded clients.</t>
          </li>
        </ol>
      </section>
      <section anchor="backward-compatibility">
        <name>Backward compatibility</name>
        <t>The following scenarios may arise:</t>
        <ol spacing="normal" type="1"><li>
            <t>Optional: Backward compatibility isn't needed, either because post-quantum migration is unnecessary or already addressed within a specific protocol.</t>
          </li>
          <li>
            <t>Limited: Backward compatibility is necessary for a defined period, such as during a migration time window.</t>
          </li>
          <li>
            <t>Mandatory: Backward compatibility is essential throughout the use case's entire lifespan due to the absence of identifiable migration strategies.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="composite-signature-individual-and-organization-position-statements">
      <name>Composite Signature individual and organization position statements</name>
      <ol spacing="normal" type="1"><li>
          <t>BSI - The document <xref target="bsi.quantum-safe.crypto"/> recommends requiring that PQC lattice schemes only be used within a PQ/T hybrid.  More specifically this document includes the following recommendation:  </t>
          <t>
"Therefore, quantum computer-resistant methods should not be used alone - at least in a transitional period - but only in hybrid mode, i.e. in combination with a classical method. For this purpose, protocols must be modified or supplemented accordingly. In addition, public key infrastructures, for example, must also be adapted"  </t>
          <t>
Also Stavros Kousidis from BSI says: "from a strategic point of view we don’t want to replace our current RSA algorithm with standalone Dilithium since: If Dilithium does not withstand cryptanalysis in the future then all our efforts are for nothing. With a composite signature Dilithium+ECDSA in AND-mode we can buy ourselves some time in case the Dilithium security guarantees do not withstand future cryptanalysis."</t>
        </li>
        <li>
          <t>Google: according to <xref target="Google.Sec.Blog"/>: "Relying on a hybrid signature is critical as the security of Dilithium and other recently standardized quantum resistant algorithms haven’t yet stood the test of time and recent attacks on Rainbow (another quantum resilient algorithm) demonstrate the need for caution. This cautiousness is particularly warranted for security keys as most can’t be upgraded – although we are working toward it for OpenSK. The hybrid approach is also used in other post-quantum efforts like Chrome’s support for TLS".</t>
        </li>
        <li>
          <t>Entrust: During the transition to post-quantum cryptography, there will be uncertainty as to the strength of cryptographic algorithms; we will no longer fully trust traditional cryptography such as RSA, Diffie-Hellman, DSA and their elliptic curve variants, but we will also not fully trust their post-quantum replacements until they have had sufficient scrutiny and time to discover and fix implementation bugs. Unlike previous cryptographic algorithm migrations, the choice of when to migrate and which algorithms to migrate to, is not so clear.  Even after the migration period, it may be advantageous for an entity's cryptographic identity to be composed of multiple public-key algorithms.
In 2024 Entrust added support for composite signatures in PKI infrastructure (<xref target="entrust.composite-pki"/>):  </t>
          <t>
"With this launch, the company’s cloud-based PKI as a Service offering now can provide both composite and pure quantum-safe certificate authority hierarchies, enabling customers to test or implement quantum-safe scenarios and infrastructure."</t>
        </li>
        <li>
          <t>Robert Hulshof: "The rationale behind combined keys is that I can see an important use-case for very sensitive data (government, financial or other high value data) to combine multiple (PQ) key algorithms, and that this migration to PQ is a good time to start supporting that by default in the crypto libraries.
Trying to estimate the probability that a NIST standardized Crypto algorithm gets broken in the next 5-10 years is very difficult. However I assume that everybody agrees that this probability is definitely not zero. Personally I would put that probability somewhere in the range of 0.1% – 1%.
If I were the government/bank etc. I would not like to have a 1% risk that all my secrets get exposed. Adding one or two more PQ algorithms would reduce that probability to 1 in 5 million or 1 in a Billion would be much more acceptable."</t>
        </li>
        <li>
          <t>MTG - Falko Strenzke: "Without hybrid signatures, a decision to move away from traditional signatures to Dilithium (or other non-hash-based signatures) has a certain risk to make things worse and I think many decision makers will not be ready to take the responsibility for it until the quantum computer threat becomes imminent. If composite signature is not standardised, non-composite hybrids would be left. This implies protocol changes which will:
          </t>
          <ol spacing="normal" type="1"><li>
              <t>need more discussion,</t>
            </li>
            <li>
              <t>need more changes to existing applications,</t>
            </li>
            <li>
              <t>and thus be more bug prone.</t>
            </li>
            <li>
              <t>Not having hybrid signatures at all will likely cause many decision makers to</t>
            </li>
            <li>
              <t>use hash-based schemes where possible / affordable</t>
            </li>
            <li>
              <t>and elsewhere stick to traditional schemes as long as possible, thus effectively delaying the migration to PQC."</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Transmute - Orie Steele: "There are use cases for long lived verifiable credentials, and attribute cert like stuff we work on in supply chain, with DHS / CBP."</t>
        </li>
        <li>
          <t>CRYSTALS-Dilithium design team states in <xref target="Dilithium.des.team"/> that: “For users who are interested in using Dilithium, we recommend the following: Use Dilithium in a so-called hybrid mode in combination with an established "pre-quantum" signature scheme.”</t>
        </li>
        <li>
          <t>Hybrid Post-Quantum Signatures in Hardware Security Keys: the paper <xref target="Hybrid.pqc.sig.hsk"/> describes a hybrid signature scheme. Below an excerpt from it:
“A hybrid signature scheme combines a classical signature algorithm with a post-quantum secure signature algorithm. Before discussing the design of our hybrid scheme, we explain why such an approach is relevant instead of simply replacing classically secure schemes with post-quantum secure schemes. We present the assumptions below:
          </t>
          <ol spacing="normal" type="1"><li>
              <t>Cryptographically-Relevant Quantum Computers (i.e. with enough qubits to break ECDSA) are not available yet.</t>
            </li>
            <li>
              <t>Classical signature algorithms withstands attacks from classical computers.</t>
            </li>
            <li>
              <t>The post-quantum secure signature algorithm might be breakable by classical computers due to design or implementation bugs.
If any of these assumptions fails, using a hybrid approach instead of replacing classical schemes with post-quantum schemes indeed does not add any security. We believe that all of these assumptions are currently correct. The third assumption is motivated by a newly discovered attack against Rainbow, one of the NIST standardization finalists.
We can now discuss the informal requirements a hybrid scheme H should satisfy:</t>
            </li>
            <li>
              <t>If a quantum computer becomes available, and hence H’s underlying classical scheme is broken, H should maintain the security of its underlying post-quantum scheme.</t>
            </li>
            <li>
              <t>If a classical attack for H’s underlying post-quantum secure scheme is discovered, H should maintain the security of its underlying classical scheme."</t>
            </li>
          </ol>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft would not be possible without the support of a great number of contributors.   We thank Stavros Kousidis, Robert Hulshof, Falko Strenzke and Orie Steele for allowing us to use their statements regarding composite signatures.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
