<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-pquip-pqc-hsm-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Adapting HSMs for PQC">Adapting HSMs for Post-Quantum Cryptography</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-pquip-pqc-hsm-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Ben Salter">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>ben.s3@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2025" month="February" day="28"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>PQC</keyword>
    <keyword>HSM</keyword>
    <abstract>
      <?line 76?>

<t>Hardware Security Modules (HSMs) play a critical role in securing cryptographic operations, including the adoption of Post-Quantum
Cryptography (PQC). This document examines the use of seed-based key generation in HSMs, which reduces storage requirements but increases
computational overhead for key derivation. It explores trade-offs between storage efficiency and performance, addressing challenges in
ephemeral key handling and optimization strategies for PQC signature algorithms. It also discusses PQC impacts to HSM firmware updates and
backup.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-pquip-pqc-hsm/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        pquip Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 85?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The transition to post-quantum cryptography (PQC) introduces new challenges for cryptographic key management, particularly within constrained Hardware Security Modules (HSMs). Unlike high-performance, rack-mounted HSMs, constrained HSMs operate with limited memory, storage, and computational resources, making the adoption of PQC algorithms more challenging. The increased key sizes and computational demands of PQC require careful consideration to ensure secure and efficient key management within these constrained environments.</t>
      <t>This document provides industry guidance and best practices for integrating PQC algorithms into constrained HSMs. It explores key storage strategies, ephemeral key management, and performance optimizations specific to resource-limited environments. One approach to mitigating storage constraints is seed-based key generation, where only a small seed is stored instead of the full private key, as supported by PQC schemes like ML-DSA and SLH-DSA. However, this technique increases computational overhead due to the need to derive full private keys on demand. The document also discusses considerations for ephemeral key generation in protocols like TLS and IPsec, along with techniques to optimize PQC signature operations to enhance performance within constrained HSMs.</t>
      <t>This document focuses on the use of PQC algorithms in HSMs, specifically the three algorithms finalized by NIST: ML-DSA, ML-KEM, and SLH-DSA. While other PQC algorithms, such as stateful hash-based signatures, also provide post-quantum security, they are not covered in this version of the document. Future revisions may expand the scope to include additional PQC algorithms.</t>
    </section>
    <section anchor="key-management-in-hsms-for-pqc">
      <name>Key Management in HSMs for PQC</name>
      <t>One mitigation of storage limitations is to store only the seed rather than the full expanded private key, as the seed is far smaller and can derive the expanded private key as necessary.</t>
      <section anchor="Seed">
        <name>Seed Management</name>
        <t>The seed generated during the PQC key generation function is highly sensitive, as it will be used to compute the private key or decapsulation key. Consequently, seeds must be treated with the same level of security as private keys.</t>
        <t>To comply with <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, <xref target="SLH-DSA"/> and <xref target="REC-KEM"/> guidelines:</t>
        <section anchor="seed-storage">
          <name>Seed Storage</name>
          <t>Seeds must be securely stored within a cryptographic module, such as a Hardware Security Module (HSM), to ensure protection against unauthorized access. Since the seed can be used to compute the private key, it must be safeguarded with the same level of protection as the private key itself. For example, according to <xref target="ML-DSA"/> Section 3.6.3, the seed <tt>ξ</tt> generated during <tt>ML-DSA.KeyGen</tt> can be stored for later expansion using <tt>ML-DSA.KeyGen_internal</tt>.</t>
          <t>The choice between storing a seed or an expanded private key involves trade-offs between storage efficiency and performance. Some constrained HSMs may store only the seed and derive the expanded private key on demand, whereas others may prefer storing the full expanded key to reduce computational overhead during key usage.</t>
          <t>While vulnerabilities like the "Unbindable Kemmy Schmidt" attack <xref target="BIND"/> demonstrate the risks of manipulating expanded private keys in certain non-HSM environments, these attacks generally assume an adversary has some level of control over the expanded key format. However, in a HSM environment, where private keys are typically protected from such manipulation, the primary motivation for storing the seed rather than the expanded key is not directly tied to mitigating "Kemmy" attacks.</t>
          <t>The ML-DSA and ML-KEM private key formats, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-kyber-certificates"/>, represent the private key using a seed from which the expanded private key is derived. While these formats rely on the seed for key generation, an HSM may choose to store the expanded private key to avoid the additional computation required for running KeyGen. HSM implementations must also consider compatibility with existing standards such as PKCS#11.</t>
          <t>This choice between storing the seed or the expanded private key has direct implications on performance, as key derivation incurs additional computation. The impact of this overhead varies depending on the algorithm. For instance, ML-DSA key generation, which primarily involves polynomial operations using the Number Theoretic Transform (NTT) and hashing, is computationally efficient. In contrast, SLH-DSA key generation requires constructing a Merkle tree and multiple calls to Winternitz One-Time Signature (WOTS+) key generation, making it significantly slower due to the recursive hash computations involved. HSM designers must carefully balance storage efficiency and computational overhead based on system requirements and operational constraints. While HSMs employ various key storage strategies, the decision to store full private keys or only seeds depends on design goals, performance considerations, and standards compliance.</t>
          <t>A key challenge arises when importing an existing private key into a system designed to store only seeds. When a user attempts to import an already expanded private key, there is a mismatch between the key format used internally (seed-based) and the expanded private key. This issue arises because the internal format is designed for efficient key storage by deriving the private key from the seed, while the expanded private key is already fully computed. As NIST has not defined a single private key format for PQC algorithms, this creates a potential gap in interoperability.</t>
          <t>If the seed is not securely stored at the time of key generation, it is permanently lost because the process of deriving an expanded key from the seed relies on a one-way cryptographic function. This one-way function is designed to ensure that the expanded private key can be deterministically derived from the seed, but the reverse operation, deriving the original seed from the expanded key is computationally infeasible.</t>
        </section>
        <section anchor="efficient-key-derivation">
          <name>Efficient Key Derivation</name>
          <t>When storing only the seed in an HSM, it is crucial that the HSM is capable of deriving the private key efficiently whenever required. However, it is important to note that constantly re-deriving the private key for every cryptographic operation may introduce significant performance overhead. In scenarios where performance is a critical consideration, it may be more efficient to store the expanded private key directly instead of only the seed.</t>
          <t>The key derivation process, such as ML-KEM.KeyGen_internal for ML-KEM or similar functions for other PQC algorithms, must still be implemented in a way that can securely operate within the resource constraints of the HSM. If using the seed-only model, the derived private key should only be temporarily held in memory during the cryptographic operation and discarded immediately after use. However, storing the expanded private key may be a more practical solution in some scenarios and could be considered for optimization.</t>
        </section>
        <section anchor="secure-exporting-of-seeds">
          <name>Secure Exporting of Seeds</name>
          <t>Given the potential for hardware failures or the end-of-life of HSM devices, it is essential to plan for backup and recovery of the cryptographic seeds. HSMs should support secure seed backup mechanisms, ideally leveraging encrypted storage and ensuring that the backup data is protected from unauthorized access. In a disaster recovery scenario, the seed should be recoverable to enable the re-derivation of the private key, provided the proper security measures are in place to prevent unauthorized extraction.
   For secure exporting of seeds, PQC encryption algorithms, such as ML-KEM, should be used to encrypt the seed before export. This ensures that the seed remains protected even if the export process is vulnerable to quantum attacks. The process for secure export should include:</t>
          <ul spacing="normal">
            <li>
              <t>Encrypting the seed using a post-quantum encryption algorithm, such as ML-KEM, rather than relying on traditional encryption algorithms.</t>
            </li>
            <li>
              <t>Ensuring the exported seed is accessible only to authorized entities.</t>
            </li>
            <li>
              <t>Enforcing strict access controls and secure transport mechanisms to prevent unauthorized access during transfer.</t>
            </li>
          </ul>
          <t>Wherever possible, seed generation, storage, and usage should remain entirely within the cryptographic module. This minimizes the risk of exposure and ensures compliance with established security guidelines.</t>
        </section>
      </section>
    </section>
    <section anchor="ephemeral-key-management">
      <name>Ephemeral Key Management</name>
      <t>In protocols like TLS and IPsec, ephemeral keys are used for key exchange. Given the increased size of PQC key material, ephemeral key management will have to be optimized for both security and performance.</t>
      <t>For PQC KEMs, ephemeral key-pairs must be generated from an ephemeral seed, which needs to be securely stored temporarily and erased after use. This approach ensures that ephemeral key generation is deterministic and minimizes storage overhead in HSMs, as only the seed (not the full private key) needs to be stored. The ephemeral seed must be securely erased immediately after the key pair is generated to prevent potential leakage or misuse.</t>
      <t>Additionally, ephemeral keys should not be reused across different algorithm suites and sessions. Each ephemeral key-pair must be uniquely associated with a specific key exchange instance to prevent cryptographic vulnerabilities, such as cross-protocol attacks or unintended key reuse.</t>
      <t>HSMs implementing PQC ephemeral key management will have to:</t>
      <ul spacing="normal">
        <li>
          <t>Generate ephemeral key-pairs on-demand from an ephemeral seed stored temporarily within the cryptographic module.</t>
        </li>
        <li>
          <t>Enforce immediate seed erasure after the key-pair is generated and the cryptographic operation is completed.</t>
        </li>
        <li>
          <t>Prevent key reuse across different algorithm suites or sessions.</t>
        </li>
      </ul>
    </section>
    <section anchor="optimizing-performance-in-hardware-implementations-of-pqc-signature-algorithms">
      <name>Optimizing Performance in Hardware Implementations of PQC Signature Algorithms</name>
      <t>When implementing PQC signature algorithms in hardware devices, such as Hardware Security Modules (HSMs), performance optimization becomes a critical consideration. Transmitting the entire message to the HSM for signing can lead to significant overhead, especially for large payloads. To address this, implementers can leverage techniques that reduce the data transmitted to the HSM, thereby improving efficiency and scalability.</t>
      <t>One effective approach involves sending only a message digest to the HSM for signing. By signing the digest of the content rather than the entire content, the communication between the application and the HSM is minimized, enabling better performance. This method is applicable for any PQC signature algorithm, whether it is ML-DSA, SLH-DSA, or any future signature scheme. For such algorithms, a mechanism is often provided to pre-hash or process the message in a way that avoids sending the entire raw message for signing. In particular, algorithms like SLH-DSA present challenges due to their construction, which requires multiple passes over the message digest during the signing process. The signer does not retain the entire message or its full digest in memory at once. Instead, different parts of the message digest are processed sequentially during the signing procedure. This differs from traditional algorithms like RSA or ECDSA, which allow for more efficient processing of the message, without requiring multiple passes or intermediate processing of the digest.</t>
      <t>A key consideration when deploying ML-DSA in HSMs is the amount of RAM available. ML-DSA, unlike traditional signature schemes such as RSA or ECDSA, requires significant memory during signing due to multiple Number Theoretic Transform (NTT) operations, matrix expansions, and rejection sampling loops. These steps involve storing large polynomial vectors and intermediate values, making ML-DSA more memory-intensive. If an HSM has sufficient RAM, this may not be an issue. However, in constrained environments with limited RAM, implementing ML-DSA can be challenging. The signer must store and process multiple transformed values, leading to increased computational overhead if the HSM lacks the necessary RAM to manage these operations efficiently.</t>
      <t>To address the memory consumption challenge, algorithms like ML-DSA offer a form of pre-hash using the mu (message representative) value described in Section 6.2 of <xref target="ML-DSA"/>. The mu value provides an abstraction for pre-hashing by allowing the hash or message representative to be computed outside the HSM. This feature offers additional flexibility by enabling the use of different cryptographic modules for the pre-hashing step, reducing RAM consumption within the HSM. The pre-computed mu value is then supplied to the HSM, eliminating the need to transmit the entire message for signing. <xref target="I-D.ietf-lamps-dilithium-certificates"/> discusses leveraging ExternalMu-ML-DSA, where the pre-hashing step (ExternalMu-ML-DSA.Prehash) is performed in a software cryptographic module, and only the pre-hashed message (mu) is sent to the HSM for signing (ExternalMu-ML-DSA.Sign).
By implementing ExternalMu-ML-DSA.Prehash in software and ExternalMu-ML-DSA.Sign in an HSM, the cryptographic workload is efficiently distributed, making it practical for high-volume signing operations even in memory-constrained HSM environments.</t>
    </section>
    <section anchor="additional-considerations-for-hsm-use-in-pqc">
      <name>Additional Considerations for HSM Use in PQC</name>
      <t>Key Rotation and Renewal: Applications are responsible for managing key lifecycles, including periodic key rotation and renewal, for compliance and cryptographic agility. While an HSM may provide mechanisms to facilitate secure key rotation, such as generating new key pairs, securely storing new seeds, and securely deleting outdated keys, this functionality is not necessarily specific to PQC. However, the security of PQC schemes is subject to ongoing research and potential cryptanalytic advances. Future developments in quantum algorithms, improved attacks on lattice-based cryptography, or side-channel vulnerabilities may necessitate adjustments to key sizes, algorithm choices and key rotation policies. HSMs should be designed to support flexible key management, including the ability to update algorithms and parameters as new security recommendations emerge.</t>
    </section>
    <section anchor="post-quantum-firmware-upgrades-for-hsms">
      <name>Post-quantum Firmware Upgrades for HSMs</name>
      <t>HSMs deployed in the field require periodic firmware upgrades to patch security vulnerabilities, introduce new cryptographic algorithms, and improve overall functionality. However, the firmware upgrade process itself can become a critical attack vector if not designed to be post-quantum. If an adversary compromises the update mechanism, they could introduce malicious firmware, undermining all other security properties of the HSM. Therefore, ensuring a post-quantum firmware upgrade process is critical for the security of deployed HSMs.</t>
      <t>CRQCs pose an additional risk by breaking traditional digital signatures (e.g., RSA, ECDSA) used to authenticate firmware updates. If firmware verification relies on traditional signature algorithms, attackers could generate forged signatures in the future and distribute malicious updates.</t>
      <section anchor="post-quantum-firmware-authentication">
        <name>Post-quantum Firmware Authentication</name>
        <t>To ensure the integrity and authenticity of firmware updates, HSM vendors will have to adopt PQC digital signature schemes for code signing. Recommended post-quantum algorithms include:</t>
        <t>SLH-DSA (Stateless Hash-Based Digital Signature Algorithm): SLH-DSA does not introduce any new hardness assumptions beyond those inherent to its underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the ongoing security of systems and protocols that use SLH-DSA for digital signatures. Given that the first vulnerabilities in PQC algorithms are more likely to arise from implementation flaws rather than fundamental mathematical weaknesses, SLH-DSA is still susceptible to attacks if not properly implemented..</t>
        <t>HSS-LMS (Hierarchical Signature System - Leighton-Micali Signature): A hash-based signature scheme, providing long-term security and efficient key management for firmware authentication (see <xref target="REC-SHS"/>).</t>
        <t>XMSS (eXtended Merkle Signature Scheme): Another stateful hash-based signature scheme similar to HSS-LMS <xref target="RFC8391"/>. XMSS signatures are slightly shorter than HSS-LMS signatures for equivalent security. However, HSS-LMS provides performance advantages and HSS-LMS is considered
simpler (see Section 10 of <xref target="RFC8554"/>).</t>
        <t>Firmware images can be signed using one of these post-quantum algorithms before being distributed to HSMs. <xref target="I-D.wiggers-hbs-state"/> discusses various strategies for a correct state and backup management for stateful hash-based signatures.</t>
        <t>Firmware images often have a long lifetime, requiring cryptographic algorithms that provide strong security assurances over extended periods. ML-DSA is not included in this list because it is a lattice-based signature scheme, making it susceptible to potential advances in quantum and classical attacks on structured lattices. The long-term security of ML-DSA depends on the continued hardness of lattice-based problems, which remain an active area of research. In contrast, SLH-DSA, HSS-LMS, and XMSS are based on well-studied hash functions, ensuring their security does not rely on unproven assumptions about lattice hardness. Given this uncertainty, use of a hash-based signature such as SLH-DSA may be preferable to ML-DSA for firmware authentication, where cryptographic stability over a long lifetime is a critical requirement.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations for key management in HSMs for PQC focus on the secure storage and handling of cryptographic seeds, which are used to derive private keys. Seeds must be protected with the same security measures as private keys, and key derivation should be efficient and secure within resource-constrained HSMs. Secure export and backup mechanisms for seeds are essential to ensure recovery in case of hardware failure, but these processes must be encrypted and protected from unauthorized access.</t>
      <section anchor="side-channel-protection">
        <name>Side Channel Protection</name>
        <t>Side-channel attacks exploit physical leaks during cryptographic operations, such as timing information, power consumption, electromagnetic emissions, or other physical characteristics, to extract sensitive data like private keys or seeds. Given the sensitivity of the seed and private key in PQC key generation, it is critical to consider side-channel protection in HSM design. While side-channel attacks remain an active research topic, their significance in secure hardware design cannot be understated. HSMs must incorporate strong countermeasures against side-channel vulnerabilities to prevent attackers from gaining insights into secret data during cryptographic operations.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Jean-Pierre Fiset, Richard Kettlewell, Mike Ounsworth, and Aritra Banerjee for the detailed review.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC8554">
        <front>
          <title>Leighton-Micali Hash-Based Signatures</title>
          <author fullname="D. McGrew" initials="D." surname="McGrew"/>
          <author fullname="M. Curcio" initials="M." surname="Curcio"/>
          <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8554"/>
        <seriesInfo name="DOI" value="10.17487/RFC8554"/>
      </reference>
      <reference anchor="RFC8391">
        <front>
          <title>XMSS: eXtended Merkle Signature Scheme</title>
          <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
          <author fullname="D. Butin" initials="D." surname="Butin"/>
          <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
          <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
          <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8391"/>
        <seriesInfo name="DOI" value="10.17487/RFC8391"/>
      </reference>
      <reference anchor="ML-KEM" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
        <front>
          <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="ML-DSA" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
        <front>
          <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="REC-SHS" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
        <front>
          <title>Recommendation for Stateful Hash-Based Signature Scheme</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="BIND" target="https://eprint.iacr.org/2024/523.pdf">
        <front>
          <title>Unbindable Kemmy Schmid</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="SLH-DSA" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
        <front>
          <title>FIPS-205: Stateless Hash-Based Digital Signature Standard</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="REC-KEM" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-227.ipd.pdf">
        <front>
          <title>Recommendations for Key-Encapsulation Mechanisms</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="I-D.ietf-lamps-dilithium-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="2" month="February" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-kyber-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)</title>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="2" month="February" year="2025"/>
          <abstract>
            <t>   The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a
   quantum-resistant key-encapsulation mechanism (KEM).  This document
   describes the conventions for using the ML-KEM in X.509 Public Key
   Infrastructure.  The conventions for the subject public keys and
   private keys are also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-kyber-certificates-08"/>
      </reference>
      <reference anchor="I-D.wiggers-hbs-state">
        <front>
          <title>Hash-based Signatures: State and Backup Management</title>
          <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
            <organization>PQShield</organization>
          </author>
          <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
            <organization>BSI</organization>
          </author>
          <author fullname="Stefan Kölbl" initials="S." surname="Kölbl">
            <organization>Google</organization>
          </author>
          <author fullname="Jim Goodman" initials="J." surname="Goodman">
            <organization>Crypto4A Technologies</organization>
          </author>
          <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
            <organization>BSI</organization>
          </author>
          <date day="24" month="September" year="2024"/>
          <abstract>
            <t>   Stateful Hash-Based Signature Schemes (S-HBS) such as LMS, HSS, XMSS
   and XMSS^MT combine Merkle trees with One-Time Signatures (OTS) to
   provide signatures that are resistant against attacks using large-
   scale quantum computers.  Unlike conventional stateless digital
   signature schemes, S-HBS have a state to keep track of which OTS keys
   have been used, as double-signing with the same OTS key allows
   forgeries.

   This document provides guidance and documents security considerations
   for the operational and technical aspects of deploying systems that
   rely on S-HBS.  Management of the state of the S-HBS, including any
   handling of redundant key material, is a sensitive topic, and we
   discuss some approaches to handle the associated challenges.  We also
   describe the challenges that need to be resolved before certain
   approaches should be considered.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-wiggers-hbs-state-01"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
