<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-pqc-app-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2026" month="February" day="24"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for device manufacturers, application developers, and service providers. This document highlights the unique characteristics of applications and offers best practices for implementing quantum ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries, including those equipped with CRQCs. The degree of vulnerability varies depending on the application, the underlying systems, the value of the data being transmitted, and the attractiveness of attacking a particular individual, device, or flow. This document outlines quantum ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, together with essential supporting protocols (e.g., DNS), can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="RFC9794"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM). Such algorithms rely on mathematical problems (e.g., lattices) that are believed to be hard for both classical and CRQCs to solve efficiently.</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
      <t>This document adopts terminology from <xref target="I-D.ietf-pquip-pqc-engineers"/>. As described there, terms such as "post-quantum," "quantum ready,"quantum resistant," and "quantum secure" are often used interchangeably to describe algorithms intended to resist attacks by CRQCs.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality (see Section 7 of <xref target="I-D.ietf-pquip-pqc-engineers"/>), while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking certificate-based authentication mechanisms that rely on traditional algorithms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>As explained in the previous section, data that is only temporarily in transit may nevertheless require protection for many years. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.ietf-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.ietf-tls-mlkem"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include sectors governed by stringent cryptographic standards.</t>
      <t>In practice, applications that rely on TLS typically depend on the underlying TLS library. Upgrading to a library version that supports TLS 1.3 and PQC key exchange extensions is a necessary first step, but it may not be sufficient, as it is not known whether PQC groups are enabled by default across different implementations. Applications that configure protocol versions or cipher suites explicitly <bcp14>MUST</bcp14> update these settings to ensure that hybrid or pure PQC key exchange groups are enabled. Applications that rely on library defaults <bcp14>SHOULD</bcp14> review the library documentation or perform interoperability testing to confirm that PQC groups are negotiated as intended. Operators should also consider potential interoperability issues with legacy peers that do not yet support TLS 1.3 and PQC key exchange extensions.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the important challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets. In TLS, this results in multiple TCP segments. In DTLS, handshake messages are explicitly fragmented at the record layer as specified in <xref target="RFC9147"/>, with each fragment sent in its own UDP datagram. In both cases, ClientHello message increase latency and risk of handshake delay, especially in lossy networks.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon. More generally, middleboxes may also mishandle fragmented IP/UDP packets, which makes this issue particularly significant for DTLS deployments.</t>
              </li>
              <li>
                <t>The server’s ServerHello and associated traditional public key and PQC ciphertext may also exceed the MTU, leading to fragmentation in both TLS and DTLS, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="use-of-external-psk-with-traditional-key-exchange-for-data-confidentiality">
      <name>Use of External PSK with Traditional Key Exchange for Data Confidentiality</name>
      <t><xref target="RFC8772"/> provides an alternative approach for ensuring data confidentiality by combining an external pre-shared key (PSK)
with a traditional key exchange mechanism, such as ECDHE. The external PSK is incorporated into the TLS 1.3 key schedule,
where it is mixed with the (EC)DHE-derived secret to strengthen confidentiality.</t>
      <t>While using an external PSK in combination with (EC)DHE can enhance confidentiality, it has the following limitations:</t>
      <ul spacing="normal">
        <li>
          <t>Key Management Complexity: Unlike ephemeral ECDHE keys, external PSKs require secure provisioning and lifecycle management.</t>
        </li>
        <li>
          <t>Limited Forward Secrecy: If an external PSK is static and reused across sessions, its compromise can retroactively expose
past communications if the traditional key exchange is broken by a CRQC.</t>
        </li>
        <li>
          <t>Scalability Challenges: Establishing unique PSKs for many clients can be impractical, especially in large-scale deployments.</t>
        </li>
        <li>
          <t>Impersonation Risk: Because PSKs are symmetric, any party in possession of the PSK can authenticate as either the client or the server. This differs from certificate-based authentication, where compromise of a private key only enables impersonation of the corresponding entity.</t>
        </li>
        <li>
          <t>Quantum Resistance Dependence: While PSKs can provide additional secrecy against quantum threats, they must be
generated using a secure key-management technique. If a weak PSK is used, it may not offer sufficient security against
brute-force attacks.</t>
        </li>
      </ul>
      <t>Despite these limitations, external PSKs can serve as a complementary mechanism in PQC transition strategies, providing additional
confidentiality protection when combined with traditional key exchange.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <section anchor="quantum-ready-authentication">
        <name>Quantum Ready Authentication</name>
        <t>The quantum ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
        <t>The quantum ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      </section>
      <section anchor="post-quantum-x509-certificates">
        <name>Post-Quantum X.509 Certificates</name>
        <t>Post-quantum certificates contain only a PQC public key and are signed using a post-quantum algorithm. They are suitable for deployments capable of fully embracing post-quantum cryptography.</t>
        <ul spacing="normal">
          <li>
            <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.ietf-tls-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
          </li>
          <li>
            <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. SLH-DSA is supported for use with TLS through registered SignatureScheme values in the IANA TLS Parameters registry. SLH-DSA produces significantly larger signatures than ML-DSA, which increases TLS handshake sizes, but it offers strong security properties and flexibility across multiple parameter variants. Its performance impact is typically negligible for long-lived TLS connections and large data transfers, particularly in low-loss network environments. An advantage of SLH-DSA is that it is used as a pure post-quantum signature algorithm and does not require a PQ/T hybrid composite.</t>
          </li>
        </ul>
      </section>
      <section anchor="hybrid-composite-x509-certificates">
        <name>Hybrid (Composite) X.509 Certificates</name>
        <t>A composite certificate contains both a traditional public key algorithm (e.g., ECDSA) and a post-quantum algorithm (e.g., ML-DSA) within a single X.509 certificate. This design enables both algorithms to be used in parallel, the traditional component ensures compatibility with existing infrastructure, while the post-quantum component introduces resistance against future quantum attacks.</t>
        <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
      </section>
      <section anchor="negotiation-of-authentication-schemes">
        <name>Negotiation of Authentication Schemes</name>
        <t>During the transition, clients and servers may be configured to support multiple authentication schemes (e.g., traditional, composite, and PQC-only). Clients indicate supported signature schemes in the "signature_algorithms" extension <xref target="RFC8446"/>, listed in decreasing order of preference.</t>
        <t>For migration, clients <bcp14>SHOULD</bcp14> give higher precedence to composite and PQC-only schemes over traditional ones. Within that set, clients may prefer PQC-only to satisfy regulatory or compliance requirements, or prefer
composite if they want defense-in-depth security.</t>
      </section>
      <section anchor="transition-considerations">
        <name>Transition Considerations</name>
        <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
        <ul spacing="normal">
          <li>
            <t>Frequency and duration of system upgrades</t>
          </li>
          <li>
            <t>The expected timeline for CRQC availability</t>
          </li>
          <li>
            <t>Operational flexibility to enable or disable algorithms</t>
          </li>
        </ul>
        <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
        <t>Composite certificates enhance resilience during the adoption of PQC by:</t>
        <ul spacing="normal">
          <li>
            <t>Providing defense-in-depth: they maintain security as long as at least one component algorithm remains secure.</t>
          </li>
          <li>
            <t>Reducing exposure to unforeseen vulnerabilities: including potential weaknesses in PQC algorithms or their implementations.</t>
          </li>
        </ul>
        <t>However, composite certificates come with long-term implications. Once the traditional algorithm is no longer considered secure due to the availability of CRQCs, it will have to be eventually deprecated. To complete the transition to a fully quantum-resistant authentication model, it will be necessary to provision a new root CA certificate, that uses only a PQC public key and PQC signature algorithm. This new root CA would issue a hierarchy of intermediate certificates, each also signed using PQC algorithms, and ultimately issue end-entity certificates that contain only PQC public keys and are signed with PQC algorithms. This ensures that the entire certification path from the root of trust to the end-entity is cryptographically resistant to quantum attacks and does not depend on any traditional algorithms.</t>
        <t>Alternatively, a deployment may choose to continue using the same hybrid certificate even after the traditional algorithm has been broken by the advent of a CRQC. While this can simplify operations by avoiding immediate re-provisioning of trust anchors, it affects certain security properties of the composite signature.</t>
        <t>As discussed in the Security Considerations of <xref target="I-D.reddy-tls-composite-mldsa"/>, TLS treats composite ML-DSA as an opaque signature algorithm, and the detailed cryptographic properties of the construction are defined in the composite signature specification. If one component becomes forgeable, the composite construction no longer achieves Strong Unforgeability (SUF-CMA). However, SUF-CMA is not required for TLS authentication.</t>
        <t>For TLS, the relevant requirement is Existential Unforgeability under Chosen-Message Attack (EUF-CMA): an attacker must not be able to produce a valid signature over a TLS handshake transcript. In the composite construction, verification succeeds only if all component signatures verify. Therefore, even if a CRQC can forge the traditional component, an attacker must still forge the PQC component to produce a valid composite signature over a new transcript. As long as the PQC component remains EUF-CMA secure, impersonation in TLS remains infeasible.</t>
        <t>As a result, continued use of composite certificates after the traditional algorithm is broken can provide operational flexibility. Even if the arrival of CRQCs is considered imminent and the timeline is known with high confidence, this does not necessarily require an emergency migration. Instead, it allows a limited but sufficient transition window to execute a phased and carefully planned migration to certificates that rely exclusively on PQC algorithms.</t>
      </section>
      <section anchor="deployment-realities">
        <name>Deployment Realities</name>
        <t>Centralized networks, which are characterized by strong administrative control, internal CAs, and close relationships with vendors, are generally well-positioned to manage the overhead of larger PQC keys and signatures. Such networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively. For example, telecom networks fit this model and may be able to transition more quickly than more distributed environments.</t>
        <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      </section>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns: the client includes fingerprints of cached objects in the ClientHello, which are visible to eavesdroppers. These values can be used to correlate independent TLS sessions from the same client, potentially compromising anonymity. While this is not a concern for many industrial IoT scenarios, it may be inacceptable to smart home deployments.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
          <li>
            <t>Trust Anchor Identifiers ({?I-D.ietf-tls-trust-anchor-ids}): This extension allows a client to signal a compact list of trusted root CAs using unique trust anchor identifiers rather than Distinguished Names. This reduces the size of the "certificate_authorities" extension and helps the server select an appropriate certificate chain,
especially when multiple hierarchies are used (e.g., separate traditional and PQ roots). This mechanism can help reduce handshake size and improve efficiency in hybrid or PQC deployments.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify service providers via device management systems or generate logs indicating that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the application developments for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user or record the event in diagnostic logs. This message or record should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. In some environments, such as EAP deployments, supplicants may provide little or no diagnostic feedback to end-users beyond a generic failure message. In such cases, implementers would have to ensure sufficient diagnostic logging or telemetry is available for administrators to diagnose PQC-related interoperability problems. Notifications to end-users may also not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to HNDL attacks if an attacker gains access to the public keys used in the TLS key exchange. If an attacker records a complete set of encrypted DNS messages, including the TLS handshake details, they could store this data today and later use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support both pure PQC KEMs and PQ/T hybrid KEMs, as described in <xref target="I-D.ietf-hpke-pq"/>. These extensions ensure compatibility with PQC, while allowing deployments to choose between pure PQC KEM or PQ/T KEM.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
        <t>To safeguard against HNDL attacks, ECH deployments <bcp14>MUST</bcp14> incorporate support for either pure PQC KEM or PQ/T hybrid KEM. PQ/T hybrid KEM is generally preferred, as it provides defense-in-depth by combining the strengths of both classical and PQC algorithms, ensuring continued security even if one is later found to be weak. Pure PQ KEMs may be required for deployments subject to regulatory or compliance mandates that necessitate the exclusive use of PQC. In hybrid mode, the public_key field in the HpkeKeyConfig structure accommodates a concatenation of classical and PQC KEM public keys, whereas in pure PQ mode only the PQC KEM public key is included.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The adoption of PQC in TLS-based applications will not be a simple binary decision but rather a gradual transition that  demands a careful evaluation of
trade-offs and deployment considerations. Application providers will need to assess algorithm selection, performance impact,
interoperability, and security requirements tailored to their specific use cases. While the IETF defines cryptographic mechanisms for TLS and
provides guidance on PQC transition strategies, it does not prescribe a one-size-fits-all approach. Instead, this document outlines key
considerations to assist stakeholders in adopting PQC in a way that aligns with their operational and security requirements.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of
maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic
algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory
requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while
ensuring resilience to potential catastrophic vulnerabilities in any single algorithm. This approach allows for a gradual
transition to PQC, preserving the benefits of traditional cryptosystems without requiring their immediate replacement.</t>
      <section anchor="mitm-attacks-with-crqc">
        <name>MITM Attacks with CRQC</name>
        <t>A MITM attack is possible if an adversary possesses a CRQC capable of breaking traditional public-key signatures. The attacker can generate
a forged certificate and create a valid signature, enabling them to impersonate a TLS peer, whether a server or a client. This completely undermines the authentication
guarantees of TLS when relying on traditional certificates.</t>
        <t>To mitigate such attacks, several steps need to be taken:</t>
        <ol spacing="normal" type="1"><li>
            <t>Revocation and Transition: Both clients and servers that use traditional certificates will have to revoke them and migrate to PQC authentication.</t>
          </li>
          <li>
            <t>Client-Side Verification:  Clients should avoid establishing TLS sessions with servers that do not support PQC authentication.</t>
          </li>
          <li>
            <t>PKI Migration: Organizations should transition their PKI to post-quantum-safe certification authorities and discontinue issuing certificates based on traditional cryptographic methods.</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Russ Housley, Loganaden Velvindron, Bas Westerbaan, Richard Sohn, Andrei Popov, Alan DeKok, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="8" month="February" year="2026"/>
            <abstract>
              <t>   This draft defines three hybrid key agreement mechanisms for TLS 1.3
   - X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 - that
   combine the post-quantum ML-KEM (Module-Lattice-Based Key
   Encapsulation Mechanism) with an ECDHE (Elliptic Curve Diffie-
   Hellman) exchange.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ecdhe-mlkem-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-03"/>
        </reference>
        <reference anchor="RFC8772">
          <front>
            <title>The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP)</title>
            <author fullname="S. Hu" initials="S." surname="Hu"/>
            <author fullname="D. Eastlake" initials="D." surname="Eastlake"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="T. Chua" initials="T." surname="Chua"/>
            <author fullname="D. Huang" initials="D." surname="Huang"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>A Broadband Network Gateway (BNG) in a fixed wireline access network is an Ethernet-centric IP edge router and the aggregation point for subscriber traffic. Control and User Plane Separation (CUPS) for such a BNG improves flexibility and scalability but requires various communication between the User Plane (UP) and the Control Plane (CP). China Mobile, Huawei Technologies, and ZTE have developed a simple CUPS control channel protocol to support such communication: the Simple Control and User Plane Separation Protocol (S-CUSP). S-CUSP is defined in this document.</t>
              <t>This document is not an IETF standard and does not have IETF consensus. S-CUSP is presented here to make its specification conveniently available to the Internet community to enable diagnosis and interoperability.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8772"/>
          <seriesInfo name="DOI" value="10.17487/RFC8772"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-14"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <date day="3" month="February" year="2026"/>
            <abstract>
              <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3, including use in certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-09"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
